Implementation of Advanced Encryption Standard Algorithm on Steganography
M. Senthil Murugan1, T. Sasilatha2

1M. Senthil Murugan, Research Scholar, Associate Professor, Department of ECE, Sathyabama Institute of Science and Technology,  St. Joseph’s Institute of Technology, Chennai (T.N), India.
2T. Sasilatha, Dean, Academics, AMET Deemed to by University, Chennai (T.N), India.
Manuscript received on 06 February 2019 | Revised Manuscript received on 19 February 2019 | Manuscript Published on 04 March 2019 | PP: 225-230 | Volume-7 Issue-5S2 January 2019 | Retrieval Number: ES2035017519/19©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (

Abstract: It is sometimes not enough to keep the contents of a message secret. It may also be necessary to keep the existence of the message secret. The algorithm that is described here is about hiding an audio file into video frame. A video file is chosen first. The video file is then divided into frames. A particular frame is selected and skin tone detection is performed on it using HSV color space model. The skin region is taken as the Region of Interest (ROI). An audio file is the secret message to be transmitted. It is embedded into the frame using Advanced Encryption Standard (AES) algorithm. The secret audio file encrypted on a particular frame is transmitted with a key. The receiver can extract the secret audio file only if he has the key. This concept is based on visual method. The goal of using a video to encrypt the data is that it will be difficult to detect the frame in which the data is embedded. The secret data can be retrieved only by the user who has knowledge of the frame in which the data is embedded and the key which is known only by the sender and receiver. Thus a secured communication is established.
Keywords: AES, Steganography, Skin Tone Detection.
Scope of the Article: Encryption Methods and Tools