Video Steganography Algorithm for Embedding Data into Raw Video Streams Using Discrete Cosine Transform

Abstract:

Article Preview

This paper presents an algorithm for hiding information’s in raw video steams using art of steganography using discrete wavelet transform. While mostly applied to still images in the past, it has become very popular for video streams recently. When steganographic methods are applied to digital video streams, the selection of target pixels, which are used to store the secret data, is especially crucial for an effective and successful-embedding process; if pixels are not selected carefully, undesired spatial and temporal perception problems occur in the stegno-video. Typically, an irrecoverable steganography algorithm is the algorithm that makes it hard for malicious third parties to discover how it works and how to recover the secret data out of the carrier file. In this paper, a new embedding algorithm is proposed to hide the secret data in moving videos. The 2D-DCT of the video is taken and the secret message is embedded. The performance measures are evaluated for the quality of the video after the data hiding and show good results.

Info:

Periodical:

Edited by:

R. Edwin Raj, M. Marsaline Beno and M. Carolin Mabel

Pages:

58-64

Citation:

G.R. Rajesh and A. S. Nargunam, "Video Steganography Algorithm for Embedding Data into Raw Video Streams Using Discrete Cosine Transform", Applied Mechanics and Materials, Vol. 626, pp. 58-64, 2014

Online since:

August 2014

Export:

Price:

$38.00

* - Corresponding Author

[1] Wang H, Wang S. Cyber warfare: steganography vs. steganalysis. Communications of the ACM 2004; 47(10).

DOI: https://doi.org/10.1145/1022594.1022597

[2] N.F. Johnson, S. Jajodia, Exploring steganography: seeing the unseen, IEEE Computer 31 (2) (1998) 26–34.

DOI: https://doi.org/10.1109/mc.1998.4655281

[3] J.C. Judge, Steganography: past, present, future. SANS Institute publication, (2001).

[4] Jar no Mielikainen, LSB Matching Revisited, Signal Processing letters, IEEE, vol. 13, issue 5, pp.285-287, May (2006).

[5] K. Gopalan. , Audio steganography using bit modification, IEEE International Conference on Acoustics, Speech, and Signal Processing, 2(2003) 6-10.

DOI: https://doi.org/10.1109/icassp.2003.1202390

[6] V. Nagaraj, Dr. V. Vijayalakshmi and Dr. G. Zayaraz, Color Image Steganography based on Pixel Value Modification Method Using Modulus Function, IERI Procedia 4 (2013) 17 – 24.

DOI: https://doi.org/10.1016/j.ieri.2013.11.004

[7] Ozdemir Cetin, A. Turan Ozcerit, A new steganography algorithm based on color histograms for data embedding into raw video streams, computers & security 28 (2009) 670 – 682.

[8] V. Sathyal,K. Balasuhramaniyam ,N. Murali, M. Rajakumaran, Vigneswari, Data Hiding In Audio Signal, Video Signal Text And Jpeg Images, IEEE-International Conference On Advances In Engineering, Science And Management (2012) 741-746.

[9] Wien Hong and Tung-Shou Chen, A Novel Data Embedding Method Using Adaptive Pixel Pair Matching., IEEE Trans. on Information Forensics And Security, Vol. 7, No. 1, February 2012, 176-184.

DOI: https://doi.org/10.1109/tifs.2011.2155062

[10] Potdar V. and Chang E. Gray level modification steganography for secret communication. In IEEE International Conference on Industria Informatics., pages 355–368, Berlin, Germany, (2004).

[11] Naga, S.D. Biswas, D. Sarkar, and P.P. Sarkar – A novel technique for image stenography based on block DCT and Huffman Encoding International Journal of Computer Science and Information Technology, vol. 2, pp.103-112, (2010).

[12] Mohamed S. Automatic evaluation of real-time multimedia quality: a neural network approach. Rennes: University of Rennes I; (2003).