Secret Channel using Video Steganography

Lee Kar Yee - Universiti Tun Hussein Onn Malaysia, Johor, Malaysia
Chuah Chai Wen - Universiti Tun Hussein Onn Malaysia, Johor, Malaysia


Citation Format:



DOI: http://dx.doi.org/10.30630/joiv.1.4-2.71

Abstract


Video steganography is about hiding the secret message into the video as the cover media. Steganography is a technique use to secure the transmission of secret information or hide their existence. Most of the steganography software such as DeEgger Embedder and OurSecret does not have encryption algorithm to preserve the confidentiality for the secret message. OurSecret software only using simple password to keep the secrecy of the message. A simple password is not strong enough to protect the secret message, secret message will be vulnerable once the attacker successfully attack the steganography technique use to hide the secret message in the video. Furthermore, password is not an encryption algorithm. Secret message without encrypted is the vulnerability to the secret message. Confidentiality of the secret message will not be able to preserve. Hence there is a need to encrypt the secret message with stream cipher while not leaving it vulnerable to attacker. Stream cipher provide bit by bit encryption. A video steganography with embedding text with RC4 encryption cipher is design, develop and test in this project.

Keywords


video steganography; confidentiality; encryption; RC4.

Full Text:

PDF

References


W. Stallings, Cryptography and Network Security: Principles and Practices 7th Edition, Pearson Education India, 2017.

H. Delfs and H. Knebl, Symmetric-key Encryption, Journal of Introduction to Cryptography, Publisher Springer, pp. 11-31, 2007.

N. Daswani, C. Kern and A. Kesavan, Asymmetric Key Cryptography, Journal of Foundations of Security: What Every Programmer Needs to Know, Publisher Springer, pp221-226, 2007

C. D. Canniere and B. Preneel, Trivium, Journal in New Stream Cipher Designs, Publisher Springer, pp. 224-266, 2008.

M. Hell, T. Johansson and W. Meier, Grain: A Stream Cipher for Constrained Environments, Journal in International Journal of Wireless and Mobile Computing, Publisher Inderscience, Vol 2, No. 1, pp. 86-93, 2007.

J. Neil F and J. Sushil, Exploring Steganography: Seeing the Unseen, Journal of Computer, Publisher IEEE, Vol. 31, No. 2, 1998.

P. Fabien AP, A. Ross J and K. Markus G, Information Hiding-A Survey, Proceeding of the IEEE, Publisher IEEE, Vol. 87, No. 7, pp. 1062-1078, 1999.

BS. Champakamala, K. Padmini and DK. Radhika, Least Significant Bit Algorithm for Image Steganography, Journal of International Journal of Advance Computer Technology, Vol. 3, No. 4, pp.34-38, 2013.

AP. Sherly and PP. Amritha, A Compressed Video Steganography Using TPVD, International Journal of Database Management System (IJDMS), Vol. 2, No. 3, 2010.

J. P. Cruz, N. J. Libatique and G. Tangonan, Steganography and Data Hiding in Flash Video (FLV), TENCON 2012-2012 IEEE Region 10 Conference, pp. 1-6, 2012.

DeEgger Embedder, (2017). URL: http://deegger-embedder.findmysoft.com/.

OurSecret, (2017). URL: http://oursecret.soft112.com/.

J. B. Dundas, Object-Oriented Software Development Life Cycle, Proceedings of the 2nd National Conference, INDIACom, 2008.