SlideShare a Scribd company logo
TELKOMNIKA, Vol.17, No.3, June 2019, pp.1417~1424
ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, Decree No: 21/E/KPT/2018
DOI: 10.12928/TELKOMNIKA.v17i3.9513  1417
Received April 6, 2018; Revised January 28, 2019; Accepted February 12, 2019
Optimization of video steganography with additional
compression and encryption
Dwi Arraziqi*1
, Endi Sailul Haq2
1
STIKOM PGRI Banyuwangi/Department of Informatics Engineering, Banyuwangi, Indonesia
2
State Politechnic of Banyuwangi/Department of Informatics Engineering, Banyuwangi Indonesia
*Corresponding author, e-mail: dwi.arraziqi@stikombanyuwangi.ac.id1
, endi@poliwangi.ac.id2
Abstract
Currently, data such as text, images and video are very important. Therefore, data must be
secured from unauthorized parties. In this paper, we propose a number of security levels, first using
compression techniques on the data that will be hidden to reduce the size of the data, second using
encryption techniques on data that has been compressed so that data is more secure, third using video
steganography techniques on compressed and encrypted data so that unauthorized parties are
increasingly difficult to extract data. Measurement of differences in quality of cover-video and stego-video
using MSE (Mean Square Error), PSNR (Peak Signal to Noise Ratio), evolution histogram of video tags,
and video playback. The results show that the proposed algorithm gives better results than the previous
algorithm which has a smaller MSE, larger PSNR, smaller histogram evolution of video tags, and play
video without distortion.
Keywords: compression, distribution, encryption, PSNR, steganography
Copyright © 2019 Universitas Ahmad Dahlan. All rights reserved.
1. Introduction
Nowadays the development of communication network technology is very fast which
makes information exchange very easy. Information is the wealth of an organization that must
be sent safely through an unsecured communication network. Steganography serves to guard
from extracting confidential information by unauthorized parties. Steganography is the art of
hiding confidential information into cover media where the unauthorized party is very difficult to
detect the existence of confidential information [1-28]. Recently, many data hiding algorithms
have been developed on FLV [1, 2, 5, 6]. Data hiding is very important in identification,
authentication, and copyright protection of digital media [1]. Sometimes confidential information
has a size that larger than the cover media, cause distortion in the cover media. This can cause
suspicion by unauthorized parties to the existence of confidential information. These problems
can be minimized by compression.
Compression is the conversion of input data streams into other data streams that have
a smaller size [29]. Stream can be a file, buffer in memory, or individual bits sent. Compression
on confidential information can reduce file size [8, 12-14, 17, 19, 23, 24, 26, 27]. So that
confidential information is much safer, encryption needs to be done [7-9, 11, 13-16,18, 20-22,
24, 25, 28]. Encryption is an algorithm that performs various substitutions and transforms the
plaintext [30]. The original information is called plainteks while the encrypted form is called
chipertext. Original information that has become a chiperteks has a high level of security [9].
Chipertext is divided and distributed at the end of each video tag evenly so that it has a layered
security level.
The structure of FLV file consists of a short header, followed by a meta tag and then
alternates between the audio tag and the video tag as shown in Figure 1 [1, 5, 6]. The header
consists of 4 parts, the signature with the hex value "46 4c 56" which is translate to "FLV" in the
hex string value; version with hex values "01"; flags with hex values "04" (audio), "01" (video), or
"05" (audio + video); and offset the hex value "00 00 00 09". Meta tags, audio tags, and video
tags have the same 6 parts namely type, body length, timestamp, timestampextended,
streamed, and body (actual data). Type tags are 0x08 (audio), 0x09 (video), and 0x12 (meta).
 ISSN: 1693-6930
TELKOMNIKA Vol. 17, No. 3, June 2019: 1417-1424
1418
Figure 1. Structure of FLV file
Cruz et al. [1] discuss security for digital records through the application of
steganography. The proposed effective steganographic methods are as follows: (1) injection at
the EOF; (2) embedding at a video tag inside the FLV; (3) embedding at the metadata; and
(4) distributing the stego file among all of the video tags. Each method has its corresponding
strengths and weaknesses, and the stego FLVs created using the proposed techniques were
analyzed qualitatively by using auditory-visual perception tests and quantitatively by using video
tags evolution graphs and histograms and RGB averaging analysis.
The methods of hiding the stego file at the end of a video tag and distributing the stego
file among all of the video tags of a carrier are recommended as the most effective
steganographic methods for hiding information inside an FLV carrier for the following reasons:
(1) no noticeable distortions can be observed in the video and audio quality of the stego FLV,
making it looks like a typical FLV out in the open; (2) the stego file is hidden inside the FLV and
not at the EOF or header, making it less prone to suspicion or attack; (3) the stego file cannot
be altered even if the stego FLV is converted to a different file format and when its header or
metadata is changed or removed; (4) checking for suspicious content (the video tags evolutions
and histograms) via software, such as automated FLV analysis software, is difficult for a typical
third party or observer who obtains the stego FLV.
Mozo et al. [2] presented his experiments on how FLV file structures can be
manipulated to store confidential data. The FLV file characteristics can store all of data types in
it and extract the same hidden information. Embedding data is safer at the end of the video tag.
Very promising results include lossless compression, perfect original images and sound quality
when modified FLV is transferred via the internet. The application has been applied to medical
privacy records. Chang et al. [3] presented a data hiding algorithm using the (Discrete Sine
Transform) DCT and (Discrete Cosine Transform) DST method in High-Efficiency Video Coding
(HEVC). HEVC intra coded frame is used to hide data without spreading errors from
neighboring blocks. Blocks from the quantized DCT (QDCT) and DST coefficients are selected
to hide confidential data using specific intra prediction mode. The combination modes from
neighboring blocks will produce three patterns of error distribution direction from data hiding
consisting of vertical, horizontal, and diagonal. Each error distribution pattern has a range of
intra prediction modes that protect a group of pixels in a particular direction. Range starts at 0
and ends 34.
Ma et al. [4] presented a data hiding algorithm using the QDCT (Quantized Discrete
Cosine Transform) method in H.264/advanced video coding (AVC). To maintain the spread of
distortion, the author has developed three conditions to determine the direction of intraframe
prediction modes. Several paired coefficients from the 4x4 DCCT block to accumulate
embedding that cause distortion. The proposed method can achieve low visual distortion.
However, this method has the disadvantage of low insertion capacity because data hiding is
TELKOMNIKA ISSN: 1693-6930 
Optimization of video steganography with additional compression and encryption (Dwi Arraziqi)
1419
only carried out on luminance from the block intraframe that meets the three
selected conditions.
2. Research Method
2.1. Specification of Cover FLV
The specifications of the cover FLV include duration, width, height, frame rate, video
codec, audio codec, size, number of video tag, number of audio tag, and average body length of
video tag as shown in Table 1. Cover FLV are used 1.flv, 2.flv, and 3.flv. Cover FLV is obtained
from the internet.
Table 1. Specification of Cover FLV
Cover FLV 1.flv 2.flv 3.flv
Duration 00:16 00:06 00:18
Width 360 480 300
Height 288 320 240
Frame Rate 25 29.916 25
Video Codec On2 VP6 Sorenson’s H.263 Sorenson’s H.263
Audio Codec MPEG layer 3 MPEG layer 3 MPEG layer 3
Size (byte) 669036 626325 773575
Number of audio tag 649 234 693
Number of video tag 424 185 451
Average body length of video tag (byte) 1337 3084 1352
2.2. Proposed Algorithm
The proposed algorithm is the development of the previous algorithm [1]. The algorithm
previously [1] said that the distribution of secret data at the end of the video tags is the best
steganography algorithm in FLV. The proposed algorithm adds a compression and encryption
algorithm to secret data before being distributed. There are 2 proposed algorithms, embedding
and extracting algorithms. Embedding algorithm is an algorithm that embeds secret data into the
cover video so that it produces stego video. Extracting algorithm is an algorithm that extracts
secret data from stego video. Design of embedding algorithm as shown in Figure 2.
The algorithm process is explained as follows:
- Determine secret data and cover FLV.
- Split the cover FLV so that it produces frames (video tags) and audio tags.
- Compress secret data using ZIP algorithm.
- Encrypt secret data that has been compressed using AES algorithm.
- Embed secret data that has been compressed and encrypted at the end of the frame evenly
- Merge between non stego frames, stego frames, and audio tags so as to produce
stego FLV.
Figure 2. Design of embedding algorithm
 ISSN: 1693-6930
TELKOMNIKA Vol. 17, No. 3, June 2019: 1417-1424
1420
Design of extracting algorithm as shown in Figure 3. The algorithm process is explained
as follows:
- Determine cover FLV and stego FLV.
- Split cover FLV and stego FLV to produce frames (video tags) and audio tags.
- Subtract frames between stego FLV with cover FLV generating secret data that has been
compressed and encrypted.
- Decrypt secret data that has been compressed and encrypted using the AES algorithm to
produce secret data that has been compressed.
- Decompress secret data that has been compressed using the ZIP algorithm to generate
secret data.
Figure 3. Design of extracting algorithm
3. Results and Analysis
Several trials were conducted to prove the video quality of the proposed algorithm
compared to the previous algorithm [1]. Quality measurement is very difficult to use
the naked eye. Two commonly used quality measurements are MSE and PSNR
[7-10, 12, 14, 16, 18, 20, 22-25, 27]. Other quality measurements are playback and histogram of
the video tag evolution. PSNR is a comparison between the maximum value of a signal
measured by the amount of noise that affects the signal. PSNR is usually measured in
decibels (dB). PSNR is used to find out the FLV cover quality comparison with FLV stego. To
determine the PSNR, the MSE value (Mean Square Error) must first be determined as given
in (2). MSE is the error value of the average square between FLV cover and FLV stego as
given in (1).
𝑀𝑆𝐸 =
1
𝑀∗𝑁
∑ ∑ [𝐶(𝑖, 𝑗) − 𝑆(𝑖, 𝑗)]2𝑁
𝑗=1
𝑀
𝑖=1 (1)
where, M is the row while N is the column. C (i, j) is the pixel value of FLV cover in row i and
column j. S (i, j) is the pixel value of FLV stego in row i and column j.
𝑃𝑆𝑁𝑅 = 10 ∗ log (
𝑃2
𝑀𝑆𝐸
) (2)
where, P = max(C(i,j), S(i,j)).
TELKOMNIKA ISSN: 1693-6930 
Optimization of video steganography with additional compression and encryption (Dwi Arraziqi)
1421
3.1. Based on MSE and PSNR
The proposed algorithm has better quality than the previous algorithm [1] as shown
in Table 2. The proposed algorithm has a smaller MSE value. The proposed algorithm also has
a greater PSNR value. The smaller the MSE value means the better the quality. The greater the
value of the PSNR means the better the quality.
Table 2. Comparison of Proposed Algorithm with Previous Algorithm
Cover
FLV
Screet
data and
size
Method
ZIP
compressi
on (byte)
AES
encryption
(byte)
The average that
was embedded to
the video tag (byte)
MSE
PSNR
(dB)
1.flv
Test.accdb
839680
byte
The proposed algorithm 21538 21552 50 0 ∞
The previous algorithm 1980 0 ∞
2.flv
The proposed algorithm 21538 21552 116 0 ∞
The previous algorithm 4538 309 23
3.flv
The proposed algorithm 21538 21552 47 0 ∞
The previous algorithm 1861 880 18
3.2. Based on Histogram of The Video Tag Evolution
The proposed algorithm has better quality with the previous algorithm [1] as shown in
Figure 4. Figure 4 (a) is a comparison of the histogram evolution of video tags from cover FLV
(1.flv), stego FLV from proposed algorithm, and stego FLV from previous algorithm [1].
Figure 4 (b) is a comparison of histogram evolution of video tags from cover FLV (2.flv), stego
FLV from proposed algorithm, and stego FLV from previous algorithm [1]. Figure 4 (c) is a
comparison of histogram evolution tag video from cover FLV (3.flv), stego FLV from proposed
algorithm, and stego FLV from previous algorithm [1]. The x axis is the order of the video tag
while the y axis is the number of data (bytes) of the video tag. The proposed algorithm has a
smaller evolution of video tags means the better the quality.
Figure 4. Histogram evolution of video tags from the proposed algorithm; previous algorithm;
and cover FLV (a) 1.flv, (b) 2.flv, (c) 3.flv
 ISSN: 1693-6930
TELKOMNIKA Vol. 17, No. 3, June 2019: 1417-1424
1422
3.3.Based on Playback
The proposed algorithm has the same good quality as the previous algorithm [1] as
shown in Figure 5. Figure 5 (a) is a screenshot of cover FLV (1.flv). Figure 5 (b) is a FLV stego
screenshot from the previous algorithm [1]. Figure 5 (c) is a FLV stego screenshot of the
proposed algorithm. If we look at the naked eye at 10th second, there is no distortion seen from
either the previous algorithm [1] or the proposed algorithm.
(a) (b) (c)
Figure 5. (a) Screenshots from the Cover FLV 1.flv;
(b) Stego FLV from previous algorithm and; (c) Stego FLV from proposed algorithm
The proposed algorithm has has better quality than the previous algorithm [1] as shown
in Figure 6. Figure 6 (a) is a screenshot of cover FLV (2.flv). Figure 6 (b) is a FLV stego
screenshot from the previous algorithm [1]. Figure 6 (c) is a FLV stego screenshot of the
proposed algorithm. If we look at the naked eye at 3th second, there is no distortion seen from
the proposed algorithm while the previous algorithm [1] looks distortion. The proposed algorithm
has has better quality than the previous algorithm [1] as shown in Figure 7. Figure 7 (a) is a
screenshot of cover FLV (3.flv). Figure 7 (b) is a FLV stego screenshot from the previous
algorithm [1]. Figure 7 (c) is a FLV stego screenshot of the proposed algorithm. If we look at the
naked eye at 9th second, there is no distortion seen from the proposed algorithm while the
previous algorithm [1] looks distortion.
(a) (b) (c)
Figure 6. (a) Screenshots from the cover FLV 2.flv; (b) Stego FLV from previous algorithm, and
(c) Stego FLV from proposed algorithm
TELKOMNIKA ISSN: 1693-6930 
Optimization of video steganography with additional compression and encryption (Dwi Arraziqi)
1423
(a) (b) (c)
Figure 7. (a) Screenshots from the Cover FLV 3.flv, (b) Stego FLV from previous algorithm, and
(c) Stego FLV from proposed algorithm
4. Conclusion
The proposed algorithm has better quality both in terms of security and video quality. In
terms of security, the proposed algorithm encrypts confidential data using the AES algorithm. In
terms of video quality, FLV stego from the proposed algorithm has a smaller MSE, a larger
PSNR, smaller histogram evolution of video tags, and plays videos without distortion. For the
next research, the process of embedding secret data is done randomly so that secret data is
more secure.
References
[1] Cruz JP, Libatique NJ, Tangonan G. Steganography and data hiding in flash video (FLV). TENCON
2012 IEEE Region 10 Conference. Cebu. 2012: 1-6.
[2] Mozo AJ, Obien ME, Rigor CJ, Rayel DF, Chua K,Tangonan G. Video steganography using Flash
Video (FLV). 2009 IEEE Instrumentation and Measurement Technology Conference. Singapore.
2009: 822-827.
[3] Chang PC, Chung KL, Chen JJ, Lin CH, Lin TJ. A Dct/Dst-Based Error Propagation-Free Data Hiding
Algorithm for Hevc Intra-Coded Frames. Journal of Visual Communication and Image
Representation. 2014; 25(2): 239-253.
[4] Ma X, Li Z, Tu H, Zhang B. A Data Hiding Algorithm for H.264/Avc Video Streams without Intra-
Frame Distortion Drift. IEEE Transactions on Circuits and Systems for Video Technology. 2010;
20(10): 1320-1330.
[5] Bawaneh MJ, Obeidat AA, M.Al-kofahi M. An Adaptive FLV Steganography Approach Using
Simulated Annealing. International Journal of Communication Networks and Information Security.
2018; 10(1): 56-66.
[6] Atiea MA, Mahdy YB, Hedar AR. Hiding data in FLV video file. Advances in Intelligent and Soft
Computing. 2012; 167: 919-925.
[7] Jothimani S, Shaheen H. Securing Video files using Steganography Method in Android Mobile.
International Journal of Scientific and Engineering Research. 2016; 7(4): 46-49.
[8] Sarmah DK, Kulkarni AJ. Improved Cohort Intelligence-A high capacity, swift and secure approach
on JPEG image steganography. Journal of Information Security and Applications. 2019; 45: 90-106.
[9] Pandey A, Singh B, Saini BS, Sood N. A novel fused coupled chaotic map based confidential data
embedding-then-encryption of electrocardiogram signal. Biocybernetics and Biomedical Engineering.
2018: 1-19.
[10] Liu Y, Liu S, Wang Y, Zhao H, Liu S. Video steganography: A review. Neurocomputing. 2018.
[11] Chikouche, SL, Chikouche N. An improved approach for lsb-based image steganography using AES
algorithm. 2017 5th International Conference on Electrical Engineering-Boumerdes (ICEE-B).
Boumerdes. 2017: 1-6.
[12] Khan S, Irfan MA, Ismail M, Khan T, Ahmad N. Dual lossless compression based image
steganography for low data rate channels. 2017 International Conference on Communication
Technologies (ComTech). Rawalpindi. 2017: 60-64.
[13] Malathi M, Rahul M, Kumar NS., Thamaraiselvan R. Enhanced image steganography using AES
& SPIHT compression. 2017 International Conference on Innovations in Information,
Embedded and Communication Systems (ICIIECS). Coimbatore. 2017: 1-5.
 ISSN: 1693-6930
TELKOMNIKA Vol. 17, No. 3, June 2019: 1417-1424
1424
[14] Mumthas S, Lijiya A. Transform Domain Video Steganography Using RSA, Random DNA Encryption
and Huffman Encoding. Procedia Computer Science. 2017; 115(C): 660-666.
[15] Prasetyadi GC, Mutiara AB, Refianti R. File encryption and hiding application based on advanced
encryption standard (AES) and append insertion steganography method. 2017 Second International
Conference on Informatics and Computing (ICIC). Jayapura. 2017: 1-5.
[16] Houssein EH, Ali MAS, Hassanien AE. An image steganography algorithm using Haar Discrete
Wavelet Transform with Advanced Encryption System. 2016 Federated Conference on Computer
Science and Information Systems (FedCSIS). Gdansk. 2016: 641-644.
[17] Dhanawe SA., Doshi SV. Hiding file on Android mobile and sending APK file through whatsapp using
steganography and compression techniques. 2016 International Conference on Signal Processing,
Communication, Power and Embedded System (SCOPES). Paralakhemundi. 2016:
106-110.
[18] Jain M, Lenka SK, Vasistha SK. Adaptive circular queue image steganography with RSA
cryptosystem. Perspectives in Science. 2016; 8: 417-420.
[19] Malik A, Sikka G, Verma HK. A high capacity text steganography scheme based on LZW
compression and color coding. Engineering Science and Technology, an International Journal. 2017;
20(1): 72-79.
[20] Muhammad K, Sajjad M, Mehmood I, Rho S, Baik SW. Image steganography using uncorrelated
color space and its application for security of visual contents in online social networks. Future
Generation Computer Systems. 2018; 86: 951-960.
[21] Reddy MIS, Kumar APS. Secured Data Transmission Using Wavelet Based Steganography and
Cryptography by Using AES Algorithm. Procedia Computer Science. 2016; 85: 62-69.
[22] Sabnis SK, Awale RN. Statistical Steganalysis of High Capacity Image Steganography with
Cryptography. Procedia Computer Science. 2016; 79: 321-327.
[23] Tang M, Zeng S, Chen X, Hu J, Du Y. An adaptive image steganography using AMBTC compression
and interpolation technique. Optik. 2016; 127(1): 471-477.
[24] Mishra R, Mishra A, Bhanodiya P. An edge based image steganography with compression and
encryption. 2015 International Conference on Computer, Communication and Control (IC4). Indore.
2015: 1-4.
[25] Xiang T, Hu J, Sun J. Outsourcing chaotic selective image encryption to the cloud with
steganography. Digital Signal Processing. 2015; 43(C): 28-37.
[26] Zhang Y, Luo X, Yang C, Ye D, Liu F. A JPEG-Compression Resistant Adaptive Steganography
Based on Relative Relationship between DCT Coefficients. 2015 10th
International Conference on
Availability, Reliability and Security. Toulouse. 2015: 461-466.
[27] Lin CY, Wu SC, Wang JJ. VQ Image Compression Steganography Based on Section-Based
Informed Embedding. 2014 International Symposium on Computer, Consumer and Control.
Taichung. 2014: 111-114.
[28] Ren-Er Y, Zhiwei Z, Shun T, Shilei D. Image Steganography Combined with DES Encryption
Pre-processing. 2014 Sixth International Conference on Measuring Technology and Mechatronics
Automation. Zhangjiajie. 2014: 323-326.
[29] Salomon D, Motta G. Data Compression the Complete Reference. Fifth Edition. New York:
Springer. 2010.
[30] Stallings W. Cryptography and Network Security Principles and Practice. Sixth Edition. New York:
Prentice Hall. 2014.

More Related Content

PDF
H41034449
PDF
S4501105108
PDF
A Study on Video Steganographic Techniques
PDF
Review of Role of Digital Video in Information Security
PDF
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
PDF
Dynamic selection of symmetric key cryptographic algorithms for securing data...
PPTX
Audio steganography project presentation
PDF
International Journal of Engineering Research and Development (IJERD)
H41034449
S4501105108
A Study on Video Steganographic Techniques
Review of Role of Digital Video in Information Security
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
Dynamic selection of symmetric key cryptographic algorithms for securing data...
Audio steganography project presentation
International Journal of Engineering Research and Development (IJERD)

What's hot (20)

PDF
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
PDF
Audio video steganography using forensic techniquefor data security
PPT
Steganography
PDF
Sample projectdocumentation
PDF
PDF
ADVANCED LSB TECHNIQUE FOR AUDIO STENOGRAPHY
PPTX
Steganography
PDF
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
PDF
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
PDF
A Novel IP Traceback Scheme for Spoofing Attack
PDF
Ijmet 10 01_020
PDF
File000133
PDF
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
PDF
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
PDF
B03208016
PDF
It3116411644
PDF
International Journal of Engineering Research and Development
PDF
PDF
Stegonoraphy
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
Audio video steganography using forensic techniquefor data security
Steganography
Sample projectdocumentation
ADVANCED LSB TECHNIQUE FOR AUDIO STENOGRAPHY
Steganography
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
A Novel IP Traceback Scheme for Spoofing Attack
Ijmet 10 01_020
File000133
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
B03208016
It3116411644
International Journal of Engineering Research and Development
Stegonoraphy
Ad

Similar to Optimization of video steganography with additional compression and encryption (20)

PDF
B018131117
PDF
V01 i010410
PDF
Audio-video Crypto Steganography using LSB substitution and advanced chaotic ...
PDF
Video steganography based on DCT psychovisual and object motion
PDF
International Refereed Journal of Engineering and Science (IRJES)
PPTX
Fyp1 slide presentation 2.1
PPTX
Fyp1 slide presentation 2.1
PPTX
Fyp1 slide presentation 2
PDF
Understanding Image Steganography with Practical Approach
PDF
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
PDF
Information hiding in edge location of video using amalgamate fft and cubic s...
PPTX
DATA HIDING IN ENCRYPTED H.264 VIDEO FORMAT
PDF
PPTX
Data Security Using Steganography
PDF
G044082934
PDF
P0460594100
PDF
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
PDF
Secure Image Hiding Algorithm using Cryptography and Steganography
PDF
Survey Paper on Steganography
B018131117
V01 i010410
Audio-video Crypto Steganography using LSB substitution and advanced chaotic ...
Video steganography based on DCT psychovisual and object motion
International Refereed Journal of Engineering and Science (IRJES)
Fyp1 slide presentation 2.1
Fyp1 slide presentation 2.1
Fyp1 slide presentation 2
Understanding Image Steganography with Practical Approach
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
Information hiding in edge location of video using amalgamate fft and cubic s...
DATA HIDING IN ENCRYPTED H.264 VIDEO FORMAT
Data Security Using Steganography
G044082934
P0460594100
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
Secure Image Hiding Algorithm using Cryptography and Steganography
Survey Paper on Steganography
Ad

More from TELKOMNIKA JOURNAL (20)

PDF
Earthquake magnitude prediction based on radon cloud data near Grindulu fault...
PDF
Implementation of ICMP flood detection and mitigation system based on softwar...
PDF
Indonesian continuous speech recognition optimization with convolution bidir...
PDF
Recognition and understanding of construction safety signs by final year engi...
PDF
The use of dolomite to overcome grounding resistance in acidic swamp land
PDF
Clustering of swamp land types against soil resistivity and grounding resistance
PDF
Hybrid methodology for parameter algebraic identification in spatial/time dom...
PDF
Integration of image processing with 6-degrees-of-freedom robotic arm for adv...
PDF
Deep learning approaches for accurate wood species recognition
PDF
Neuromarketing case study: recognition of sweet and sour taste in beverage pr...
PDF
Reversible data hiding with selective bits difference expansion and modulus f...
PDF
Website-based: smart goat farm monitoring cages
PDF
Novel internet of things-spectroscopy methods for targeted water pollutants i...
PDF
XGBoost optimization using hybrid Bayesian optimization and nested cross vali...
PDF
Convolutional neural network-based real-time drowsy driver detection for acci...
PDF
Addressing overfitting in comparative study for deep learningbased classifica...
PDF
Integrating artificial intelligence into accounting systems: a qualitative st...
PDF
Leveraging technology to improve tuberculosis patient adherence: a comprehens...
PDF
Adulterated beef detection with redundant gas sensor using optimized convolut...
PDF
A 6G THz MIMO antenna with high gain and wide bandwidth for high-speed wirele...
Earthquake magnitude prediction based on radon cloud data near Grindulu fault...
Implementation of ICMP flood detection and mitigation system based on softwar...
Indonesian continuous speech recognition optimization with convolution bidir...
Recognition and understanding of construction safety signs by final year engi...
The use of dolomite to overcome grounding resistance in acidic swamp land
Clustering of swamp land types against soil resistivity and grounding resistance
Hybrid methodology for parameter algebraic identification in spatial/time dom...
Integration of image processing with 6-degrees-of-freedom robotic arm for adv...
Deep learning approaches for accurate wood species recognition
Neuromarketing case study: recognition of sweet and sour taste in beverage pr...
Reversible data hiding with selective bits difference expansion and modulus f...
Website-based: smart goat farm monitoring cages
Novel internet of things-spectroscopy methods for targeted water pollutants i...
XGBoost optimization using hybrid Bayesian optimization and nested cross vali...
Convolutional neural network-based real-time drowsy driver detection for acci...
Addressing overfitting in comparative study for deep learningbased classifica...
Integrating artificial intelligence into accounting systems: a qualitative st...
Leveraging technology to improve tuberculosis patient adherence: a comprehens...
Adulterated beef detection with redundant gas sensor using optimized convolut...
A 6G THz MIMO antenna with high gain and wide bandwidth for high-speed wirele...

Recently uploaded (20)

PPTX
Lecture Notes Electrical Wiring System Components
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
Safety Seminar civil to be ensured for safe working.
PPT
Project quality management in manufacturing
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
Current and future trends in Computer Vision.pptx
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPT
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
PPTX
Foundation to blockchain - A guide to Blockchain Tech
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
Sustainable Sites - Green Building Construction
DOCX
573137875-Attendance-Management-System-original
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPT
introduction to datamining and warehousing
Lecture Notes Electrical Wiring System Components
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Safety Seminar civil to be ensured for safe working.
Project quality management in manufacturing
OOP with Java - Java Introduction (Basics)
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Current and future trends in Computer Vision.pptx
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
Foundation to blockchain - A guide to Blockchain Tech
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
CYBER-CRIMES AND SECURITY A guide to understanding
Sustainable Sites - Green Building Construction
573137875-Attendance-Management-System-original
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
introduction to datamining and warehousing

Optimization of video steganography with additional compression and encryption

  • 1. TELKOMNIKA, Vol.17, No.3, June 2019, pp.1417~1424 ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, Decree No: 21/E/KPT/2018 DOI: 10.12928/TELKOMNIKA.v17i3.9513  1417 Received April 6, 2018; Revised January 28, 2019; Accepted February 12, 2019 Optimization of video steganography with additional compression and encryption Dwi Arraziqi*1 , Endi Sailul Haq2 1 STIKOM PGRI Banyuwangi/Department of Informatics Engineering, Banyuwangi, Indonesia 2 State Politechnic of Banyuwangi/Department of Informatics Engineering, Banyuwangi Indonesia *Corresponding author, e-mail: dwi.arraziqi@stikombanyuwangi.ac.id1 , endi@poliwangi.ac.id2 Abstract Currently, data such as text, images and video are very important. Therefore, data must be secured from unauthorized parties. In this paper, we propose a number of security levels, first using compression techniques on the data that will be hidden to reduce the size of the data, second using encryption techniques on data that has been compressed so that data is more secure, third using video steganography techniques on compressed and encrypted data so that unauthorized parties are increasingly difficult to extract data. Measurement of differences in quality of cover-video and stego-video using MSE (Mean Square Error), PSNR (Peak Signal to Noise Ratio), evolution histogram of video tags, and video playback. The results show that the proposed algorithm gives better results than the previous algorithm which has a smaller MSE, larger PSNR, smaller histogram evolution of video tags, and play video without distortion. Keywords: compression, distribution, encryption, PSNR, steganography Copyright © 2019 Universitas Ahmad Dahlan. All rights reserved. 1. Introduction Nowadays the development of communication network technology is very fast which makes information exchange very easy. Information is the wealth of an organization that must be sent safely through an unsecured communication network. Steganography serves to guard from extracting confidential information by unauthorized parties. Steganography is the art of hiding confidential information into cover media where the unauthorized party is very difficult to detect the existence of confidential information [1-28]. Recently, many data hiding algorithms have been developed on FLV [1, 2, 5, 6]. Data hiding is very important in identification, authentication, and copyright protection of digital media [1]. Sometimes confidential information has a size that larger than the cover media, cause distortion in the cover media. This can cause suspicion by unauthorized parties to the existence of confidential information. These problems can be minimized by compression. Compression is the conversion of input data streams into other data streams that have a smaller size [29]. Stream can be a file, buffer in memory, or individual bits sent. Compression on confidential information can reduce file size [8, 12-14, 17, 19, 23, 24, 26, 27]. So that confidential information is much safer, encryption needs to be done [7-9, 11, 13-16,18, 20-22, 24, 25, 28]. Encryption is an algorithm that performs various substitutions and transforms the plaintext [30]. The original information is called plainteks while the encrypted form is called chipertext. Original information that has become a chiperteks has a high level of security [9]. Chipertext is divided and distributed at the end of each video tag evenly so that it has a layered security level. The structure of FLV file consists of a short header, followed by a meta tag and then alternates between the audio tag and the video tag as shown in Figure 1 [1, 5, 6]. The header consists of 4 parts, the signature with the hex value "46 4c 56" which is translate to "FLV" in the hex string value; version with hex values "01"; flags with hex values "04" (audio), "01" (video), or "05" (audio + video); and offset the hex value "00 00 00 09". Meta tags, audio tags, and video tags have the same 6 parts namely type, body length, timestamp, timestampextended, streamed, and body (actual data). Type tags are 0x08 (audio), 0x09 (video), and 0x12 (meta).
  • 2.  ISSN: 1693-6930 TELKOMNIKA Vol. 17, No. 3, June 2019: 1417-1424 1418 Figure 1. Structure of FLV file Cruz et al. [1] discuss security for digital records through the application of steganography. The proposed effective steganographic methods are as follows: (1) injection at the EOF; (2) embedding at a video tag inside the FLV; (3) embedding at the metadata; and (4) distributing the stego file among all of the video tags. Each method has its corresponding strengths and weaknesses, and the stego FLVs created using the proposed techniques were analyzed qualitatively by using auditory-visual perception tests and quantitatively by using video tags evolution graphs and histograms and RGB averaging analysis. The methods of hiding the stego file at the end of a video tag and distributing the stego file among all of the video tags of a carrier are recommended as the most effective steganographic methods for hiding information inside an FLV carrier for the following reasons: (1) no noticeable distortions can be observed in the video and audio quality of the stego FLV, making it looks like a typical FLV out in the open; (2) the stego file is hidden inside the FLV and not at the EOF or header, making it less prone to suspicion or attack; (3) the stego file cannot be altered even if the stego FLV is converted to a different file format and when its header or metadata is changed or removed; (4) checking for suspicious content (the video tags evolutions and histograms) via software, such as automated FLV analysis software, is difficult for a typical third party or observer who obtains the stego FLV. Mozo et al. [2] presented his experiments on how FLV file structures can be manipulated to store confidential data. The FLV file characteristics can store all of data types in it and extract the same hidden information. Embedding data is safer at the end of the video tag. Very promising results include lossless compression, perfect original images and sound quality when modified FLV is transferred via the internet. The application has been applied to medical privacy records. Chang et al. [3] presented a data hiding algorithm using the (Discrete Sine Transform) DCT and (Discrete Cosine Transform) DST method in High-Efficiency Video Coding (HEVC). HEVC intra coded frame is used to hide data without spreading errors from neighboring blocks. Blocks from the quantized DCT (QDCT) and DST coefficients are selected to hide confidential data using specific intra prediction mode. The combination modes from neighboring blocks will produce three patterns of error distribution direction from data hiding consisting of vertical, horizontal, and diagonal. Each error distribution pattern has a range of intra prediction modes that protect a group of pixels in a particular direction. Range starts at 0 and ends 34. Ma et al. [4] presented a data hiding algorithm using the QDCT (Quantized Discrete Cosine Transform) method in H.264/advanced video coding (AVC). To maintain the spread of distortion, the author has developed three conditions to determine the direction of intraframe prediction modes. Several paired coefficients from the 4x4 DCCT block to accumulate embedding that cause distortion. The proposed method can achieve low visual distortion. However, this method has the disadvantage of low insertion capacity because data hiding is
  • 3. TELKOMNIKA ISSN: 1693-6930  Optimization of video steganography with additional compression and encryption (Dwi Arraziqi) 1419 only carried out on luminance from the block intraframe that meets the three selected conditions. 2. Research Method 2.1. Specification of Cover FLV The specifications of the cover FLV include duration, width, height, frame rate, video codec, audio codec, size, number of video tag, number of audio tag, and average body length of video tag as shown in Table 1. Cover FLV are used 1.flv, 2.flv, and 3.flv. Cover FLV is obtained from the internet. Table 1. Specification of Cover FLV Cover FLV 1.flv 2.flv 3.flv Duration 00:16 00:06 00:18 Width 360 480 300 Height 288 320 240 Frame Rate 25 29.916 25 Video Codec On2 VP6 Sorenson’s H.263 Sorenson’s H.263 Audio Codec MPEG layer 3 MPEG layer 3 MPEG layer 3 Size (byte) 669036 626325 773575 Number of audio tag 649 234 693 Number of video tag 424 185 451 Average body length of video tag (byte) 1337 3084 1352 2.2. Proposed Algorithm The proposed algorithm is the development of the previous algorithm [1]. The algorithm previously [1] said that the distribution of secret data at the end of the video tags is the best steganography algorithm in FLV. The proposed algorithm adds a compression and encryption algorithm to secret data before being distributed. There are 2 proposed algorithms, embedding and extracting algorithms. Embedding algorithm is an algorithm that embeds secret data into the cover video so that it produces stego video. Extracting algorithm is an algorithm that extracts secret data from stego video. Design of embedding algorithm as shown in Figure 2. The algorithm process is explained as follows: - Determine secret data and cover FLV. - Split the cover FLV so that it produces frames (video tags) and audio tags. - Compress secret data using ZIP algorithm. - Encrypt secret data that has been compressed using AES algorithm. - Embed secret data that has been compressed and encrypted at the end of the frame evenly - Merge between non stego frames, stego frames, and audio tags so as to produce stego FLV. Figure 2. Design of embedding algorithm
  • 4.  ISSN: 1693-6930 TELKOMNIKA Vol. 17, No. 3, June 2019: 1417-1424 1420 Design of extracting algorithm as shown in Figure 3. The algorithm process is explained as follows: - Determine cover FLV and stego FLV. - Split cover FLV and stego FLV to produce frames (video tags) and audio tags. - Subtract frames between stego FLV with cover FLV generating secret data that has been compressed and encrypted. - Decrypt secret data that has been compressed and encrypted using the AES algorithm to produce secret data that has been compressed. - Decompress secret data that has been compressed using the ZIP algorithm to generate secret data. Figure 3. Design of extracting algorithm 3. Results and Analysis Several trials were conducted to prove the video quality of the proposed algorithm compared to the previous algorithm [1]. Quality measurement is very difficult to use the naked eye. Two commonly used quality measurements are MSE and PSNR [7-10, 12, 14, 16, 18, 20, 22-25, 27]. Other quality measurements are playback and histogram of the video tag evolution. PSNR is a comparison between the maximum value of a signal measured by the amount of noise that affects the signal. PSNR is usually measured in decibels (dB). PSNR is used to find out the FLV cover quality comparison with FLV stego. To determine the PSNR, the MSE value (Mean Square Error) must first be determined as given in (2). MSE is the error value of the average square between FLV cover and FLV stego as given in (1). 𝑀𝑆𝐸 = 1 𝑀∗𝑁 ∑ ∑ [𝐶(𝑖, 𝑗) − 𝑆(𝑖, 𝑗)]2𝑁 𝑗=1 𝑀 𝑖=1 (1) where, M is the row while N is the column. C (i, j) is the pixel value of FLV cover in row i and column j. S (i, j) is the pixel value of FLV stego in row i and column j. 𝑃𝑆𝑁𝑅 = 10 ∗ log ( 𝑃2 𝑀𝑆𝐸 ) (2) where, P = max(C(i,j), S(i,j)).
  • 5. TELKOMNIKA ISSN: 1693-6930  Optimization of video steganography with additional compression and encryption (Dwi Arraziqi) 1421 3.1. Based on MSE and PSNR The proposed algorithm has better quality than the previous algorithm [1] as shown in Table 2. The proposed algorithm has a smaller MSE value. The proposed algorithm also has a greater PSNR value. The smaller the MSE value means the better the quality. The greater the value of the PSNR means the better the quality. Table 2. Comparison of Proposed Algorithm with Previous Algorithm Cover FLV Screet data and size Method ZIP compressi on (byte) AES encryption (byte) The average that was embedded to the video tag (byte) MSE PSNR (dB) 1.flv Test.accdb 839680 byte The proposed algorithm 21538 21552 50 0 ∞ The previous algorithm 1980 0 ∞ 2.flv The proposed algorithm 21538 21552 116 0 ∞ The previous algorithm 4538 309 23 3.flv The proposed algorithm 21538 21552 47 0 ∞ The previous algorithm 1861 880 18 3.2. Based on Histogram of The Video Tag Evolution The proposed algorithm has better quality with the previous algorithm [1] as shown in Figure 4. Figure 4 (a) is a comparison of the histogram evolution of video tags from cover FLV (1.flv), stego FLV from proposed algorithm, and stego FLV from previous algorithm [1]. Figure 4 (b) is a comparison of histogram evolution of video tags from cover FLV (2.flv), stego FLV from proposed algorithm, and stego FLV from previous algorithm [1]. Figure 4 (c) is a comparison of histogram evolution tag video from cover FLV (3.flv), stego FLV from proposed algorithm, and stego FLV from previous algorithm [1]. The x axis is the order of the video tag while the y axis is the number of data (bytes) of the video tag. The proposed algorithm has a smaller evolution of video tags means the better the quality. Figure 4. Histogram evolution of video tags from the proposed algorithm; previous algorithm; and cover FLV (a) 1.flv, (b) 2.flv, (c) 3.flv
  • 6.  ISSN: 1693-6930 TELKOMNIKA Vol. 17, No. 3, June 2019: 1417-1424 1422 3.3.Based on Playback The proposed algorithm has the same good quality as the previous algorithm [1] as shown in Figure 5. Figure 5 (a) is a screenshot of cover FLV (1.flv). Figure 5 (b) is a FLV stego screenshot from the previous algorithm [1]. Figure 5 (c) is a FLV stego screenshot of the proposed algorithm. If we look at the naked eye at 10th second, there is no distortion seen from either the previous algorithm [1] or the proposed algorithm. (a) (b) (c) Figure 5. (a) Screenshots from the Cover FLV 1.flv; (b) Stego FLV from previous algorithm and; (c) Stego FLV from proposed algorithm The proposed algorithm has has better quality than the previous algorithm [1] as shown in Figure 6. Figure 6 (a) is a screenshot of cover FLV (2.flv). Figure 6 (b) is a FLV stego screenshot from the previous algorithm [1]. Figure 6 (c) is a FLV stego screenshot of the proposed algorithm. If we look at the naked eye at 3th second, there is no distortion seen from the proposed algorithm while the previous algorithm [1] looks distortion. The proposed algorithm has has better quality than the previous algorithm [1] as shown in Figure 7. Figure 7 (a) is a screenshot of cover FLV (3.flv). Figure 7 (b) is a FLV stego screenshot from the previous algorithm [1]. Figure 7 (c) is a FLV stego screenshot of the proposed algorithm. If we look at the naked eye at 9th second, there is no distortion seen from the proposed algorithm while the previous algorithm [1] looks distortion. (a) (b) (c) Figure 6. (a) Screenshots from the cover FLV 2.flv; (b) Stego FLV from previous algorithm, and (c) Stego FLV from proposed algorithm
  • 7. TELKOMNIKA ISSN: 1693-6930  Optimization of video steganography with additional compression and encryption (Dwi Arraziqi) 1423 (a) (b) (c) Figure 7. (a) Screenshots from the Cover FLV 3.flv, (b) Stego FLV from previous algorithm, and (c) Stego FLV from proposed algorithm 4. Conclusion The proposed algorithm has better quality both in terms of security and video quality. In terms of security, the proposed algorithm encrypts confidential data using the AES algorithm. In terms of video quality, FLV stego from the proposed algorithm has a smaller MSE, a larger PSNR, smaller histogram evolution of video tags, and plays videos without distortion. For the next research, the process of embedding secret data is done randomly so that secret data is more secure. References [1] Cruz JP, Libatique NJ, Tangonan G. Steganography and data hiding in flash video (FLV). TENCON 2012 IEEE Region 10 Conference. Cebu. 2012: 1-6. [2] Mozo AJ, Obien ME, Rigor CJ, Rayel DF, Chua K,Tangonan G. Video steganography using Flash Video (FLV). 2009 IEEE Instrumentation and Measurement Technology Conference. Singapore. 2009: 822-827. [3] Chang PC, Chung KL, Chen JJ, Lin CH, Lin TJ. A Dct/Dst-Based Error Propagation-Free Data Hiding Algorithm for Hevc Intra-Coded Frames. Journal of Visual Communication and Image Representation. 2014; 25(2): 239-253. [4] Ma X, Li Z, Tu H, Zhang B. A Data Hiding Algorithm for H.264/Avc Video Streams without Intra- Frame Distortion Drift. IEEE Transactions on Circuits and Systems for Video Technology. 2010; 20(10): 1320-1330. [5] Bawaneh MJ, Obeidat AA, M.Al-kofahi M. An Adaptive FLV Steganography Approach Using Simulated Annealing. International Journal of Communication Networks and Information Security. 2018; 10(1): 56-66. [6] Atiea MA, Mahdy YB, Hedar AR. Hiding data in FLV video file. Advances in Intelligent and Soft Computing. 2012; 167: 919-925. [7] Jothimani S, Shaheen H. Securing Video files using Steganography Method in Android Mobile. International Journal of Scientific and Engineering Research. 2016; 7(4): 46-49. [8] Sarmah DK, Kulkarni AJ. Improved Cohort Intelligence-A high capacity, swift and secure approach on JPEG image steganography. Journal of Information Security and Applications. 2019; 45: 90-106. [9] Pandey A, Singh B, Saini BS, Sood N. A novel fused coupled chaotic map based confidential data embedding-then-encryption of electrocardiogram signal. Biocybernetics and Biomedical Engineering. 2018: 1-19. [10] Liu Y, Liu S, Wang Y, Zhao H, Liu S. Video steganography: A review. Neurocomputing. 2018. [11] Chikouche, SL, Chikouche N. An improved approach for lsb-based image steganography using AES algorithm. 2017 5th International Conference on Electrical Engineering-Boumerdes (ICEE-B). Boumerdes. 2017: 1-6. [12] Khan S, Irfan MA, Ismail M, Khan T, Ahmad N. Dual lossless compression based image steganography for low data rate channels. 2017 International Conference on Communication Technologies (ComTech). Rawalpindi. 2017: 60-64. [13] Malathi M, Rahul M, Kumar NS., Thamaraiselvan R. Enhanced image steganography using AES & SPIHT compression. 2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS). Coimbatore. 2017: 1-5.
  • 8.  ISSN: 1693-6930 TELKOMNIKA Vol. 17, No. 3, June 2019: 1417-1424 1424 [14] Mumthas S, Lijiya A. Transform Domain Video Steganography Using RSA, Random DNA Encryption and Huffman Encoding. Procedia Computer Science. 2017; 115(C): 660-666. [15] Prasetyadi GC, Mutiara AB, Refianti R. File encryption and hiding application based on advanced encryption standard (AES) and append insertion steganography method. 2017 Second International Conference on Informatics and Computing (ICIC). Jayapura. 2017: 1-5. [16] Houssein EH, Ali MAS, Hassanien AE. An image steganography algorithm using Haar Discrete Wavelet Transform with Advanced Encryption System. 2016 Federated Conference on Computer Science and Information Systems (FedCSIS). Gdansk. 2016: 641-644. [17] Dhanawe SA., Doshi SV. Hiding file on Android mobile and sending APK file through whatsapp using steganography and compression techniques. 2016 International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES). Paralakhemundi. 2016: 106-110. [18] Jain M, Lenka SK, Vasistha SK. Adaptive circular queue image steganography with RSA cryptosystem. Perspectives in Science. 2016; 8: 417-420. [19] Malik A, Sikka G, Verma HK. A high capacity text steganography scheme based on LZW compression and color coding. Engineering Science and Technology, an International Journal. 2017; 20(1): 72-79. [20] Muhammad K, Sajjad M, Mehmood I, Rho S, Baik SW. Image steganography using uncorrelated color space and its application for security of visual contents in online social networks. Future Generation Computer Systems. 2018; 86: 951-960. [21] Reddy MIS, Kumar APS. Secured Data Transmission Using Wavelet Based Steganography and Cryptography by Using AES Algorithm. Procedia Computer Science. 2016; 85: 62-69. [22] Sabnis SK, Awale RN. Statistical Steganalysis of High Capacity Image Steganography with Cryptography. Procedia Computer Science. 2016; 79: 321-327. [23] Tang M, Zeng S, Chen X, Hu J, Du Y. An adaptive image steganography using AMBTC compression and interpolation technique. Optik. 2016; 127(1): 471-477. [24] Mishra R, Mishra A, Bhanodiya P. An edge based image steganography with compression and encryption. 2015 International Conference on Computer, Communication and Control (IC4). Indore. 2015: 1-4. [25] Xiang T, Hu J, Sun J. Outsourcing chaotic selective image encryption to the cloud with steganography. Digital Signal Processing. 2015; 43(C): 28-37. [26] Zhang Y, Luo X, Yang C, Ye D, Liu F. A JPEG-Compression Resistant Adaptive Steganography Based on Relative Relationship between DCT Coefficients. 2015 10th International Conference on Availability, Reliability and Security. Toulouse. 2015: 461-466. [27] Lin CY, Wu SC, Wang JJ. VQ Image Compression Steganography Based on Section-Based Informed Embedding. 2014 International Symposium on Computer, Consumer and Control. Taichung. 2014: 111-114. [28] Ren-Er Y, Zhiwei Z, Shun T, Shilei D. Image Steganography Combined with DES Encryption Pre-processing. 2014 Sixth International Conference on Measuring Technology and Mechatronics Automation. Zhangjiajie. 2014: 323-326. [29] Salomon D, Motta G. Data Compression the Complete Reference. Fifth Edition. New York: Springer. 2010. [30] Stallings W. Cryptography and Network Security Principles and Practice. Sixth Edition. New York: Prentice Hall. 2014.