Fortified Multimedia Application

Akhand Pratap Singh

Abstract


The project entitled Fortified Multimedia Application is the application developed to embed an video file in another video signal. It is concerned with embedding information in an innocuous cover Speech in a secure and robust manner. This system makes the Files more secure by using the concepts Steganography and Cryptography.

Steganography, poor cousin of Cryptography is the art of hiding messages inside other messages such that the very existence of the message is unknown to third party. The goal of cryptography is to make data unreadable by a third party, the goal of Steganography is to hide the data from a third party Through the use of advanced computer software, authors of images and software can place a hidden trademark in their product, allowing them to keep a check on piracy. This is commonly known as watermarking. Hiding serial numbers or a set of characters that distinguishes an object from a similar object is known as finger printing. Together, these two are intended to fight piracy. The latter is used to detect copyright violators and the former is used to prosecute them. But these are only examples of the much wider field of Steganography.

The cover data should not be significantly degraded by the embedded data, and the embedded data should be as imperceptible as possible. The embedded data should be as immune as possible to modifications from intelligent attacks or anticipated manipulations. Thus it is necessary that the hidden message should be encrypted.


Keywords


Cryptography , Steganography , Encryption.

Full Text:

PDF

References


R.C. Merkle and M. Hellman, Hiding Information and Signatures in Trap Door Knapsacks, IEEE Trans. Inform. Theory, vol 24 1978,pp 525-530.

R. L. Rivest, A Shamir and L. Adleman, A method for obtaining digital signatures and publickey cryptosystems, Communications of the Association for Computing Machinery, vol 21,no.2, pp 120-126.

W. Diffie and M. E. Hellman, New direction in cryptography, IEEE Transactions on Information Theory, vol. IT- 22 ,no. 6,pp.644-654.K. Elissa,

Souvik Bhattacharyya. andGautamSanyal. Study of secure Steganography model In Proceedings of International Conference on Advanced Computing and Communication

Technologies (ICACCT-2008), Panipath , India 2008.

G. Simmons, The prisoners problem and the subliminal channel, CRYPTO, 1983

Souvik Bhattacharyya. andGautamSanyal. An Image Based Steganography Model for Promoting Global Cyber Security. In Proceedings of International Conference on Systemics, Cybernetics and Informatics, Hyderabad, India , 2009.

K. Ahsan and D. Kundur, Practical Data hiding in TCP/IP, Proceedings of the workshop on Multimedia security at ACM Multimedia, 2002

J.Silman, Steganography and Steganalysis: An Overview, SANS Institute, 2001

Y.K. Lee and L.H. Chen, High capacity image steganographic model, Visual Image Signal Processing,147: 03, June 2000






Copyright (c) 2014 Akhand Pratap Singh

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

 

All published Articles are Open Access at  https://journals.pen2print.org/index.php/ijr/ 


Paper submission: ijr@pen2print.org