Huda Ghazie Abd UL Sahib; Maisa Abid Ali Khodher
Volume 21, Issue 2 , June 2021, , Page 115-131
Abstract
This paper will present a comparison between three proposed methods. All of these methodsinclude hiding a secret message inside a video for the aim of transferring it to another party with highsecurity and a high embedding rate in order to ensure that the secret message is not discovered by theattacker. ...
Read More ...
This paper will present a comparison between three proposed methods. All of these methodsinclude hiding a secret message inside a video for the aim of transferring it to another party with highsecurity and a high embedding rate in order to ensure that the secret message is not discovered by theattacker. In addition , facilitating deals with video frames as large data for the purpose of analyzing,dividing and controlling frames easily by the programmer, using the MapReduce method. This isdone by dividing the video into a series of frames, and before the hiding process, the message isencrypted using the advance encryption standard (AES) algorithm. These basic processes areimplemented in all three proposed methods, the rest of the details for each method are:The first method: used the pixel value difference (PVD) algorithm to hide the secret message in thevideo. In addition, the stego secret key was also used. This key is used for the purpose of deciding thelocations of the pixels that will be employed to hide the secret message inside it.The second method: the MapReduce principle is used for the purpose of facilitating dealing withvideo frames. The chosen frame will enter the MapReduce stages. This is implemented by dividing theframe into three matrices red, green, blue (RGB). Each matrix represents a map. Moreover, thetechnique that is used for concealment is the least significant bit (LSB) technology which uses thestego secret key (x2) for the purpose of selecting sites that will be hidden by it.The third method: Also, the MapReduce principle is used, but this method is implemented by dividingthe frame into four blocks. Each block represents a map. In one of the stages of the MapReduce, thehiding process will be done by using the (PVD) method which uses the stego secret key (n+15).Finally, the reducer, which is the last stage, will collect the results of each block to generate thestego-frame.The results of the three methods are efficiency, transparency, robustness and powerful in stegovideo. It is noticed that the second method has achieved the lowest capacity, thus achieving highsecurity. As for the third method, it achieved the highest capacity and the highest execution time wasthe first method. Despite this, all the three methods have achieved high security. The attacker orunauthorized person cannot detect any suspicious differences in a stego video. These results areobtained through using many measurements: peak signal-to-noise ratio (PSNR), Mean Squared Error(MSE), Entropy and correlation coefficient.