Advertisement

A novel SPN-based video steganographic scheme using Sudoku puzzle for secured data hiding

  • Sunanda Jana
  • Arnab Kumar MajiEmail author
  • Rajat Kumar Pal
S.I. : CSI2017
  • 11 Downloads

Abstract

Video steganography is the method of hiding the presence of data within the cover video. In this paper, a novel video steganography technique is revealed, where with the help of Sudoku puzzle of order 9 × 9, extracted image frames of a cover video are utilized to hide encrypted data. The novelties of the work imply that as the input information is first encrypted into cipher text using a new modified substitution and permutation network (SPN)-type block cipher, then, that cipher text is embedded in the video using Sudoku puzzle as a key. This new and robust encryption model is like a block cipher in comparison with Advanced Encryption Standard (AES) that provides enhanced resistance in case of fault attack. This new SPN-type architecture differs with AES architecture in the step of round key mixing function. Its computation complexity is much higher compared to original AES to find 128 bits of tenth round key. Therefore, our proposed work combines both cryptographic and steganographic technique and Sudoku puzzle to enhance the security in maximum level with optimal computational complexity and good embedding capacity rate.

Keywords

Steganography Cryptography Embedding Encryption Cipher text Secret data Reference matrix Cover video Cover image Block cipher Substitution and permutation network (SPN) 

Notes

References

  1. 1.
    Ali S, Guo X, Karri R, Mukhopadhyay D (2016) Fault attacks on AES and their countermeasures. In: Secure system design and trustable computing, book part: part I, pp 163–208Google Scholar
  2. 2.
    Bhaumik J, Roy Chowdhury D (2009) NMIX: an ideal candidate for key mixing. In: Proceedings of the international conference on security and cryptography, pp 285–288Google Scholar
  3. 3.
    Chang C-C, Lin P-Y, Wang ZH, Li MC (2010) A Sudoku based secret image sharing scheme with reversibility. J Commun 5(1):5–12CrossRefGoogle Scholar
  4. 4.
    Choudry KN, Wanjari A (2015) A survey paper on video steganography. Int J Comput Sci Inf Technol 6(3):2335–2338Google Scholar
  5. 5.
    Cox IJ, Kilian J, Leighton T, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. In: Proceedings of IEEE image processing, pp 135–149Google Scholar
  6. 6.
    Daemen J, Rijmen V (2002) The design of Rijndael. Springer, HeidelbergCrossRefzbMATHGoogle Scholar
  7. 7.
    Das S, Bhaumik J (2014) A Fault based Attack on MDS-AES. International Journal of Network Security 16(3):193–198Google Scholar
  8. 8.
    Dey D, Bandyopadhyay A, Jana S, Maji AK, Pal RK (2017) A novel image steganographic scheme using 8 × 8 Sudoku puzzle. In: Advanced computing and systems for security. Springer, Singapore, pp 85–100Google Scholar
  9. 9.
    Erlich Y, Chang K, Gordon A, Ronen R, Navon O, Rooks M, Hannon GJ (2009) DNA Sudoku: harnessing high-throughput sequencing for multiplexed specimen analysis. Genome Res J 19(7):1243–1253CrossRefGoogle Scholar
  10. 10.
    Ginni ES, Pushpinder E (2016) A review on secure video steganography technique using LSB and MSB. Int J Adv Res Comput Commun Eng 5(3):635–639Google Scholar
  11. 11.
    Giraud C, Thiebeauld H (2004) A survey on fault attacks. In: 6th international conference on smart card research and advanced applications (CARDIS) VI, IFIP 18th world computer congress, TC8/WG8.8 & TC11/WG11.2, Toulouse, France, pp 159–176Google Scholar
  12. 12.
    Gupta S, Saxena J, Singh S (2015) Design of random scan algorithm in video steganography for security purposes. IOSR J Electron Commun Eng 10(5):14–20Google Scholar
  13. 13.
    Hao B, Zhao L-Y, Zhong W-D (2011) A novel steganography algorithm based on the motion vector and matrix encoding. In: Proceedings of the communication software and networks (ICCSN), pp 406–409Google Scholar
  14. 14.
    Hong W, Chen T-S, Shiu C-W (2008) Steganography using Sudoku revisited. In: Proceedings of the 2nd international symposium on intelligent information technology application, pp 935–939Google Scholar
  15. 15.
    Hu SD, Tu K (2011) A novel video steganography based on non-uniform rectangular partition. In: Proceedings of the IEEE International conference on computational science and engineering, pp 57–61Google Scholar
  16. 16.
    Jana S, Maji AK, Pal RK (2015) A novel Sudoku solving technique using column based permutation. In: Proceedings of the international symposium on advanced computing and communication (ISAAC), pp 71–77Google Scholar
  17. 17.
    Liu Y, Li Z, Ma X, Liu J (2013) Robust data hiding algorithm for H. 264/AVC video streams. J Syst Softw 7(2):565–572Google Scholar
  18. 18.
    Maity G, Jana S, Mantri M, Bhaumik J (2018) Improving security of SPN-type block cipher against fault attack. In: Communication, devices, and computing, lecture notes in electrical engineering, vol 470. Springer, Singapore, pp 115–126Google Scholar
  19. 19.
    Mehmood I, Sajjad M, Rho S, Baik SW (2016) Divide-and-conquer based summarization framework for extracting affective video content. Neurocomputing 174:393–403CrossRefGoogle Scholar
  20. 20.
    Mukhopadhyay D (2009) An improved fault based attack of the advanced encryption standard. In: AFRICACRYPT, LNCS, 5580, pp 421–434Google Scholar
  21. 21.
    Sherly AP, Amritha PP (2010) A compressed video steganography using TPVD. Int J Database Manag Syst 2(3):314–321Google Scholar
  22. 22.
    Swathi A, Jilani SAK (2012) Video steganography by LSB substitution using different polynomial equations. Int J Comput Eng Res 2(5):314–325Google Scholar
  23. 23.
    Swetha V, Prajith V, Kshema V (2015) Data hiding using video steganography—a survey. Int J Sci Eng Comput Technol 5(6):206–213Google Scholar
  24. 24.
    Vasudev P, Saurabh K (2013) Video steganography using 32 × 32 vector quantization of DCT. Int J Softw Hardw Res Eng 1(3):72–81Google Scholar

Copyright information

© Springer-Verlag London Ltd., part of Springer Nature 2019

Authors and Affiliations

  • Sunanda Jana
    • 1
  • Arnab Kumar Maji
    • 2
    Email author
  • Rajat Kumar Pal
    • 3
  1. 1.Department of Computer Science and EngineeringHaldia Institute of TechnologyHaldiaIndia
  2. 2.Department of Information TechnologyNorth-Eastern Hill UniversityShillongIndia
  3. 3.Department of Computer Science and EngineeringUniversity of CalcuttaKolkataIndia

Personalised recommendations