skip to main content
10.1145/3472634.3474077acmotherconferencesArticle/Chapter ViewAbstractPublication Pagesacm-turcConference Proceedingsconference-collections
research-article

Video steganography algorithm based on the relative relationship between DWT coefficients

Authors Info & Claims
Published:02 October 2021Publication History

ABSTRACT

H.264 is the commonly used standard for video compression, and is a lossy compression standard. This paper proposes a video steganography algorithm resisting to H.264 compression based on the relative relationship of DWT (Discrete Wavelet Transform) coefficients, which reduces the changes to individual coefficients. Firstly, the change of the low-frequency DWT coefficient difference between adjacent frames of video before and after H.264 compression is analyzed. Then, an appropriate coefficient difference threshold is selected according to the analysis result. Finally, the secret message bits are embedded by modulating the difference between the low-frequency DWT coefficients of adjacent frames. The experimental results show that the proposed algorithm can maintain high quality of the stego video, and resist to the H.264 compression well.

References

  1. M. A. Alavianmehr, M. Rezaei, M. S. Helfroush, and A. Tashk. 2013. A reversible data hiding scheme for video robust against H.264/AVC compression. In Proceedings of 10th International ISC Conference on Information Security and Cryptology (ISCISC). IEEE, 1–6. https://doi.org/10.1109/ISCISC.2013.6767333Google ScholarGoogle Scholar
  2. Yi Chen, Hongxia Wang, and Xuyun Zhang. 2020. Reversible data hiding based on run-level coding in H.264/AVC video streams. Computers, Materials & Continua 63, 2 (May 2020), 911–922. https://doi.org/10.32604/cmc.2020.08027Google ScholarGoogle Scholar
  3. Mukesh Dalal and Mamta Juneja. 2019. A robust and imperceptible steganography technique for SD and HD videos. Multimedia Tools and Applications 78 (March 2019), 5769–5789. https://doi.org/10.1007/s11042-018-6093-3Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. G.C. Langelaar and R.L.Lagendijk. 2001. Optimal differential energy watermarking of DCT encoded images and video. IEEE Transactions on Image Processing 10, 1 (Jan. 2001), 148–158. https://doi.org/10.1109/83.892451Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Zhiguo Qu, Siyi Chen, and Xiaojun Wang. 2020. A secure controlled quantum image steganography algorithm. Quantum Information Processing 19, 380 (2020), 1–25. https://doi.org/10.1007/s11128-020-02882-4Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Shahid Rahman, Fahad Masood, Wajid Ullah Khan, Niamat Ullah, Fazal Qudus Khan, Georgios Tsaramirsis, Sadeeq Jan, and Majid Ashraf. 2020. A novel approach of image steganography for secure communication based on LSB substitution technique. Computers, Materials & Continua 64, 1 (May 2020), 31–61. https://doi.org/10.32604/cmc.2020.09186Google ScholarGoogle ScholarCross RefCross Ref
  7. Sai Shyam Sharma, Sanik Thapa, and Chaitanya Pavan Tanay. 2017. A robust color video watermarking technique using DWT, SVD and frame difference. In Proceedings of International Conference on Pattern Recognition and Machine Intelligence(LNCS, Vol. 10597), Shankar B., Ghosh K., Mandal D., Ray S., Zhang D., and Pal S. (Eds.). Springer, 148–154. https://doi.org/10.1007/978-3-319-69900-4_19Google ScholarGoogle ScholarCross RefCross Ref
  8. M.D. Swanson, Bin Zhu, B. Chau, and A.H. Tewfik. 1997. Multiresolution video watermarking using perceptual models and scene segmentation. In Proceedings of International Conference on Image Processing, Vol. 2. IEEE, 558–561. https://doi.org/10.1109/ICIP.1997.638832Google ScholarGoogle ScholarCross RefCross Ref
  9. Lingyun Xiang, huanghui Yang, Yuhang Liu, Qian Li, and Chengzhang Zhu. 2020. Novel linguistic steganography based on character-level text generation. Mathematics 8 (Sept. 2020), 1558. https://doi.org/10.3390/math8091558Google ScholarGoogle Scholar
  10. Zhongliang Yang, Xiaoqing Guo, Ziming Chen, Yongfeng Huang, and Yu-Jin Zhang. 2018. RNN-Stega: linguistic steganography based on recurrent neural networks. IEEE Transactions on Information Forensics and Security 14, 5(2018), 1280–1295. https://doi.org/10.1109/TIFS.2018.2871746Google ScholarGoogle ScholarCross RefCross Ref
  11. Zhongliang Yang, Siyu Zhang, Yuting Hu, Zhiwen Hu, and Yongfeng Huang. 2021. VAE-Stega: linguistic steganography based on variational auto-encoder. IEEE Transactions on Information Forensics and Security 16 (2021), 880–895. https://doi.org/10.1109/TIFS.2020.3023279Google ScholarGoogle ScholarCross RefCross Ref
  12. Xiaoyan Yu, Chengyou Wang, and Xiao Zhou. 2019. A hybrid transforms-based robust video zero-watermarking algorithm for resisting high efficiency video coding compression. IEEE Access 7 (Aug. 2019), 115708–115724. https://doi.org/10.1109/ACCESS.2019.2936134Google ScholarGoogle ScholarCross RefCross Ref
  13. Yi Zhang, Xiangyang Luo, Chunfang Yang, Dengpan Ye, and Fenlin Liu. 2015. A JPEG-compression resistant adaptive ssteganography based on relative relationship between DCT coefficients. In Proceedings of 10th International Conference on Availability, Reliability and Security. IEEE, 461–466. https://doi.org/10.1109/ARES.2015.53Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Video steganography algorithm based on the relative relationship between DWT coefficients
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            ACM TURC '21: Proceedings of the ACM Turing Award Celebration Conference - China
            July 2021
            284 pages
            ISBN:9781450385671
            DOI:10.1145/3472634

            Copyright © 2021 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 2 October 2021

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article
            • Research
            • Refereed limited

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          HTML Format

          View this article in HTML Format .

          View HTML Format