The Implementation of Hamming Code Using Video Steganography

Authors

  • Alhussain Akoum Lebanese university, Faculty of technology,Saida, mojamaa El Bahaa,, Saida and 813, Lebanon
  • Wael Moughrabi Lebanese university, Faculty of technology, mojamaa El Bahaa,, Saida,, Lebanon

Keywords:

Cryptography, Encoding, Hamming code, Steganography

Abstract

As time goes on, the internet world grows larger and larger. The massive number of people involved in the internet means that there are more data flying around in cyberspace waiting for someone to receive it; that is where the need for steganography emerges. The role of steganography is to ensure that the necessary transmitted data does not fall in the hands of the wrong person. It hides the vital data inside an image or video without noticeable changes, where only a key provided by the sender allows the receiver to crack open the cover and see the original data. Steganography is often mistaken as a method of cryptography. In fact, they are two different methods, but they can be used together. In cryptography, the observer can detect that there is a hidden message but he doesn’t have the required tools to crack it. Hamming code is a type of cryptography and it’s use in my paper will strengthen the security of this implementation and make it even harder to decipher.

References

. Sharma, V., and Kumar, S., “A New Approach to Hide Text in Images Using Steganography”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol 3, No 4, ISSN: 2277 128X, pp.701-708, April 2013.

. Thiagarajan1, C., Aarthi2, N., “Novel Algorithm for RGB Image Steganography”, International Journal of Computer Science and Mobile Computing, Vol. 5, No. 4, pp.261 – 270, April 2016.

. Rosziati Ibrahim and Teoh Suk Kuan, “Steganography Imaging System (SIS): Hiding Secret Message inside an Image”, Proceedings of the World Congress on Engineering and Computer Science Vol I, pp. 20-22, October 2010.

. Firas A. Jassim, “A Novel Steganography Algorithm for Hiding Text in Image using Five Modulus Method”, International Journal of Computer Applications, Vol.72, No.17, pp. 39-44, June 2013.

. Bhagat, A.R and A.B. Dhembhare. "An Efficient and Secure Data Hiding Technique – Steganography”, International Journal of Innovative Research in Computer and Communication Engineering, Vol 3, No 2, pp. 941-949, February2015.

. Narayana, S and G. Prasad, “Two new approaches for secured image steganography using cryptographic techniques and type conversions”. Signal & Image Processing: An International Journal (SIPIJ), Vol.1, No.2, pp. 60-73, December 2010.

. Karim, S.M., Rahman, M.S and Hossain, M.I., “A new approach for LSB based image steganography using secret”, In: 14th International Conference on Computer and Information Technology, ICCIT 2011, pp. 286-291.

. Rongyue, Z. Sachnev, V. Botnan, M. B. Hyoung Joong, K. and Jun, H. "An Efficient Embedder for BCH Coding for Steganography", IEEE Transactions on Information Theory, vol. 58, pp. 7272-7279, December 2012.

. Liu, Y. Li, Z. Ma, X. and Liu, J. "A Robust Data Hiding Algorithm for H. 264/AVC Video Streams", Journal of Systems and Software, Vol 86, pp. 2147-2183, 2013.

. Thanikaiselvan, V. and Arulmozhivarman, P. “High security image steganography using IWT and graph theory”. In Signal and Image Processing Applications (ICSIPA), 2013 IEEE International Conference, pp: 337-342.

. Muhammad, K., Ahmad, J., Farman, H. and Zubair, M., “A novel image stenographic approach for hiding text in color images using HSI colour model”. Middle-East Journal of Scientific Research Vol 22, No 5, pp. 647-654, May 2015.

Downloads

Published

2020-08-06

How to Cite

Akoum, A. ., & Moughrabi, W. . (2020). The Implementation of Hamming Code Using Video Steganography. International Journal of Sciences: Basic and Applied Research (IJSBAR), 53(2), 46–58. Retrieved from https://gssrr.org/index.php/JournalOfBasicAndApplied/article/view/11508

Issue

Section

Articles