27-07-2012, 04:11 PM
New Framework for High Secure Data Hidden in the MPEG Using AES Encryption Algorithm
New Framework for High Secure.pdf (Size: 1.5 MB / Downloads: 59)
INTRODUCTION
Steganography is the art of hiding and transmitting data
through apparently innocuous carriers in an effort to conceal
the existence of the data, the word Steganography literally
means covered or hiding writing as derived from Greek.
Steganography has its place in security. It is not intended to
replace cryptography but supplement it. Hiding a message
with Steganography methods reduces the chance of a
message being detected. If the message is also encrypted
then it provides another layer of protection [1]. Therefore,
some Steganographic methods combine traditional
Cryptography with Steganography; the sender encrypts the
secret message prior to the overall communication process,
as it is more difficult for an attacker to detect embedded
cipher text in a cover [2].In the field of Steganography,
some terminology has developed. The adjectives 'cover',
'embedded’ and 'stego' were defined at the information
hiding workshop held in Cambridge, England. The term
"cover" refers to description of the original, innocent
massage, data, audio, video, and so on.
RELATED WORK
In[5] a new system of information hiding is presented.
The proposed system aim to hidden information (data file)
in any execution file (EXE).The author also makes
collaboration between stenography and cryptography in a
very secure system the encryption method which has been
used in this paper is AES method. In [4],[5] introduce an
authentication protocol which serves as a proof of concept
for authenticating an RFID tag to a reader device using the
Advanced Encryption Standard (AES) as cryptographic
primitive. The main part of this work is a novel approach of
an AES hardware implementation which encrypts a 128-bit
block of data within 1000 clock cycles.
Secret key Steganography
A secret key Steganography system is similar to a
symmetric cipher, where the sender chooses a cover and
embeds the secret message into the cover using a secret key.
If the secret key used in the embedding process is known to
the receiver, he can reverse the process and extract the secret
message. Anyone who doesn't know the secret key should
not be able to obtain evidence of the encoded information[7].
The secret key Steganography can be defined as the
quintuple (C, M, K, DK, EK) where:
EXPIREMENTAL RESULTS
Due to the difficulty of showing the result as a video
stream on paper, the author prefers to display the result on
the frame of the digital video file along with histogram of
each a single frame. The following here are extracted frames
of a digital video file. Figure 7 shows the frames from the
famous movie “The Godfather” before applying the
algorithm, while Figure 8 shows the frame after applying the
algorithm. We can see here that there are no much
differences between the two sets of frames especially for
human vision system. This can tell that the algorithm can be
applied successfully on video frames also to verify the
algorithm by the histogram, to see the divergences on the
frames before and after hiding data. From the histogram for
both single frame in figure 7 & 8, its clear there is no
differences between the two sets before and after hiding data
which prove that the algorithm successfully hid the data into
the frames without making a noticeable difference for the
human vision system.