skip to main content
10.1145/3193025.3193045acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicdspConference Proceedingsconference-collections
research-article

Video Steganography Using Karhunen-Loève Transform

Published: 25 February 2018 Publication History

Abstract

Steganography is the art and science of message hiding i.e. passing confidential message through the unsecure channel in such a way that the existence of secret message is unknown. Image and video are the very popular choice for cover media. Embedding efficiency, payload and robustness against attackers are the main key point to successfully design a steganography algorithm. Current steganography algorithm are lacking behind by preprocessing stage, which includes alteration procedure for both cover media and secret message. We address this problem by proposing a novel method to encode the secret image inside the cover video. Here we use Karhunen-Loeve Transform (KL transform), since it provides the image compression and then after we use our proposed algorithm to embed the secret image on that compact zone. The experimental results show higher data embedding capacity and decode the secret image effectively.

References

[1]
C Ankit, Satam N, Sood R, Bade D, "Image Steganography using Karhunen --Loeve transform and least bit Substitution", International journal of computer applications, Vol-79, Oct 2013, pp. 31--37
[2]
Moon SK, Raut RD, "Analysis of secured video steganography using computer forensics technique for enhance data security", Image Information Processing (ICIIP). IEEE Second Int Conf, 2013, pp. 660--665.
[3]
RJ Mstafa, KM Elleithy, "A novel video steganography algorithm in the wavelet domain based on the KLT tracking algorithm and BCH codes". Systems, Applications and Technology Conference (LISAT),2015.
[4]
K Qazanfari, R Safabakhsh, "A new steganography method which preserves histogram: Generalization of LSB++". Inform Sci, pp. 90--101.
[5]
M Sadek, A Khalifa, MM Mostafa, "Video steganography: a comprehensive review". Multimed Tools, 2014, pp. 1--32.
[6]
S Farschi, M Farschi, "A novel chaotic approach for information hiding in image." Nonlinear Dyn69(4), 2012 pp. 1525--1539.
[7]
M Hasnaoui, M Mitrea, "Multi-symbol QIM video watermarking". Sig Process Image Commun 29(1), pp. 107--127. 2014
[8]
Roy Subhajit, Sanyal G, "an approach to selective encryption on compressed image", IEEE 2nd International Conference on contemporary computing and informatics-2016, pp. 229--234
[9]
Alvi R S, Bhosale S, "Steganography using Karhunen loeve transform and optimum pixel adjustment", Internatonal Journal of electrical and electronics engineering research, vol 4, Issue-2, Apr 2014, pp. 125--30.
[10]
RJ Mstafa, KM Elleithy, "A video steganography algorithm based on Kanade-Lucas-Tomasi tracking algorithm and error correcting codes", Multimed Tools Appl (2016), Springer, pp. 10311--10333.
[11]
Paul R, Acharya AK, Yadav VK, Batham S, "Hiding large amount of data using a new approach of video steganography". Confluence 2013: The Next Generation Information Technology Summit (4th International Conference), pp. 337--343.
[12]
Alavianmehr MA, Rezaei M, Helfroush MS, Tashk A, " A lossless data hiding scheme on video raw data robust against H.264/AVC compression.", 2nd International eConference on Computer and Knowledge Engineering (ICCKE), 2012, pp. 194--198.

Cited By

View all
  • (2022)Symmetric text encryption scheme based Karhunen Loeve transformJournal of Discrete Mathematical Sciences and Cryptography10.1080/09720529.2022.209511425:8(2773-2781)Online publication date: 20-Dec-2022
  • (2022)A novel approach of data hiding in video using region selection and PCAMultimedia Tools and Applications10.1007/s11042-022-12029-581:10(14553-14571)Online publication date: 1-Apr-2022
  • (2019)Message Processing-based Steganographic Algorithm using Karhunen-Loève Transform2019 23rd International Conference on System Theory, Control and Computing (ICSTCC)10.1109/ICSTCC.2019.8886015(143-148)Online publication date: Oct-2019

Index Terms

  1. Video Steganography Using Karhunen-Loève Transform

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICDSP '18: Proceedings of the 2nd International Conference on Digital Signal Processing
    February 2018
    198 pages
    ISBN:9781450364027
    DOI:10.1145/3193025
    © 2018 Association for Computing Machinery. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of a national government. As such, the Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 25 February 2018

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Eigen vector
    2. Karhunen-Loeve Transform
    3. Steganography

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    ICDSP 2018

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)2
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 07 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)Symmetric text encryption scheme based Karhunen Loeve transformJournal of Discrete Mathematical Sciences and Cryptography10.1080/09720529.2022.209511425:8(2773-2781)Online publication date: 20-Dec-2022
    • (2022)A novel approach of data hiding in video using region selection and PCAMultimedia Tools and Applications10.1007/s11042-022-12029-581:10(14553-14571)Online publication date: 1-Apr-2022
    • (2019)Message Processing-based Steganographic Algorithm using Karhunen-Loève Transform2019 23rd International Conference on System Theory, Control and Computing (ICSTCC)10.1109/ICSTCC.2019.8886015(143-148)Online publication date: Oct-2019

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media