New Hybrid Proposed Solution for Video Steganography Based on Clustering Algorithm

New Hybrid Proposed Solution for Video Steganography Based on Clustering Algorithm

Ahlem Fatnassi (ENSI, Manouba University, Tunisia), Hamza Gharsellaoui (Arab Open University, Riyadh, Saudi Arabia) and Sadok Bouamama (Higher Colleges of Technology, Dubai, UAE)
DOI: 10.4018/IJSPPC.2020040103
OnDemand PDF Download:
No Current Special Offers


Through the advent of digital information, information security has taken on a vital role. Use of the internet freely for contact has increased the attacks on users. Data protection is the present problem relating to privacy and security during storage and communication. This paper deals with a multilayered protected channel's proposal to transfer confidential data/video through a channel. The hidden video is initially encrypted using the algorithm NOLSB. The created cipher video is hidden in a larger sized video file. In addition, this video file is encrypted using the (m, k) firm technique to optimize resource efficiency and bandwidth optimization. Video shares are then sent through all the network's channels to ensure security. This approach ensures that video files could be retrieved at the end receiver even though any shares were lost over the network, without the sender needing to resend the video file.
Article Preview

1. Introduction

Nowadays, with advancement in digital communication technology and the very faster growth of computer storage and power, the difficulty in ensuring individual privacy become increasingly challenging. The degree to which every individual appreciates security and privacy differs from one person to another. Indeed, various solutions and methods have been developed and investigated to protect the personal privacy. Encryption is probably the most obvious one, and then comes steganography.

Encryption is observed while steganography is not observable generally and when it lends itself to noise. Interest from the scientific community has escalated in the past few years in relation to steganography.

Indeed, the security is enhanced by using steganography technique. The data is to be embedded in this technique will be encrypted first as show in Figure 1. This procedure assures security since there are two stages:

  • 1.


  • 2.


Figure 1.

Steganography technique description


Indeed, video is the technology of electronically recording, transmitting, storing, capturing, and reconstructing a sequence of still images representing scenes in motion. Indeed, video Frame rate, is the number of pictures per unit of time. The range from seven or nine frames per second (frame/s). The size of a video image is measured in pixels for the digital videos. Vertical scan lines and horizontal lines of resolution for analog video. The aspect ratios describe the dimensions of video picture elements and video screens. Each popular video format is rectilinear, and it can be described by a ratio between height and width. Video quality of service (QoS) can be measured with subjective quality using expert observations or by the PSNR which is one example of formal metrics.

1.1. Video Stegnography

Video Steganography is defined as the art of how to hide information in such way that averts the revealing of hiding message in video. Message like image, text, audio, video. It is focused on transform and spatial domain. Transform domain algorithm is based on embedding secret data in the transform space. This algorithm has the advantage of good stability, but its disadvantage is the small capacity. Spatial domain algorithm is to embed directly the data in the cover image as cover medium with good quality and no visual changes. The result of the algorithm has the advantage in high Steganography capacity.

Complete Article List

Search this Journal:
Open Access Articles: Forthcoming
Volume 14: 4 Issues (2022): Forthcoming, Available for Pre-Order
Volume 13: 4 Issues (2021): 1 Released, 3 Forthcoming
Volume 12: 4 Issues (2020)
View Complete Journal Contents Listing