Lightweight and optimized multi-layer data hiding using video steganography paper

Samar Kamil, Masri Ayob Authors, Siti Norul Huda Sheikh Abdullah, Zulkifli Ahmad

Research output: Contribution to journalArticle

1 Citation (Scopus)

Abstract

The ever-escalating attacks on the internet network are due to rapid technological growth. In order to surmount such challenges, multi-layer security algorithms were developed by hybridizing cryptography and steganography techniques. Consequently, the overall memory size became enormous while hybridizing these techniques. On the other side, the least significant bit (LSB) and modified LSB replacing approaches could provide the variability as detected by steganalysis technique, most found to be susceptible to attack too due to numerous reasons. To overcome these issues, in this paper a lightweight and optimized data hiding algorithm is proposed which consume less memory, provide less variability, and robust against histogram attacks. The proposed steganography system was achieved in two stages. First, data was encrypted using lightweight BORON cipher that only consumed less memory as compared to conventional algorithm such as 3DES, AES. Second, the encrypted data was hidden in the complemented or non-complemented form to obtain minimal variability. The performance of the proposed technique was evaluated in terms of avalanche effect, visual quality, embedding capacity and peak signal to noise ratio (PSNR). The results revealed that the lightweight BORON cipher could produce approximate same avalanche effect as the AES algorithm produced. Furthermore, the value of PSNR had shown much improvement in comparison to optimization algorithm GA.

Original languageEnglish
Pages (from-to)256-262
Number of pages7
JournalInternational Journal of Advanced Computer Science and Applications
Volume9
Issue number12
DOIs
Publication statusPublished - 1 Jan 2018

Fingerprint

Steganography
Data storage equipment
Signal to noise ratio
Cryptography
Internet

Keywords

  • Boron cipher
  • Cloud computing
  • Least significant bit technique
  • Optimized data hiding
  • Video steganography

ASJC Scopus subject areas

  • Computer Science(all)

Cite this

Lightweight and optimized multi-layer data hiding using video steganography paper. / Kamil, Samar; Authors, Masri Ayob; Sheikh Abdullah, Siti Norul Huda; Ahmad, Zulkifli.

In: International Journal of Advanced Computer Science and Applications, Vol. 9, No. 12, 01.01.2018, p. 256-262.

Research output: Contribution to journalArticle

@article{6652cfc6545647c5a153bab4c4d561f8,
title = "Lightweight and optimized multi-layer data hiding using video steganography paper",
abstract = "The ever-escalating attacks on the internet network are due to rapid technological growth. In order to surmount such challenges, multi-layer security algorithms were developed by hybridizing cryptography and steganography techniques. Consequently, the overall memory size became enormous while hybridizing these techniques. On the other side, the least significant bit (LSB) and modified LSB replacing approaches could provide the variability as detected by steganalysis technique, most found to be susceptible to attack too due to numerous reasons. To overcome these issues, in this paper a lightweight and optimized data hiding algorithm is proposed which consume less memory, provide less variability, and robust against histogram attacks. The proposed steganography system was achieved in two stages. First, data was encrypted using lightweight BORON cipher that only consumed less memory as compared to conventional algorithm such as 3DES, AES. Second, the encrypted data was hidden in the complemented or non-complemented form to obtain minimal variability. The performance of the proposed technique was evaluated in terms of avalanche effect, visual quality, embedding capacity and peak signal to noise ratio (PSNR). The results revealed that the lightweight BORON cipher could produce approximate same avalanche effect as the AES algorithm produced. Furthermore, the value of PSNR had shown much improvement in comparison to optimization algorithm GA.",
keywords = "Boron cipher, Cloud computing, Least significant bit technique, Optimized data hiding, Video steganography",
author = "Samar Kamil and Authors, {Masri Ayob} and {Sheikh Abdullah}, {Siti Norul Huda} and Zulkifli Ahmad",
year = "2018",
month = "1",
day = "1",
doi = "10.14569/IJACSA.2018.091237",
language = "English",
volume = "9",
pages = "256--262",
journal = "International Journal of Advanced Computer Science and Applications",
issn = "2158-107X",
publisher = "Science and Information Organization",
number = "12",

}

TY - JOUR

T1 - Lightweight and optimized multi-layer data hiding using video steganography paper

AU - Kamil, Samar

AU - Authors, Masri Ayob

AU - Sheikh Abdullah, Siti Norul Huda

AU - Ahmad, Zulkifli

PY - 2018/1/1

Y1 - 2018/1/1

N2 - The ever-escalating attacks on the internet network are due to rapid technological growth. In order to surmount such challenges, multi-layer security algorithms were developed by hybridizing cryptography and steganography techniques. Consequently, the overall memory size became enormous while hybridizing these techniques. On the other side, the least significant bit (LSB) and modified LSB replacing approaches could provide the variability as detected by steganalysis technique, most found to be susceptible to attack too due to numerous reasons. To overcome these issues, in this paper a lightweight and optimized data hiding algorithm is proposed which consume less memory, provide less variability, and robust against histogram attacks. The proposed steganography system was achieved in two stages. First, data was encrypted using lightweight BORON cipher that only consumed less memory as compared to conventional algorithm such as 3DES, AES. Second, the encrypted data was hidden in the complemented or non-complemented form to obtain minimal variability. The performance of the proposed technique was evaluated in terms of avalanche effect, visual quality, embedding capacity and peak signal to noise ratio (PSNR). The results revealed that the lightweight BORON cipher could produce approximate same avalanche effect as the AES algorithm produced. Furthermore, the value of PSNR had shown much improvement in comparison to optimization algorithm GA.

AB - The ever-escalating attacks on the internet network are due to rapid technological growth. In order to surmount such challenges, multi-layer security algorithms were developed by hybridizing cryptography and steganography techniques. Consequently, the overall memory size became enormous while hybridizing these techniques. On the other side, the least significant bit (LSB) and modified LSB replacing approaches could provide the variability as detected by steganalysis technique, most found to be susceptible to attack too due to numerous reasons. To overcome these issues, in this paper a lightweight and optimized data hiding algorithm is proposed which consume less memory, provide less variability, and robust against histogram attacks. The proposed steganography system was achieved in two stages. First, data was encrypted using lightweight BORON cipher that only consumed less memory as compared to conventional algorithm such as 3DES, AES. Second, the encrypted data was hidden in the complemented or non-complemented form to obtain minimal variability. The performance of the proposed technique was evaluated in terms of avalanche effect, visual quality, embedding capacity and peak signal to noise ratio (PSNR). The results revealed that the lightweight BORON cipher could produce approximate same avalanche effect as the AES algorithm produced. Furthermore, the value of PSNR had shown much improvement in comparison to optimization algorithm GA.

KW - Boron cipher

KW - Cloud computing

KW - Least significant bit technique

KW - Optimized data hiding

KW - Video steganography

UR - http://www.scopus.com/inward/record.url?scp=85059528828&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85059528828&partnerID=8YFLogxK

U2 - 10.14569/IJACSA.2018.091237

DO - 10.14569/IJACSA.2018.091237

M3 - Article

VL - 9

SP - 256

EP - 262

JO - International Journal of Advanced Computer Science and Applications

JF - International Journal of Advanced Computer Science and Applications

SN - 2158-107X

IS - 12

ER -