Abstract

This paper will present a comparison between three proposed methods. All of these methods include hiding a secret message inside a video for the aim of transferring it to another party with high security and a high embedding rate in order to ensure that the secret message is not discovered by the attacker. In addition , facilitating deals with video frames as large data for the purpose of analyzing, dividing and controlling frames easily by the programmer, using the MapReduce method. This is done by dividing the video into a series of frames, and before the hiding process, the message is encrypted using the advance encryption standard (AES) algorithm. These basic processes are implemented in all three proposed methods, the rest of the details for each method are: The first method: used the pixel value difference (PVD) algorithm to hide the secret message in the video. In addition, the stego secret key was also used. This key is used for the purpose of deciding the locations of the pixels that will be employed to hide the secret message inside it. The second method: the MapReduce principle is used for the purpose of facilitating dealing with video frames. The chosen frame will enter the MapReduce stages. This is implemented by dividing the frame into three matrices red, green, blue (RGB). Each matrix represents a map. Moreover, the technique that is used for concealment is the least significant bit (LSB) technology which uses the stego secret key (x2) for the purpose of selecting sites that will be hidden by it. The third method: Also, the MapReduce principle is used, but this method is implemented by dividing the frame into four blocks. Each block represents a map. In one of the stages of the MapReduce, the hiding process will be done by using the (PVD) method which uses the stego secret key (n+15). Finally, the reducer, which is the last stage, will collect the results of each block to generate the stego-frame. The results of the three methods are efficiency, transparency, robustness and powerful in stego video. It is noticed that the second method has achieved the lowest capacity, thus achieving high security. As for the third method, it achieved the highest capacity and the highest execution time was the first method. Despite this, all the three methods have achieved high security. The attacker or unauthorized person cannot detect any suspicious differences in a stego video. These results are obtained through using many measurements: peak signal-to-noise ratio (PSNR), Mean Squared Error (MSE), Entropy and correlation coefficient. Index Terms—steganography, PVD, LSB, MapReduce, Secret key.

Highlights

  • In the digital information interval, big data have emerged as a research area to accurately handle the vast amounts of data produced

  • Steganography must satisfy the basic requirement of capacity, the quality of stego images, which must be unchanged, security and robustness

  • The pixel value difference (PVD) have some limitation, this limitation is fall boundary issues [18]. This means that the color pixel value may overtake the range (0-255) in a stego image [8], in a proposed method removed this issue of PVD method

Read more

Summary

INTRODUCTION

In the digital information interval, big data have emerged as a research area to accurately handle the vast amounts of data produced These data are exceedingly complex for storage, processing and study using conventional bases of data [1],[2]. Steganography must satisfy the basic requirement of capacity (that refers to the amount of data bits concealed in the cover media), the quality of stego images, which must be unchanged, security and robustness. This is what resistance to improvement or destruction [11],[12]. It is important to safeguard our data or knowledge from intruders, hackers, or unauthorized access [14],[15],[16]

RELATED WORK
PIXEL VALUE DIFFERENCE ALGORITHM (PVD)
MAPREDUCE
PROPOSED METHODS
Extraction Algorithm
INDICATES COMPARISON RESULTS Tools
VIII. CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call