Page 15 - bookofabstract_vj5_final(1)
P. 15

Optimized Data Hiding in Complemented or Non- Complemented Form in Video

                                                      Steganography


                        Samar Kamil, Masri Ayob, Siti Norul Huda Sheikh Abdullah & Zulkifli Ahmad


                                                          Abstract



               Optimal match in the cover media was found to be effective for accurate data hiding and
               improving  the  visual  quality  of  steganography  algorithms.  Lately,  several  optimized
               steganography algorithms including least significant bit (LSB) match, genetic algorithm
               (GA), particle swarm optimization (PSO) were developed for cloud data security against
               possible attacks. Although these algorithms can search optimal bits match in the cover
               media  to  hide  the  secret  data  precisely  with  less  variability,  the  techniques  consume
               computational time. Therefore, this paper proposed a steganography technique which
               can achieve almost zero variability and very low computational time. The data hiding of
               secret  data  bits  in  complemented  or  non-complemented  forms  were  achieved  and
               optimized  by  using  video  steganography.  Furthermore,  the  indexes  for  the
               complemented  or  non-complemented  form  were  hidden  in  the  covered  frame.  This
               allowed information to be conveyed efficiently to the receiver when extracting the secret
               messages.  The  performance  of  the  proposed  algorithm  was  assessed  using  various
               parameters such as peak signal to noise ratio (PSNR), embedding capacity, normalized
               cross-  correlation,  average  difference  and  normalized  absolute  error.  The  Results
               revealed that the proposed steganography system is superior compared to the existing
               state  of  the  art  techniques.  The  developed  algorithm  was  established  to  be  greatly
               effective for video data security management in cloud computing.















                                                                                                           11
   10   11   12   13   14   15   16   17   18   19   20