Abstract
Protecting information on various communication media is considered an essential requirement in the present information transmission technology. So, there is a continuous search around different modern techniques that may be used to protect the data from the attackers. Steganography is one of those techniques that can be used to maintain the copyright by employing it to cover the publisher logo image inside the video frames. Nowadays, most of the popular known of the Video-Steganography methods become a conventional technique to the attacker, so there is a requirement for a modern and smart strategy to protect the copyright of the digital video file. Where this proposed system goal to create a hybrid system that combines the properties of Cryptography and Steganography work to protect the copyright hidden data from different attack types with maintaining of characteristics of the original video (quality and resolution). In this article, a modern Video-Steganography method is presented by employing the benefits of TC (Turbo code) to encrypt the pixels of logo image and Least two Significant Bit Technique procedure to embed the encryption pixels inside the frames of the video file. The insertion is performed in the frequency domain by applying the Fast Fourier Transform (FFT)on the video frames. The examination of the suggested architecture is done by terms of Structural Similarity Index, MSE (mean squared error), and PSNR (peak signal-to-noise ratio) by comparing between an original and extracted logo as well as between original and Steganographic video (averaged overall digital frames in the video). The simulation results show that this method proved high security, robustness, capacity and produces a substantial performance enhancement over the present known ways with fewer distortions in the quality of the video
Highlights
Many people when they are thinking about protecting their confidential data during transition them over various type of the communication channels, the initial word that coming to their minds is “Hacking’’ and how it can be overcoming
The development of the internet technologies demonstrates the possibility of using the video Steganography technique as a powerful and secure method for sharing secret data likes inside different internet platforms where the digital videos file has many features as compared with other Steganography types
Video Steganography technique proved a low distortion in a video file after embedding data in its which can be handled faultlessly, and the hidden data are invisible to the human visual system with high capacity for embedding the data and many other features [4]
Summary
Many people when they are thinking about protecting their confidential data during transition them over various type of the communication channels, the initial word that coming to their minds is “Hacking’’ and how it can be overcoming. The development of the internet technologies demonstrates the possibility of using the video Steganography technique as a powerful and secure method for sharing secret data likes (banking information, medical records, military intelligence copyright, etc.) inside different internet platforms where the digital videos file has many features as compared with other Steganography types. Video Steganography technique proved a low distortion in a video file after embedding data in its which can be handled faultlessly, and the hidden data are invisible to the human visual system with high capacity for embedding the data and many other features [4]
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: Eastern-European Journal of Enterprise Technologies
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.