Document Type : Research Paper
Authors
1 Department of Roads and Transport Engineering, College of Engineering, University of Al-Qadisiyah, Al-Qadisiyah, Iraq
2 Department of Electrical and Communication Engineering, College of Engineering, University of Al- Qadisiyah, Al-Qadisiyah, Iraq
3 School of Digital Forensics and Cyber Security, National Forensic Sciences University Gandhinagar, India
Abstract
Steganography is essential in modern cryptography and communications, enhancing the security and confidentiality of sensitive data exchanges. It has become an interesting tool because not only have security requirements for secret messages become stronger, but video has also become more popular. This paper introduces an advanced method combining sequence-to-sequence transformer models for speech recognition, RC4 encryption, and the Least Significant Bit (LSB) technique for data embedding in videos. The approach securely embeds audio messages within video streams, ensuring that even if detected, the data remains inaccessible without the decryption key. Our methodology includes converting audio to text, encrypting it, and embedding the encrypted data into video files, with a subsequent recovery process that preserves the original audio's emotional and tonal qualities. Evaluations using the UCF101 dataset confirm the method's effectiveness in maintaining video quality, with minimal visual distortion, and robust data security. This research provides a secure framework for covert communication, with potential applications in areas requiring high-level data privacy.
Keywords
- M. Amin, M. Salleh, S. Ibrahim, M. R. Katmin and M. Z. I. Shamsuddin, "Information hiding using steganography," 4th National Conference of Telecommunication Technology, 2003. NCTT 2003 Proceedings., Shah Alam, Malaysia, 2003, pp. 21-25. https://ieeexplore.ieee.org/document/1188294
- N. Bangera, N. S. Reddy, Y. Paddambail and G. Shivaprasad, "Multilayer security using RSA cryptography and dual audio steganography", in 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), Bangalore, India, 2017. https://ieeexplore.ieee.org/document/8256645
- El-Khamy, S.E., Korany, N.O. & El-Sherif, M.H. "A security enhanced robust audio steganography algorithm for image hiding using sample comparison in discrete wavelet transform domain and RSA encryption". Multimed Tools Appl 76, 24091–24106 (2017). https://doi.org/10.1007/s11042-016-4113-8
- M. S. ,. M. A. R. Sazeen T. Abdulrazzaq, "A novel steganography approach for audio files," SN Computer Science, vol. 1, pp. 1-13, 2020. https://doi.org/10.1007/s42979-020-0080-2
- Artz, "Digital steganography: hiding data within data.," IEEE Internet computing, vol. 5, no. 3, pp. 75-80, 2001. https://doi.org/10.1109/4236.935180
- A. M. H. A.-H. A. M. N. Al-Taweel, "Image in image steganography technique based on arnold transform and LSB algorithms," International Journal of Computer Applications, vol. 181, no. 10, pp. 32-39, 2018. https://www.ijcaonline.org/archives/volume181/number10/altaweel-2018-ijca-917652.pdf
- L. A. W. O. Nyo, "Secure data transmission of video steganography using Arnold scrambling and DWT," International Journal of Computer Network and Information, vol. 9, no. 6, p. 45, 2019. https://doi.org/10.5815/ijcnis.2019.06.06
- A. N. M. S. Mudusu, "Enhancing Data Security Using Audio-Video Steganography," International Journal of Engineering & Technology, vol. 7, no. 2.20, pp. 276-279, 2018. https://doi.org/10.14419/ijet.v7i2.20.14777
- K. ,. P. S. Shivani Gupta, "Video Steganography Using Discrete Wavelet Transform and Artificial Intelligence," International Journal of Trend in Scientific Research and Development (IJTSRD), vol. 3, no. 4, pp. 1210- 1215, May-Jun 2019. https://www.ijtsrd.com/papers/ijtsrd25067.pdf
- Patel and M. Patel, "Steganography over video file by hiding video in another video file, random byte hiding and LSB technique," 2014 IEEE International Conference on Computational Intelligence and Computing Research, Coimbatore, India, 2014, pp. 1-5. https://doi.org/10.1109/ICCIC.2014.7238343
- L. Y. W. H. Z. S. L. Yunxia Liu*, "Video Steganography: A Review," Neurocomputing, vol. 335, pp. 238-250, 2019. https://doi.org/10.1016/j.neucom.2018.09.091
- S. K. ,. M. G. M. M. Mennatallah M. Sadek, "Video steganography: a comprehensive review," Multimedia Tools and Applications, vol. 74, pp. 7063-7094, 2015. https://doi.org/10.1007/s11042-014-1952-z
- W. P., R. E. S. Aryfandy Febryan, "Steganography Methods on Text, Audio, Image and Video: A Survey," International Journal of Applied Engineering Research, vol. 12, no. 21, pp. 10485-10490, 2017. https://www.ripublication.com/ijaer17/ijaerv12n21_04.pdf
- B. Navneet Kaur*, "Audio Steganography Techniques-A Survey," Journal of Engineering Research and Applications, vol. 4, no. 6, pp. 94-100, June 2014. https://doi.org/10.1007/978-981-10-3773-3_56
- A. A. Eng. Saad Nasser Al.Azzam, "Survey steganography applications," Al-Salam Journal for Engineering and Technology, vol. 2, no. 1, pp. 69-75, 2023. https://doi.org/10.55145/ajest.2023.01.01.008
- M. S. ,. M. A. R. Sazeen T. Abdulrazzaq, "A novel steganography approach for audio files," SN Computer Science, vol. 1, pp. 1-13, 2020. https://doi.org/10.1007/s42979-020-0080-2
- A. K. A. M. H. H. Fatiha Djebbar, "Comparative study of digital audio steganography techniques," EURASIP Journal on Audio, Speech, and Music Processing, vol. 1, pp. 1-16, 2012. https://doi.org/10.1186/1687-4722-2012-25
- V.-M. ,. L. N. d. R. ,. P. S. Hernandez-Garay, "Steganographic communication channel using audio signals," in 12th International Conference on Mathematical Methods in Electromagnetic Theory, Odessa, UKraine, 2008. https://doi.org/10.1109/MMET.2008.4581017
- L. W. B. Daniel Gruhl, "Echo Hiding," First International Workshop Cambridge, UK, pp. 296-315, 1996. https://doi.org/10.1007/3-540-61996-8_48
- E. ,. M. O. T. Morkel, "An Overview of Image Steganography," InISSA, vol. 1, no. 2, pp. 1-11, 2005. https://martinolivier.com/open/stegoverview.pdf
- Cheddad, A., Condell, J., Curran, K., & Mc Kevitt, P. (2010). "Digital image steganography: Survey and analysis of current methods". Signal processing, 90(3), 727-752. https://doi.org/10.1016/j.sigpro.2009.08.010
- M. J. B. J. F. T. K. Ingemar Cox, "Digital watermarking and steganography". Morgan kaufmann., 2007. https://papersim.com/wp-content/uploads/Ref.pdf
- P. ,. P. J. V. ,. B. H. Inas Jawad Kadhim, "Comprehensive survey of image steganography: Techniques, Evaluations, and Evaluations, and trends in future research," Neurocomputing, vol. 335, pp. 299-326, 2019. https://doi.org/10.1016/j.neucom.2018.06.075
- S. ,. Z. S. ,. K. H. Mohammed Abdul Majeed, "A Review on Text Steganography Techniques," Mathematics, vol. 9, no. 21, p. 2829, 2021. https://doi.org/10.3390/math9212829
- B. M. Y. Yee Lip Por, "Information hiding: A new approach in text steganography," in In Proceedings of the International Conference on Applied Computer and Applied Computational Science, World Scientific and Engineering Academy and Society (WSEAS 2008), Hangzhou, China, 2008. https://www.academia.edu/1491402/Information_Hiding_A_New_Approach_in_Text_Steganography
- Radford, A., Kim, J. W., Xu, T., Brockman, G., McLeavey, C., & Sutskever, I. (2023, July). "Robust speech recognition via large-scale weak supervision". In International Conference on Machine Learning (pp. 28492-28518). PMLR.https://doi.org/10.48550/arXiv.2212.04356
- Basu, R., Ganguly, S., Maitra, S., & Paul, G. (2008). "A complete characterization of the evolution of RC4 pseudo random generation algorithm". Journal of Mathematical Cryptology, 2(3), 257-289.https://doi.org/10.1515/JMC.2008.012
- Jindal, P., & Singh, B. (2015). RC4 encryption-A literature survey. Procedia Computer Science, 46, 697-705. https://doi.org/10.1016/j.procs.2015.02.129
- Qin, Z., Zhao, W., Yu, X., & Sun, X. (2023). "OpenVoice: Versatile Instant Voice Cloning". arXiv preprint arXiv:2312.01479. https://doi.org/10.48550/arXiv.2312.01479
- Soomro, K., Zamir, A. R., & Shah, M. (2012). "UCF101: A dataset of 101 human actions classes from videos in the wild". arXiv preprint arXiv:1212.0402.
https://doi.org/10.48550/arXiv.1212.0402 - Cho, Hyunjong, Hyungtae Lee, and Zhuolin Jiang. "Evaluation of LC-KSVD on UCF101 action dataset." THUMOS: ICCV workshop on action recognition with a large number of classes. Vol. 7. 2013. https://www.crcv.ucf.edu/THUMOS14/index.files/NotebookPapers13/Paper%2026%20(Supplementary).pdf
- Ramesh, M., & Mahesh, K. (2019). "Sports video classification with deep convolution neural network: a test on UCF101 dataset". International Journal of Engineering and Advanced Technology, 8(4S2), 2249-8958. DOI: 10.35940/ijeat.D1007.0484S219