Video Steganography Algorithm for Embedding Data into Raw Video Streams Using Discrete Cosine Transform

2014 ◽  
Vol 626 ◽  
pp. 58-64 ◽  
Author(s):  
G.R. Rajesh ◽  
A. Shajin Nargunam

This paper presents an algorithm for hiding information’s in raw video steams using art of steganography using discrete wavelet transform. While mostly applied to still images in the past, it has become very popular for video streams recently. When steganographic methods are applied to digital video streams, the selection of target pixels, which are used to store the secret data, is especially crucial for an effective and successful-embedding process; if pixels are not selected carefully, undesired spatial and temporal perception problems occur in the stegno-video. Typically, an irrecoverable steganography algorithm is the algorithm that makes it hard for malicious third parties to discover how it works and how to recover the secret data out of the carrier file. In this paper, a new embedding algorithm is proposed to hide the secret data in moving videos. The 2D-DCT of the video is taken and the secret message is embedded. The performance measures are evaluated for the quality of the video after the data hiding and show good results.

2020 ◽  
Author(s):  
Abdulkarem Almawgani ◽  
Adam Alhawari ◽  
Wlaed Alarashi ◽  
Ali Alshwal

Abstract Digital images are commonly used in steganography due to the popularity of digital image transfer and exchange through the Internet. However, the tradeoff between managing high capacity of secret data and ensuring high security and quality of stego image is a major challenge. In this paper, a hybrid steganography method based on Haar Discrete Wavelet Transform (HDWT), Lempel Ziv Welch (LZW) algorithm, Genetic Algorithm (GA), and the Optimal Pixel Adjustment Process (OPAP) is proposed. The cover image is divided into non-overlapping blocks of nxn pixels. Then, the HDWT is used to increase the robustness of the stego image against attacks. In order to increase the capacity for, and security of, the hidden image, the LZW algorithm is applied on the secret message. After that, the GA is employed to give the encoded and compressed secret message cover image coefficients. The GA is used to find the optimal mapping function for each block in the image. Lastly, the OPAP is applied to reduce the error, i.e., the difference between the cover image blocks and the stego image blocks. This step is a further improvement to the stego image quality. The proposed method was evaluated using four standard images as covers and three types of secret messages. The results demonstrate higher visual quality of the stego image with a large size of embedded secret data than what is generated by already-known techniques. The experimental results show that the information-hiding capacity of the proposed method reached to 50% with high PSNR (52.83 dB). Thus, the herein proposed hybrid image steganography method improves the quality of the stego image over those of the state-of-the-art methods.


Author(s):  
Youssef Taouil ◽  
El Bachir Ameur

Steganography is one of the techniques that enter into the field of information   security, it is the art of dissimulating data into digital files in an imperceptible way that does not arise the suspicion. In this paper, a steganographic method based on the Faber-Schauder discrete wavelet transform is proposed. The embedding of the secret data is performed in Least Significant Bit (LSB) of the integer part of the wavelet coefficients. The secret message is decomposed into pairs of bits, then each pair is transformed into another pair based on a permutation that allows to obtain the most matches possible between the message and the LSB of the coefficients. To assess the performance of the proposed method, experiments were carried out on a large set of images, and a comparison to prior works is accomplished. Results show a good level of imperceptibility and a good trade-off imperceptibility-capacity compared to literature.


Author(s):  
D. Zawieska ◽  
J. Markiewicz ◽  
M. Łuba

<p><strong>Abstract.</strong> In the community historical objects play the role of witnesses of the past history. This creates an obligation to preserve and reconstruct them for future generations. Photogrammetric methods have been applied for those purposes for many years. In the process of development of inventory documentation, the key aspects related to the selection of appropriate measuring methods for particular objects and the creation of appropriate working conditions. At present, digital measuring techniques allow developing 3D photogrammetric documentation which is particularly valuable both, for conservators of historical objects, as well as for creating virtual museums. Particular attention should be paid to the utilisation of macro photography for that purpose which allows for recreating small fragments of historical details. The objective of this paper is to present possible use of macro photography for inventory of historical patterns engraved in brick walls of one of the cellars of the Royal Castle in Warsaw (Poland); they are called engravings or house marks. The cellar walls were made of bricks (20<span class="thinspace"></span>&amp;times;<span class="thinspace"></span>10<span class="thinspace"></span>cm) on the stone foundations, where a prison was located in the 17th century. Prisoners left their drawings of signs and crests. Bricks are destroyed, some of them are moss-grown, so many engravings are hardly visible and their depths vary between 3 and 5<span class="thinspace"></span>mm. The Canon 5D Mark II camera with the 50 mm macro lens was used to inventory engravings together with the shadow-free flash, mounted on the lens and a special frame with bolts, being the photogrammetric control network. To ensure the high quality of the 3D model, a network of photographs were acquired from two different distances; they were processed with the use of SfM/MVS algorithms implemented in Agisoft PhotoScan software. The aim of this paper is to discusses the impact of selection of control points on the accuracy of the orientation process, the impact of the point cloud density on correct projection of the digital surface, the influence of the DSM resolution on details of projection of shapes and selection of orthorectification and mosaicking parameters on the accuracy of orthoimage generation.</p>


Author(s):  
Chantana Chantrapornchai ◽  
Jitdumrong Preechasuk

Steganography is one of the techniques used to communicate secret data through the cover media such as images, videos, audio, texts etc. In this work, we consider the algorithms of steganography based on DCT and wavelet transform. The aspects of media quality after hiding the information in the digital media are considered. Particularly, we compare the performance of the prototype algorithms, representing the DCT and wavelet-based image steganography algorithms respectively, using the PSNR, capacity, robustness and accuracy aspects. For video steganography, with various wavelet transforms, we compare the quality of the derived information, when frames are dropped and the effects of payload is studied. The application of using such steganography algorithm which can embed multiple messages, each of which requires a separate key is proposed. The application can estimate the capacity used and capacity remains for the given cover image and texts.


2018 ◽  
Vol 2018 ◽  
pp. 1-8
Author(s):  
Min Long ◽  
Fenfang Li

Pixel pair matching (PPM) is widely used in digital image steganography. As an important derivation, adaptive pixel pair matching method (APPM) offers low distortion and allows embedded digits in any notational system. However, APPM needs additional space to store, calculate, and query neighborhood set, which needs extra cost. To solve these problems, a formula adaptive pixel pair matching (FAPPM) method is proposed in this paper. The basic idea of FAPPM is to use the formula to get the stego image pixel pair without searching the neighborhood set for the given image pixel pair. This will allow users to embed secret message directly without storing and searching the look-up table. Experimental results and analysis show that the proposed method could embed secret data directly without searching the neighborhood sets by using a formula and it still maintains flexibility in the selection of notional system, high image quality, and strong anti-steganalysis ability.


2019 ◽  
Vol 29 (1) ◽  
pp. 1216-1225 ◽  
Author(s):  
Zeyad Safaa Younus ◽  
Ghada Thanoon Younus

Abstract This paper aims to propose a method for data hiding in video by utilizing the least significant bit (LSB) method and improving it by utilizing the knight tour algorithm for concealing the data inside the AVI video file and using a key function encryption method for encrypting the secret message. First, the secret message is encrypted by utilizing a mathematical equation. The key used in the equation is a set of random numbers. These numbers differ in each implementation to warrant the safety of the hidden message and to increase the security of the secret message. Then, the cover video was converted from a set of frames into separated images to take the advantage of the large size of video file. Afterward, the knight tour algorithm is utilized for random selecting of the pixels inside the frame utilized for embedding the secret message inside it to overcome the shortcoming of the conventional LSB method that utilized the serial selection of pixel and to increase the robustness and security of the proposed method. Afterward, the encrypted secret message is embedded inside the selected pixels by utilizing the LSB method in bits (7 and 8). The observational results have drawn that the proposed method has a superior performance compared to the previous steganography method in terms of quality by a high PSNR of 67.3638 dB and the lowest MSE of 0.2578. Furthermore, this method preserves the security where the secret message cannot be drawn out without knowing the decoding rules.


2019 ◽  
Vol 8 (2) ◽  
pp. 2360-2365

Discrete Wavelet Transform is the algorithm which can be used to increase the contrast of an image for better visual quality of an image. The histogram value for original image with highest bins is taken for embedding the data into an image to perform the histogram equalization for repeating the process simultaneously. Information can be embedded into the source image with some bit value, for recovering the original image without any loss of the pixels. DWT is the first algorithm which has achieved the image contrast enhancement accurately. This approach maintained the original visual quality of an image even though themessage bits are embedded into the contrast-enhanced images. The proposed work with an original watermarking scheme based on the least significant bit technique. As a substitute of embedding the data into a simple image as watermarking, least significant bitmethod by utilizing the three wavelets transform is applied in the proposed system in order to enhance the embedding technique using spatial domain. For security, the Huffman coding has used to secure the data embedded into a host image, which can convert the secret message sequence into bit sequence for least significant bit operation. DWT can analyze the signal at multiple resolutions and it can divide the image into two types of quadrants as high and low-frequency quadrants. Here dividing an image into low and high it makes the information to hide.


Author(s):  
Balkar Singh

In this paper, a novel image steganography approach is proposed to enhance the visual quality of stego image. The cover image is decomposed using Discrete Wavelet Transform (DWT) to produce wavelet subbands and threshold value is calculated for each higher frequency wavelet subbands. Wavelet coefficients having magnitude larger than the threshold of its subband are selected to embed the secret data. Semi Hexadecimal Code (SHC) is proposed to convert pixel value of secret image into smaller equivalent value so that it distorts stego image as less as possible. Experimental results shows that maximum PSNR between cover image and stego image is more than 75 dB .Proposed approach is also compared with the existing approaches and this comparison shows that the proposed approach is better than the existing approaches. 


2005 ◽  
Vol 51 (9) ◽  
pp. 81-90 ◽  
Author(s):  
P. Cooper

The paper reviews the development of the vertical flow (VF) reed beds/constructed wetlands over the past 20 years. The performance of VF systems (and their use within hybrid systems) is analysed by reference to a number of brief case studies. The oxygen transfer rate (OTR) achieved is absolutely critical to the sizing of the systems. The author reviews the reported OTRs and comments on the existing design equations proposed for calculation of the area of beds. The 1st generation of VF systems used a set of parallel beds that were dosed one at a time in rotation and then rested for a period of days because there was considerable concern (based on early experience) that they would become clogged. In the past 10 years a number of new designs of 2nd generation VF beds have been built which make use of a single bed and hence operate without any resting periods. The hydraulic loading rate and the selection of the bed media, which are critical to the design and hence successful operation of these 2nd generation compact VF beds, are described. It is now possible to produce a very high quality of effluent from VF beds alone sized at 2 m2/pe when treating domestic sewage.


2018 ◽  
Vol 11 (2) ◽  
pp. 67-73
Author(s):  
Ashty M. Aaref

The procedure that involves the in closure of information without altering its intuitive standard is called data embedding. In this paper the secret message (English text) is hidden in the edge of the frames of the .AVI video without changing the details of frames. MATLAB R2013a is utilized to execute this algorithm. The secret message was embedded in the frames 38,39,40,41 and 42 and the reason of selecting those frames is that these frames have sufficient edge point details in them. High embedding and superior quality of encoded secret messages have been accomplished by this design. Additionally, in this project the cover frame image is represented by a 120 frames size 120* 160, and the secret message has been represented with a message comprised of 300 characters Both Peak Signal to Noise Ratio (PSNR) and the Mean Square Error (MSE) have been taken into consideration while analyzing the suggested method as we calculated both PSNR and MSE between the cover frames and the embedded ones. The results obtained were objectively good as the PSNR value ranges from 74.5293dB to 75.9123 dB


Sign in / Sign up

Export Citation Format

Share Document