A Secure Video Steganography Based on ECC and DCT

Article Preview

Abstract:

Video steganographic algorithm has the advantage of large hiding capacity, but we neglect the security when seek the capacity. In order to balance the two aspects, both to meet the high capacity of improving the load of video carrier and can safely protect the secret information. This paper presents the error-correcting code which can effectively correct burst errors and use it in video steganography. The secret information is hidden in error-correcting code first and then integrated the code with secret information with the video carrier’s DCT coefficients to insert the secret information in video carrier. The experiment results show that: this algorithm not only has great visual and statistical invisibility, also the safety of secret information is more significant. And achieve the objective of effective protect the secret information.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 433-440)

Pages:

5378-5383

Citation:

Online since:

January 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Chen Zhen Yong Tang Long Tang Ze Sheng Video information hiding strategies and methods of scrambling [J] Journal of Image and Graphics 2005: 1242 ~ 1247.

Google Scholar

[2] Yuk Ying Chung Fang Fei Xu Faith Choy Development of Video Watermarking for MPEG2 video[C] TENCON 2006. 2006 IEEE Region 10 Conference: 1~4.

DOI: 10.1109/tencon.2006.343843

Google Scholar

[3] Xuchang Yong Jian Liu Cuiqing security Pingxi MP EG compressed video steganography algorithms [J] Journal of Image and Graphics 2009: 2237 ~ 2246.

Google Scholar

[4] Bi Houjie The new generation of video compression coding standard-H. 264 (second edition) [M] Posts & Telecom Press.

Google Scholar

[5] Zhao Xiaoqun Modern Coding Theory [M], Wuhan: Huazhong University Press.

Google Scholar

[6] Wang Xin-mei Xiao Guozhen. The principle and method of error-correcting code (revised edition) [M]. Xi'an: Xidian University Press , (2006).

Google Scholar

[7] Mehdi Fallahpour David Megías Reversible Data Hiding Based on H. 264/AVC Intra Prediction[C] Springer-Verlag Berlin Heidelberg , IWDW 2008, LNCS 5450, 2009: 52–60.

DOI: 10.1007/978-3-642-04438-0_5

Google Scholar

[8] JIANG Fengli, CHEN Mingming A watermarking algorithm based on HVS and DCT [J]. IT 2006: 41 ~ 43.

Google Scholar