Skip to main content

Hiding an Image Using Multi-object Vector Steganography and Variable Length Mixed Key Cryptography

  • Conference paper
  • First Online:
International Conference on Artificial Intelligence: Advances and Applications 2019

Part of the book series: Algorithms for Intelligent Systems ((AIS))

  • 489 Accesses

Abstract

Security and robustness are very important issues in designing a fine steganographic algorithm. Security is required due to a large amount of data transferred through the Internet. Today, image is a popular data which contains lots of secret information. This paper presents a technique to hide an image into the video using a combination of video steganography and cryptography. In this paper, we have used a multi-object vector steganography algorithm for hiding an image, and after this process, for video encryption, variable length mixed key cryptography (VLMKC) algorithm is used. A combination of steganography and cryptography provided more security. Our proposed method is highly secure because hackers do not know in which frame of the video sequence, image is hidden and how many images are used for hiding process, and do not know about actual information because the information is encrypted.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Thakur V, Saikia M (2013) Hiding secret image in video. In: International conference on Intelligent Systems and Signal Processing (ISSP), IEEE

    Google Scholar 

  2. Zaheer R, Gaur RS, Dixit V (2017) A literature survey on various approaches of data hiding in images. In: International Conference on Innovations in information Embedded and Communication Systems (ICIIECS), IEEE

    Google Scholar 

  3. Divya KP, Mahesh K (2014) Random image embedded in videos using LSB insertion algorithm. Int J Eng Trends Technol (IJETT) 13(8):381–385

    Article  Google Scholar 

  4. Kini NG, Kini GV (2019) A parallel algorithm to hide an image in an image for secured steganography. Integrated intelligent computing, communication and security. Springer, Singapore, pp 585–594

    Chapter  Google Scholar 

  5. Mani MR, Eswari GS (2018) A novel image hiding technique based on Stratified steganography. Smart computing and informatics. Springer, Singapore, pp 45–52

    Chapter  Google Scholar 

  6. Mstafa RJ, Elleithy KM (2014) A highly secure video steganography using hamming code (7, 4). In: IEEE LISAT 2014 Long Island Systems, Applications and Technology

    Google Scholar 

  7. Ghosh E, Debnath D, Banik BG (2019) Blind RGB image steganography using discrete cosine transformation. Springer, Singapore

    Google Scholar 

  8. Viraktamath SV, Kinagi B, Kumar K, Pavan MS, Hunagund V (2018) Performance analysis of steganography for hiding miscellaneous data using Daubechies wavelet, IEEE

    Google Scholar 

  9. Reddy MA, Reddy PS (2013) DWT and LSB algorithm based image hiding in a video. Int J Eng Sci Adv Technol 3(4):170–175

    Google Scholar 

  10. Zhang Y, Zhang M, Wang XA, Niu K, Liu J (2016) A novel video steganography algorithm based on trailing coefficients for H.264/AVC. Informatica 40:63–70

    Google Scholar 

  11. Xu D, Wang R, Shi YQ (2014) Data hiding in encrypted H.264/AVC video streams by codeword substitution. IEEE Trans Inf Forens Secur 9(4):596–606

    Article  Google Scholar 

  12. Banerjee A, Jana B (2018) A secure high capacity video steganography using bit-plane slicing through (7, 4) hamming code. Advanced computational and communication paradigms. Springer, Singapore, pp 85–98

    Chapter  Google Scholar 

  13. Cao Z, Yin Z, Hu H, Gao X, Wang L (2016) High capacity data hiding scheme based on (7, 4) hamming code. Springer Plus 5(1):175

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Manju Kumari Gupta .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Gupta, M.K., Bohara, V. (2020). Hiding an Image Using Multi-object Vector Steganography and Variable Length Mixed Key Cryptography. In: Mathur, G., Sharma, H., Bundele, M., Dey, N., Paprzycki, M. (eds) International Conference on Artificial Intelligence: Advances and Applications 2019. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-15-1059-5_4

Download citation

Publish with us

Policies and ethics