Hiding Data in Video Sequences using RC6 Algorithm
Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.9, No. 1)Publication Date: 2020-01-30
Authors : V.Yamini Priya; K.Priyadharshini; K.Sowndharya; S.Swathi; K.Swetha;
Page : 144-149
Keywords : Steganography; Chaos algorithm; LSB technique; RC6 algorithm; LWT technique;
Abstract
An enhancement of data protection system for secret data transmission using reserve room in encrypted images based on texture analysis with lifting wavelet technique is proposed here. The wavelet will split the image into four frequency sub bands namely LL, LH, HL and HH. These coefficients are then used in the encoder for removing the redundancies. The selective embedding is utilized in this method to find host signal samples suitable for data hiding technique. This method uses the Least Significant Bits (LSB) insertion to hide data within encrypted image data. The binary representation of the each hidden data is used to overwrite the LSB of each byte within the encrypted image randomly. The Least significant bit replacement method is effectively used for data hiding process. This method proves as more secure technique for secret data transmission with high quality factor. The hidden data will be used to enable the receiver to reconstruct the same secret transformation table after encryption. Hence the original image can be reproduced by the inverse of the transformation and encryption processes. We proposed the encrypting user's data using RC6 Algorithm with a Secret Key, Which is embedded effectively in a Image using LSB based image steganography techniques. The simulation produces result to indicate that the framework can be successfully used in Image data hiding applications. This can be used for hiding data in video frames to avoid data to be attacked by attacks. Hence it is efficient and provides good accuracy.
Other Latest Articles
- Identity-Based Authentication with Efficient Traceable System in Cloud Storage
- DENSITY BASED TRAFFIC CONTROL USING IoT
- PREVENTION OF CARJACKING USING FACE RECOGNITION
- A SECURE ERASURE CODE-BASED CLOUD STORAGE SYSTEM WITH SECURED DATA FORWARDING
- Privacy-Preserving Healthcare Architecture Using Blockchain
Last modified: 2020-02-03 00:59:21