An efficient Moving object, Encryption, Compression and Interpolation technique for video steganography

被引:3
作者
Roselinkiruba, R. [1 ]
Sree Sharmila, T. [2 ]
Julina, J. K. Josephine [3 ]
机构
[1] Vel Tech Rangarajan Dr Sagunthala R&D Inst Sci & T, Sch Comp, Chennai, India
[2] Anna Univ, Coll Engn Guindy, Dept Comp Sci & Engn, Chennai, India
[3] Sri Siva Subramaniya Nadar Coll Engn, Dept Informat Technol, Chennai, Tamil Nadu, India
关键词
Data hiding; Encryption; Interpolation; Moving object; IMAGE COMPRESSION; SCHEME; PIXEL;
D O I
10.1007/s11042-023-17930-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Video steganography approach has been widely used to preserve the secret information while transmitting through the internet. This approach has become attractive among many researchers due to its feature high Embedding Capacity (EC). In recent years, numerous methods are developed to secure the data. However, these methods still face problem in the area of imperceptibly and finding less distortion regions that is suitable for data hiding. To overcome this issue, a novel edge based Moving Objects (MO), compression technology, encryption method and interpolation data hiding technique based on moving regions detection that achieves less distortion is proposed in this paper. In the proposed system, first the video gets separated into frames, and edge based MO detection technique with graph system is used to identify the missing vertices. Then, compression technology with Rank Approximation (RA) and Prediction Error (PE) is applied for every frame. Next, we propose encryption scheme for MO which combines threshold and Pixel Value Differencing (PVD) to shuffle pixels, and non-MO applies circular shift encryption that preserve the pixels suitable for data hiding. Finally, the frames are up-scaled using weight based interpolation technique and data is hidden with various range inside Red Green Blue (RGB) channel by finding rough and smooth pixels. To ensure reversibility, any one channel is kept as the indication pixel for each pixel to store MO pixels. Experimental results reveals that the proposed method has significant improvement in the areas of compression level, MO identification and Quality Parameter (QP) testing. Moreover, Peak Signal-to-Noise Ratio (PSNR), EC, Regular Singular (RS) and PVD histogram analysis attacks obtained on the proposed method performs better than the other state-of-the-art techniques.
引用
收藏
页码:1 / 31
页数:31
相关论文
共 40 条
[11]   Detecting phishing web pages with visual similarity assessment based on Earth Mover's Distance (EMD) [J].
Fu, Anthony Y. ;
Wenyin, Liu ;
Deng, Xiaotie .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2006, 3 (04) :301-311
[12]   RUN-LENGTH ENCODINGS [J].
GOLOMB, SW .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1966, 12 (03) :399-+
[13]   Hiding information in videos using motion clues of feature points [J].
Hashemzadeh, Mandi .
COMPUTERS & ELECTRICAL ENGINEERING, 2018, 68 :14-25
[14]   Spatial Pyramid Pooling in Deep Convolutional Networks for Visual Recognition [J].
He, Kaiming ;
Zhang, Xiangyu ;
Ren, Shaoqing ;
Sun, Jian .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2015, 37 (09) :1904-1916
[15]   A robust and secure key-frames based video watermarking system using chaotic encryption [J].
Himeur, Yassine ;
Boukabou, Abdelkrim .
MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (07) :8603-8627
[16]   A survey of interpolation-based reversible data hiding methods [J].
Jung, Ki-Hyun .
MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (07) :7795-7810
[17]   Data hiding method using image interpolation [J].
Jung, Ki-Hyun ;
Yoo, Kee-Young .
COMPUTER STANDARDS & INTERFACES, 2009, 31 (02) :465-470
[18]  
Kaur M, 2023, EGCrypto: A Low-Complexity Elliptic Galois Cryptography Model for Secure Data Transmission in IoT
[19]  
Kaur M, 2023, Lightweight Biomedical Image Encryption Approach
[20]   DYNAMIC HUFFMAN CODING [J].
KNUTH, DE .
JOURNAL OF ALGORITHMS, 1985, 6 (02) :163-180