Embedding Encrypted Data in Video using Symmetric Key Cryptography
Shraddha Korde1, Bhavik Jethwa2, Ranjit Kundaram3, B.W.Balkhande4
1Shraddha Korde, Computer Engineering, Bharati Vidyapeeth College of Engineering, Navi Mumbai, India.
2Bhavik Jethwa, Computer Engineering, Bharati Vidyapeeth College of Engineering, Navi Mumbai, India.
3Ranjit Kundaram, Computer Engineering, Bharati Vidyapeeth College of Engineering, Navi Mumbai, India.
4B.W.Balkhande, Computer Engineering, Bharati Vidyapeeth College of Engineering, Navi Mumbai, India.
Manuscript received on April 15, 2014. | Revised Manuscript received on April 16, 2014. | Manuscript published on April 25, 2014. | PP:1-5 | Volume-2 Issue-6, April 2014. | Retrieval Number: F0703042614/2014©BEIESP
Open Access | Ethics and Policies | Cite
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Video data hiding is still an important research topic due to the design complexities involved. We propose a new video encrypted data hiding method that makes use of erasure correction capability of repeat accumulate codes and superiority of forbidden zone data hiding as well as DNA cryptography logic is used for encryption and decryption of the data. This paper also proposes a unique cipher text generation procedure as well as a new key generation procedure. DNA cryptography is one of the major concerned areas of computer and data security and a very promising direction in cryptography research. Selective embedding is utilized in the proposed method to determine host signal samples suitable for data hiding. This method also contains a temporal synchronization scheme in order to withstand frame drop and insert attacks. Finally, to demonstrate the performance of the proposed method, its implementation is explained and the results are analyzed.
Keywords: Cipher text, Data hiding, decryption, encryption, forbidden zone data hiding, key generation, repeat accumulate codes, selective embedding, security