使用视频安全数据传输

Nikita Lemos, Kavita Sonawane, Bidisha Roy
{"title":"使用视频安全数据传输","authors":"Nikita Lemos, Kavita Sonawane, Bidisha Roy","doi":"10.1109/IC3.2015.7346684","DOIUrl":null,"url":null,"abstract":"In today's world transmitting data in a safe and secure fashion is difficult, especially when highly sensitive data is involved. The data should be ideally robust to security threats. The paper aims at proposing a methodology which employs dual level of security using cryptography and steganography to hide the secret text data using video as a cover. A blend of existing and novel techniques is used for hiding the data. Cryptography aims at concealing the secret data and steganography hides the existence of the data. Since a video is addressed as a collection of frames, a frame selection logic is incorporated which inserts data into the frames in a random fashion so that the data cannot be retrieved easily by the attacker. Considering the goal of crypto and steganography the analysis of the methodology can be done on the basis of visual perceptibility, error ratios and histogram comparison of video frames before and after hiding data. Use of two techniques with distinct goals to hide the data increases the robustness as well as simple frame selection logic prevents the attacker to obtain the data easily, but at the same time simplifies the sender's job as a rule index of frames is maintained.","PeriodicalId":217950,"journal":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","volume":"189 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"Secure data transmission using video\",\"authors\":\"Nikita Lemos, Kavita Sonawane, Bidisha Roy\",\"doi\":\"10.1109/IC3.2015.7346684\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In today's world transmitting data in a safe and secure fashion is difficult, especially when highly sensitive data is involved. The data should be ideally robust to security threats. The paper aims at proposing a methodology which employs dual level of security using cryptography and steganography to hide the secret text data using video as a cover. A blend of existing and novel techniques is used for hiding the data. Cryptography aims at concealing the secret data and steganography hides the existence of the data. Since a video is addressed as a collection of frames, a frame selection logic is incorporated which inserts data into the frames in a random fashion so that the data cannot be retrieved easily by the attacker. Considering the goal of crypto and steganography the analysis of the methodology can be done on the basis of visual perceptibility, error ratios and histogram comparison of video frames before and after hiding data. Use of two techniques with distinct goals to hide the data increases the robustness as well as simple frame selection logic prevents the attacker to obtain the data easily, but at the same time simplifies the sender's job as a rule index of frames is maintained.\",\"PeriodicalId\":217950,\"journal\":{\"name\":\"2015 Eighth International Conference on Contemporary Computing (IC3)\",\"volume\":\"189 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-08-20\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 Eighth International Conference on Contemporary Computing (IC3)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IC3.2015.7346684\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 Eighth International Conference on Contemporary Computing (IC3)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IC3.2015.7346684","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8

摘要

在当今世界,以安全可靠的方式传输数据是困难的,特别是当涉及高度敏感的数据时。理想情况下,数据应该能够抵御安全威胁。本文旨在提出一种采用加密和隐写双重安全级别的方法,以视频为掩护隐藏秘密文本数据。现有技术和新技术的混合用于隐藏数据。密码学的目的是隐藏秘密数据,隐写术的目的是隐藏数据的存在。由于视频是作为一组帧进行寻址的,因此采用了一种帧选择逻辑,它以随机的方式将数据插入帧中,这样攻击者就不能轻易地检索到数据。考虑到加密和隐写的目标,可以根据隐藏数据前后视频帧的视觉可感知性、错误率和直方图比较对方法进行分析。使用两种目标不同的技术来隐藏数据,增加了鲁棒性,同时简单的帧选择逻辑防止攻击者轻易获得数据,同时简化了发送方的工作,因为帧的规则索引被维护。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Secure data transmission using video
In today's world transmitting data in a safe and secure fashion is difficult, especially when highly sensitive data is involved. The data should be ideally robust to security threats. The paper aims at proposing a methodology which employs dual level of security using cryptography and steganography to hide the secret text data using video as a cover. A blend of existing and novel techniques is used for hiding the data. Cryptography aims at concealing the secret data and steganography hides the existence of the data. Since a video is addressed as a collection of frames, a frame selection logic is incorporated which inserts data into the frames in a random fashion so that the data cannot be retrieved easily by the attacker. Considering the goal of crypto and steganography the analysis of the methodology can be done on the basis of visual perceptibility, error ratios and histogram comparison of video frames before and after hiding data. Use of two techniques with distinct goals to hide the data increases the robustness as well as simple frame selection logic prevents the attacker to obtain the data easily, but at the same time simplifies the sender's job as a rule index of frames is maintained.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信