Optimized Data Hiding in Complemented or Non-Complemented Form in Video Steganography

Samar Kamil, Masri Ayob, Siti Norul Huda Sheikh Abdullah, Zulkifli Ahmad

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Optimal match in the cover media was found to be effective for accurate data hiding and improving the visual quality of steganography algorithms. Lately, several optimized steganography algorithms including least significant bit (LSB) match, genetic algorithm (GA), particle swarm optimization (PSO) were developed for cloud data security against possible attacks. Although these algorithms can search optimal bits match in the cover media to hide the secret data precisely with less variability, the techniques consume computational time. Therefore, this paper proposed a steganography technique which can achieve almost zero variability and very low computational time. The data hiding of secret data bits in complemented or non-complemented forms were achieved and optimized by using video steganography. Furthermore, the indexes for the complemented or non-complemented form were hidden in the covered frame. This allowed information to be conveyed efficiently to the receiver when extracting the secret messages. The performance of the proposed algorithm was assessed using various parameters such as peak signal to noise ratio (PSNR), embedding capacity, normalized cross-correlation, average difference and normalized absolute error. The Results revealed that the proposed steganography system is superior compared to the existing state of the art techniques. The developed algorithm was established to be greatly effective for video data security management in cloud computing.

Original languageEnglish
Title of host publicationProceedings of the 2018 Cyber Resilience Conference, CRC 2018
EditorsKhairul Akram Zainol Abidin, Masnizah Mohd, Zarina Shukur
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781538675410
DOIs
Publication statusPublished - 25 Jan 2019
Event2018 Cyber Resilience Conference, CRC 2018 - Putrajaya, Malaysia
Duration: 13 Nov 201815 Nov 2018

Publication series

NameProceedings of the 2018 Cyber Resilience Conference, CRC 2018

Conference

Conference2018 Cyber Resilience Conference, CRC 2018
CountryMalaysia
CityPutrajaya
Period13/11/1815/11/18

Fingerprint

Steganography
video
data security
Security of data
Cloud computing
Particle swarm optimization (PSO)
Signal to noise ratio
Genetic algorithms
recipient
management
performance

Keywords

  • Cloud Computing
  • Least Significant Bit Technique
  • Optimized data hiding
  • Video Steganography

ASJC Scopus subject areas

  • Safety, Risk, Reliability and Quality
  • Social Sciences (miscellaneous)
  • Computer Networks and Communications

Cite this

Kamil, S., Ayob, M., Sheikh Abdullah, S. N. H., & Ahmad, Z. (2019). Optimized Data Hiding in Complemented or Non-Complemented Form in Video Steganography. In K. A. Z. Abidin, M. Mohd, & Z. Shukur (Eds.), Proceedings of the 2018 Cyber Resilience Conference, CRC 2018 [8626871] (Proceedings of the 2018 Cyber Resilience Conference, CRC 2018). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/CR.2018.8626871

Optimized Data Hiding in Complemented or Non-Complemented Form in Video Steganography. / Kamil, Samar; Ayob, Masri; Sheikh Abdullah, Siti Norul Huda; Ahmad, Zulkifli.

Proceedings of the 2018 Cyber Resilience Conference, CRC 2018. ed. / Khairul Akram Zainol Abidin; Masnizah Mohd; Zarina Shukur. Institute of Electrical and Electronics Engineers Inc., 2019. 8626871 (Proceedings of the 2018 Cyber Resilience Conference, CRC 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Kamil, S, Ayob, M, Sheikh Abdullah, SNH & Ahmad, Z 2019, Optimized Data Hiding in Complemented or Non-Complemented Form in Video Steganography. in KAZ Abidin, M Mohd & Z Shukur (eds), Proceedings of the 2018 Cyber Resilience Conference, CRC 2018., 8626871, Proceedings of the 2018 Cyber Resilience Conference, CRC 2018, Institute of Electrical and Electronics Engineers Inc., 2018 Cyber Resilience Conference, CRC 2018, Putrajaya, Malaysia, 13/11/18. https://doi.org/10.1109/CR.2018.8626871
Kamil S, Ayob M, Sheikh Abdullah SNH, Ahmad Z. Optimized Data Hiding in Complemented or Non-Complemented Form in Video Steganography. In Abidin KAZ, Mohd M, Shukur Z, editors, Proceedings of the 2018 Cyber Resilience Conference, CRC 2018. Institute of Electrical and Electronics Engineers Inc. 2019. 8626871. (Proceedings of the 2018 Cyber Resilience Conference, CRC 2018). https://doi.org/10.1109/CR.2018.8626871
Kamil, Samar ; Ayob, Masri ; Sheikh Abdullah, Siti Norul Huda ; Ahmad, Zulkifli. / Optimized Data Hiding in Complemented or Non-Complemented Form in Video Steganography. Proceedings of the 2018 Cyber Resilience Conference, CRC 2018. editor / Khairul Akram Zainol Abidin ; Masnizah Mohd ; Zarina Shukur. Institute of Electrical and Electronics Engineers Inc., 2019. (Proceedings of the 2018 Cyber Resilience Conference, CRC 2018).
@inproceedings{83f06c22418140f28f92358e96244f3a,
title = "Optimized Data Hiding in Complemented or Non-Complemented Form in Video Steganography",
abstract = "Optimal match in the cover media was found to be effective for accurate data hiding and improving the visual quality of steganography algorithms. Lately, several optimized steganography algorithms including least significant bit (LSB) match, genetic algorithm (GA), particle swarm optimization (PSO) were developed for cloud data security against possible attacks. Although these algorithms can search optimal bits match in the cover media to hide the secret data precisely with less variability, the techniques consume computational time. Therefore, this paper proposed a steganography technique which can achieve almost zero variability and very low computational time. The data hiding of secret data bits in complemented or non-complemented forms were achieved and optimized by using video steganography. Furthermore, the indexes for the complemented or non-complemented form were hidden in the covered frame. This allowed information to be conveyed efficiently to the receiver when extracting the secret messages. The performance of the proposed algorithm was assessed using various parameters such as peak signal to noise ratio (PSNR), embedding capacity, normalized cross-correlation, average difference and normalized absolute error. The Results revealed that the proposed steganography system is superior compared to the existing state of the art techniques. The developed algorithm was established to be greatly effective for video data security management in cloud computing.",
keywords = "Cloud Computing, Least Significant Bit Technique, Optimized data hiding, Video Steganography",
author = "Samar Kamil and Masri Ayob and {Sheikh Abdullah}, {Siti Norul Huda} and Zulkifli Ahmad",
year = "2019",
month = "1",
day = "25",
doi = "10.1109/CR.2018.8626871",
language = "English",
series = "Proceedings of the 2018 Cyber Resilience Conference, CRC 2018",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
editor = "Abidin, {Khairul Akram Zainol} and Masnizah Mohd and Zarina Shukur",
booktitle = "Proceedings of the 2018 Cyber Resilience Conference, CRC 2018",
address = "United States",

}

TY - GEN

T1 - Optimized Data Hiding in Complemented or Non-Complemented Form in Video Steganography

AU - Kamil, Samar

AU - Ayob, Masri

AU - Sheikh Abdullah, Siti Norul Huda

AU - Ahmad, Zulkifli

PY - 2019/1/25

Y1 - 2019/1/25

N2 - Optimal match in the cover media was found to be effective for accurate data hiding and improving the visual quality of steganography algorithms. Lately, several optimized steganography algorithms including least significant bit (LSB) match, genetic algorithm (GA), particle swarm optimization (PSO) were developed for cloud data security against possible attacks. Although these algorithms can search optimal bits match in the cover media to hide the secret data precisely with less variability, the techniques consume computational time. Therefore, this paper proposed a steganography technique which can achieve almost zero variability and very low computational time. The data hiding of secret data bits in complemented or non-complemented forms were achieved and optimized by using video steganography. Furthermore, the indexes for the complemented or non-complemented form were hidden in the covered frame. This allowed information to be conveyed efficiently to the receiver when extracting the secret messages. The performance of the proposed algorithm was assessed using various parameters such as peak signal to noise ratio (PSNR), embedding capacity, normalized cross-correlation, average difference and normalized absolute error. The Results revealed that the proposed steganography system is superior compared to the existing state of the art techniques. The developed algorithm was established to be greatly effective for video data security management in cloud computing.

AB - Optimal match in the cover media was found to be effective for accurate data hiding and improving the visual quality of steganography algorithms. Lately, several optimized steganography algorithms including least significant bit (LSB) match, genetic algorithm (GA), particle swarm optimization (PSO) were developed for cloud data security against possible attacks. Although these algorithms can search optimal bits match in the cover media to hide the secret data precisely with less variability, the techniques consume computational time. Therefore, this paper proposed a steganography technique which can achieve almost zero variability and very low computational time. The data hiding of secret data bits in complemented or non-complemented forms were achieved and optimized by using video steganography. Furthermore, the indexes for the complemented or non-complemented form were hidden in the covered frame. This allowed information to be conveyed efficiently to the receiver when extracting the secret messages. The performance of the proposed algorithm was assessed using various parameters such as peak signal to noise ratio (PSNR), embedding capacity, normalized cross-correlation, average difference and normalized absolute error. The Results revealed that the proposed steganography system is superior compared to the existing state of the art techniques. The developed algorithm was established to be greatly effective for video data security management in cloud computing.

KW - Cloud Computing

KW - Least Significant Bit Technique

KW - Optimized data hiding

KW - Video Steganography

UR - http://www.scopus.com/inward/record.url?scp=85062684094&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85062684094&partnerID=8YFLogxK

U2 - 10.1109/CR.2018.8626871

DO - 10.1109/CR.2018.8626871

M3 - Conference contribution

AN - SCOPUS:85062684094

T3 - Proceedings of the 2018 Cyber Resilience Conference, CRC 2018

BT - Proceedings of the 2018 Cyber Resilience Conference, CRC 2018

A2 - Abidin, Khairul Akram Zainol

A2 - Mohd, Masnizah

A2 - Shukur, Zarina

PB - Institute of Electrical and Electronics Engineers Inc.

ER -