scholarly journals LSB-based pre-embedding video steganography with rotating & shifting poly-pattern block matrix

2022 ◽  
Vol 8 ◽  
pp. e843
Author(s):  
Murat Hacimurtazaoglu ◽  
Kemal Tutuncu

Background In terms of data-hiding areas, video steganography is more advantageous compared to other steganography techniques since it uses video as its cover medium. For any video steganography, the good trade-off among robustness, imperceptibility, and payload must be created and maintained. Even though it has the advantage of capacity, video steganography has the robustness problem especially regarding spatial domain is used to implement it. Transformation operations and statistical attacks can harm secret data. Thus, the ideal video steganography technique must provide high imperceptibility, high payload, and resistance towards visual, statistical and transformation-based steganalysis attacks. Methods One of the most common spatial methods for hiding data within the cover medium is the Least Significant Bit (LSB) method. In this study, an LSB-based video steganography application that uses a poly-pattern key block matrix (KBM) as the key was proposed. The key is a 64 × 64 pixel block matrix that consists of 16 sub-pattern blocks with a pixel size of 16 × 16. To increase the security of the proposed approach, sub-patterns in the KBM are allowed to shift in four directions and rotate up to 270° depending on the user preference and logical operations. For additional security XOR and AND logical operations were used to determine whether to choose the next predetermined 64 × 64 pixel block or jump to another pixel block in the cover video frame to place a KBM to embed the secret data. The fact that the combination of variable KBM structure and logical operator for the secret data embedding distinguishes the proposed algorithm from previous video steganography studies conducted with LSB-based approaches. Results Mean Squared Error (MSE), Structural Similarity Index (SSIM) and Peak Signal-to-Noise Ratio (PSNR) parameters were calculated for the detection of the imperceptibility (or the resistance against visual attacks ) of the proposed algorithm. The proposed algorithm obtained the best MSE, SSIM and PSNR parameter values based on the secret message length as 0.00066, 0.99999, 80.01458 dB for 42.8 Kb of secret message and 0.00173, 0.99999, 75.72723 dB for 109 Kb of secret message, respectively. These results are better than the results of classic LSB and the studies conducted with LSB-based video steganography approaches in the literature. Since the proposed system allows an equal amount of data embedding in each video frame the data loss will be less in transformation operations. The lost data can be easily obtained from the entire text with natural language processing. The variable structure of the KBM, logical operators and extra security preventions makes the proposed system be more secure and complex. This increases the unpredictability and resistance against statistical attacks. Thus, the proposed method provides high imperceptibility and resistance towards visual, statistical and transformation-based attacks while acceptable even high payload.

Author(s):  
Kaviya K ◽  
Mridula Bala ◽  
Swathy N P ◽  
Chittam Jeevana Jyothi ◽  
S.Ewins Pon Pushpa

Today, the digital and social media platforms are extremely trending, leading a demand to transmit knowledge very firmly. The information that is exchanged daily becomes ‘a victim’ to hackers. To beat this downside, one of the effective solutions is Steganography or Cryptography. In this paper, the video Steganography and cryptography thoughts are employed, where a key text is hidden behind a ‘certain frame’ of the video using Shi-Tomasi corner point detection and Least Significant Bit (LSB) algorithmic rule. Shi-Tomasi algorithmic rule is employed to observe, the corner points of the frame. In the proposed work, a ‘certain frame’ with large number of corner points is chosen from the video. Then, the secret text is embedded within the detected corner points using LSB algorithmic rule and transmitted. At the receiver end, decryption process is employed, in the reverser order of encryption to retrieve the secret data. As a technical contribution, the average variation of Mean Squared Error, Peak Signal to Noise Ratio, Structural Similarity Index are analysed for original and embedded frames and found to be 0.002, 0.016 and 0.0018 respectively.


2018 ◽  
Vol 11 (2) ◽  
pp. 67-73
Author(s):  
Ashty M. Aaref

The procedure that involves the in closure of information without altering its intuitive standard is called data embedding. In this paper the secret message (English text) is hidden in the edge of the frames of the .AVI video without changing the details of frames. MATLAB R2013a is utilized to execute this algorithm. The secret message was embedded in the frames 38,39,40,41 and 42 and the reason of selecting those frames is that these frames have sufficient edge point details in them. High embedding and superior quality of encoded secret messages have been accomplished by this design. Additionally, in this project the cover frame image is represented by a 120 frames size 120* 160, and the secret message has been represented with a message comprised of 300 characters Both Peak Signal to Noise Ratio (PSNR) and the Mean Square Error (MSE) have been taken into consideration while analyzing the suggested method as we calculated both PSNR and MSE between the cover frames and the embedded ones. The results obtained were objectively good as the PSNR value ranges from 74.5293dB to 75.9123 dB


Security is the most significant parameter in all type of confidential data transfers. Steganography is used to enhance the security of such confidential communications. Steganography is a method of covert communication in which the existence of secrecy is concealed. In image steganography, achieving high data embedding capacity and simultaneously retaining good visual quality is a very tricky and difficult objective. In this paper, a reversible, secure, extremely imperceptible and high payload capacity steganography technique in the spatial domain is proposed. The proposed method employs evolutionary computation techniques to identify the most optimum locations and arrangements for secret data embedding. The proposed technique uses Particle Swarm Optimization to find the best possible order of data hiding whereas Genetic algorithm is used to identify the best possible arrangements to modify secret data to produce least amount of change in cover-image. The result of the proposed scheme is compared with many steganography techniques and the proposed scheme outperforms the existing schemes in terms of imperceptibility. The proposed technique produces an average PSNR value of 46.40 dB at 2 bit per pixel data embedding rate.


TEM Journal ◽  
2020 ◽  
pp. 606-612
Author(s):  
Sally Almanasra

Steganography refers to the manner in which secret data is concealed under a non-secret data. This non-secret data is known to be a digital form of media that are used as a cover. There are extensive researches regarding the images of steganographic methods. Nevertheless, the cover files did not receive enough attention. This study aims at providing a more inclusive approach for video steganography method. The difference in video steganography lies in the fact that they allow both sender and receiver to exchange hidden data through the matching between the secret text and the video frame RGB channels values presented in pixels, and manageable through different sizes of video files. The traditional manner contains the secret data under the video itself. The proposed method is designed over multithreading technique (parallelized method) for performance enhancement purposes. The results show that this developed steganographic method is more secure compared to the traditional steganographic method. In addition, results show that parallelism has impacted the proposed method positively.


2014 ◽  
Vol 626 ◽  
pp. 58-64 ◽  
Author(s):  
G.R. Rajesh ◽  
A. Shajin Nargunam

This paper presents an algorithm for hiding information’s in raw video steams using art of steganography using discrete wavelet transform. While mostly applied to still images in the past, it has become very popular for video streams recently. When steganographic methods are applied to digital video streams, the selection of target pixels, which are used to store the secret data, is especially crucial for an effective and successful-embedding process; if pixels are not selected carefully, undesired spatial and temporal perception problems occur in the stegno-video. Typically, an irrecoverable steganography algorithm is the algorithm that makes it hard for malicious third parties to discover how it works and how to recover the secret data out of the carrier file. In this paper, a new embedding algorithm is proposed to hide the secret data in moving videos. The 2D-DCT of the video is taken and the secret message is embedded. The performance measures are evaluated for the quality of the video after the data hiding and show good results.


Entropy ◽  
2021 ◽  
Vol 23 (7) ◽  
pp. 917
Author(s):  
Limengnan Zhou ◽  
Hongyu Han ◽  
Hanzhou Wu

Reversible data hiding (RDH) has become a hot spot in recent years as it allows both the secret data and the raw host to be perfectly reconstructed, which is quite desirable in sensitive applications requiring no degradation of the host. A lot of RDH algorithms have been designed by a sophisticated empirical way. It is not easy to extend them to a general case, which, to a certain extent, may have limited their wide-range applicability. Therefore, it motivates us to revisit the conventional RDH algorithms and present a general framework of RDH in this paper. The proposed framework divides the system design of RDH at the data hider side into four important parts, i.e., binary-map generation, content prediction, content selection, and data embedding, so that the data hider can easily design and implement, as well as improve, an RDH system. For each part, we introduce content-adaptive techniques that can benefit the subsequent data-embedding procedure. We also analyze the relationships between these four parts and present different perspectives. In addition, we introduce a fast histogram shifting optimization (FastHiSO) algorithm for data embedding to keep the payload-distortion performance sufficient while reducing the computational complexity. Two RDH algorithms are presented to show the efficiency and applicability of the proposed framework. It is expected that the proposed framework can benefit the design of an RDH system, and the introduced techniques can be incorporated into the design of advanced RDH algorithms.


2016 ◽  
Vol 2016 ◽  
pp. 1-10 ◽  
Author(s):  
Yuan-Yu Tsai

This study adopts a triangle subdivision scheme to achieve reversible data embedding. The secret message is embedded into the newly added vertices. The topology of added vertex is constructed by connecting it with the vertices of located triangle. For further raising the total embedding capacity, a recursive subdivision mechanism, terminated by a given criterion, is employed. Finally, a principal component analysis can make the stego model against similarity transformation and vertex/triangle reordering attacks. Our proposed algorithm can provide a high and adjustable embedding capacity with reversibility. The experimental results demonstrate the feasibility of our proposed algorithm.


Webology ◽  
2021 ◽  
Vol 18 (Special Issue 04) ◽  
pp. 133-148
Author(s):  
D. Shahi ◽  
R.S. Vinod Kumar ◽  
V.K. Reshma

Steganography using image interpolation has created a new research area in multimedia communication. A reversible data concealing in HSI and CMY color models using image interpolation is proposed in this paper. The HSI and CMY image models are interpolated using High Capacity Reversible Steganography (CRS) technique. The median plane of both HSI and CMY color models are selected for secret message bit concealing. The secret message bits are concealed in the cover plane by Exclusive OR (XOR) operation. Since the cover image is recovered after secret message bit retrieval, this finds application in military and medical imaging applications. The experimental results of proposed scheme showed very high embedding capacity of about 16 bits in each pixel location of calculated pixel value, good image quality with a surface similarity index measure (SSIM) value 1 and high PSNR. Also, high robustness is achieved on comparing with the existing works.


2020 ◽  
Vol 9 (3) ◽  
pp. 1015-1023 ◽  
Author(s):  
Muhammad Fuad ◽  
Ferda Ernawan

Steganography is a technique of concealing the message in multimedia data. Multimedia data, such as videos are often compressed to reduce the storage for limited bandwidth. The video provides additional hidden-space in the object motion of image sequences. This research proposes a video steganography scheme based on object motion and DCT-psychovisual for concealing the message. The proposed hiding technique embeds a secret message along the object motion of the video frames. Motion analysis is used to determine the embedding regions. The proposed scheme selects six DCT coefficients in the middle frequency using DCT-psychovisual effects of hiding messages. A message is embedded by modifying middle DCT coefficients using the proposed algorithm. The middle frequencies have a large hiding capacity and it relatively does not give significant effect to the video reconstruction. The performance of the proposed video steganography is evaluated in terms of video quality and robustness against MPEG compression. The experimental results produce minimum distortion of the video quality. Our scheme produces a robust of hiding messages against MPEG-4 compression with average NC value of 0.94. The proposed video steganography achieves less perceptual distortion to human eyes and it's resistant against reducing video storage.


Sign in / Sign up

Export Citation Format

Share Document