Generic placeholder image

International Journal of Sensors, Wireless Communications and Control

Editor-in-Chief

ISSN (Print): 2210-3279
ISSN (Online): 2210-3287

General Research Article

Video Steganography Using DNA and Chaotic Sequence

Author(s): Munesh Chandra Trivedi* and Ranjana Joshi

Volume 11, Issue 5, 2021

Published on: 27 October, 2020

Page: [577 - 582] Pages: 6

DOI: 10.2174/2210327910999201027201724

Price: $65

Abstract

Background: Several activities or tasks which are performed with the help of digital technologies not only make life easier but also very fast. The world without digital technologies realization seems to be very hard. These activities involve the exchange of some messages, which sometimes needs security, in terms of confidentiality, integrity, and availability.

Objective: To develop an algorithm which can withstand against the snooping attack and traffic analysis.

Methods: DNA concept is used to perform the encryption process. After the encryption process has been performed, the resultant cipher text obtained can be made hidden into some of the randomly selected frames of video acting as a cover medium. The chaotic sequence has been used to determine the random frame of carrier video.

Results: Performance of proposed approach was evaluated on the different parameters which was satisfactory. Results obtained through histogram analysis clearly reflect observations that visual detection is very hard to observe. If spectral analysis is performed on the output generated by the encryption procedure of the proposed algorithm, the result will be an encrypted message.

Conclusion: Encrypting the required plain text, choosing a random frame and then hiding encrypted text in LSB of the chosen frame are the key concepts of the proposed algorithm. The strength of DNA and Chaotic sequence is exploited in the proposed algorithm. Based on the survey and results obtained, the strength of the proposed algorithm is claimed.

Keywords: Steganography, cryptography, chaotic sequence, DNA sequence, encryption, LSB.

Graphical Abstract


Rights & Permissions Print Cite
© 2024 Bentham Science Publishers | Privacy Policy