ABSTRACT
H.264 is the commonly used standard for video compression, and is a lossy compression standard. This paper proposes a video steganography algorithm resisting to H.264 compression based on the relative relationship of DWT (Discrete Wavelet Transform) coefficients, which reduces the changes to individual coefficients. Firstly, the change of the low-frequency DWT coefficient difference between adjacent frames of video before and after H.264 compression is analyzed. Then, an appropriate coefficient difference threshold is selected according to the analysis result. Finally, the secret message bits are embedded by modulating the difference between the low-frequency DWT coefficients of adjacent frames. The experimental results show that the proposed algorithm can maintain high quality of the stego video, and resist to the H.264 compression well.
- M. A. Alavianmehr, M. Rezaei, M. S. Helfroush, and A. Tashk. 2013. A reversible data hiding scheme for video robust against H.264/AVC compression. In Proceedings of 10th International ISC Conference on Information Security and Cryptology (ISCISC). IEEE, 1–6. https://doi.org/10.1109/ISCISC.2013.6767333Google Scholar
- Yi Chen, Hongxia Wang, and Xuyun Zhang. 2020. Reversible data hiding based on run-level coding in H.264/AVC video streams. Computers, Materials & Continua 63, 2 (May 2020), 911–922. https://doi.org/10.32604/cmc.2020.08027Google Scholar
- Mukesh Dalal and Mamta Juneja. 2019. A robust and imperceptible steganography technique for SD and HD videos. Multimedia Tools and Applications 78 (March 2019), 5769–5789. https://doi.org/10.1007/s11042-018-6093-3Google ScholarDigital Library
- G.C. Langelaar and R.L.Lagendijk. 2001. Optimal differential energy watermarking of DCT encoded images and video. IEEE Transactions on Image Processing 10, 1 (Jan. 2001), 148–158. https://doi.org/10.1109/83.892451Google ScholarDigital Library
- Zhiguo Qu, Siyi Chen, and Xiaojun Wang. 2020. A secure controlled quantum image steganography algorithm. Quantum Information Processing 19, 380 (2020), 1–25. https://doi.org/10.1007/s11128-020-02882-4Google ScholarDigital Library
- Shahid Rahman, Fahad Masood, Wajid Ullah Khan, Niamat Ullah, Fazal Qudus Khan, Georgios Tsaramirsis, Sadeeq Jan, and Majid Ashraf. 2020. A novel approach of image steganography for secure communication based on LSB substitution technique. Computers, Materials & Continua 64, 1 (May 2020), 31–61. https://doi.org/10.32604/cmc.2020.09186Google ScholarCross Ref
- Sai Shyam Sharma, Sanik Thapa, and Chaitanya Pavan Tanay. 2017. A robust color video watermarking technique using DWT, SVD and frame difference. In Proceedings of International Conference on Pattern Recognition and Machine Intelligence(LNCS, Vol. 10597), Shankar B., Ghosh K., Mandal D., Ray S., Zhang D., and Pal S. (Eds.). Springer, 148–154. https://doi.org/10.1007/978-3-319-69900-4_19Google ScholarCross Ref
- M.D. Swanson, Bin Zhu, B. Chau, and A.H. Tewfik. 1997. Multiresolution video watermarking using perceptual models and scene segmentation. In Proceedings of International Conference on Image Processing, Vol. 2. IEEE, 558–561. https://doi.org/10.1109/ICIP.1997.638832Google ScholarCross Ref
- Lingyun Xiang, huanghui Yang, Yuhang Liu, Qian Li, and Chengzhang Zhu. 2020. Novel linguistic steganography based on character-level text generation. Mathematics 8 (Sept. 2020), 1558. https://doi.org/10.3390/math8091558Google Scholar
- Zhongliang Yang, Xiaoqing Guo, Ziming Chen, Yongfeng Huang, and Yu-Jin Zhang. 2018. RNN-Stega: linguistic steganography based on recurrent neural networks. IEEE Transactions on Information Forensics and Security 14, 5(2018), 1280–1295. https://doi.org/10.1109/TIFS.2018.2871746Google ScholarCross Ref
- Zhongliang Yang, Siyu Zhang, Yuting Hu, Zhiwen Hu, and Yongfeng Huang. 2021. VAE-Stega: linguistic steganography based on variational auto-encoder. IEEE Transactions on Information Forensics and Security 16 (2021), 880–895. https://doi.org/10.1109/TIFS.2020.3023279Google ScholarCross Ref
- Xiaoyan Yu, Chengyou Wang, and Xiao Zhou. 2019. A hybrid transforms-based robust video zero-watermarking algorithm for resisting high efficiency video coding compression. IEEE Access 7 (Aug. 2019), 115708–115724. https://doi.org/10.1109/ACCESS.2019.2936134Google ScholarCross Ref
- Yi Zhang, Xiangyang Luo, Chunfang Yang, Dengpan Ye, and Fenlin Liu. 2015. A JPEG-compression resistant adaptive ssteganography based on relative relationship between DCT coefficients. In Proceedings of 10th International Conference on Availability, Reliability and Security. IEEE, 461–466. https://doi.org/10.1109/ARES.2015.53Google ScholarDigital Library
Index Terms
- Video steganography algorithm based on the relative relationship between DWT coefficients
Recommendations
Video steganography: A review
AbstractVideo steganography is becoming an important research area in various data hiding technologies, which has become a promising tool because not only the security requirement of secret message transmission is becoming stricter but also ...
A robust and imperceptible steganography technique for SD and HD videos
In this era of internet transfer of information is in digital form using multimedia files such as image, video, audio, etc. which relies on secure communication techniques to convey information safely. Due to the frequent transfer of videos over the ...
Robust watermarking in DWT domain using SVD and opposition and dimensional based modified firefly algorithm
The process of authenticating a digital image by embedding a watermark into it is called digital image watermarking, which protects the image from copyright infringement. This paper proposes an optimized watermarking scheme in the discrete wavelet ...
Comments