Issue |
E3S Web Conf.
Volume 399, 2023
International Conference on Newer Engineering Concepts and Technology (ICONNECT-2023)
|
|
---|---|---|
Article Number | 01003 | |
Number of page(s) | 8 | |
Section | Electronics and Electical Engineering | |
DOI | https://doi.org/10.1051/e3sconf/202339901003 | |
Published online | 12 July 2023 |
A Modified Enhanced Method of Audio – Video Steganography for High Security Data Transmission
1 Assistant Professor, Department of ECE, Mookambigai College of Engineering, Pudukkottai, Tamilnadu, India
2 Associate Professor, Department of ECE, Mookambigai College of Engineering, Pudukkottai, Tamilnadu, India
3 Assistant Professor, Department of ECE, Mookambigai College of Engineering, Pudukkottai, Tamilnadu, India
4 Assistant Professor, Department of ECE, Kings College of Engineering, Pudukkottai, Tamilnadu, India
* Corresponding author: staffmceece@gmail.com
Steganography is an art of convert communication, which offers secrete and secure way of communication. It has many application areas such as audio-video synchronization,in defense forces etc… The audio data is converted into binary format and encrypted using a XOR encryption algorithm. Then the encrypted audio data converted into XL data form. The video frames are divided into non-overlapping blocks, and the difference between the adjacent pixels in each block is computed to obtain a reference matrix. Each block is then iterated through, if the difference between adjacent pixels is greater than or equal to the average difference in the reference matrix, the MPVD (Modified Pixel Value Differencing) based LSB of the pixel value is modified to embed the encrypted audio data bit. The embedded bit is then XORed with the corresponding LSB of adjacent pixel in the same block. The modified video frames can be sent over an unsecured channel without revealing the embedded encrypted audio data. To extract the encrypted audio message from the stego video, the embedded bits are XORed with the corresponding LSB of the adjacent pixel in the same block, and the modified LSBs are extracted and decrypted using the same encryption algorithm and key.
© The Authors, published by EDP Sciences, 2023
This is an Open Access article distributed under the terms of the Creative Commons Attribution License 4.0, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.