A data-hiding technique using scene-change detection for video steganography

被引:30
作者
Ramalingam, Mritha [1 ]
Isa, Nor Ashidi Mat [1 ]
机构
[1] Univ Sains Malaysia, Sch Elect & Elect Engn, Imaging & Intelligent Syst Res Team ISRT, Engn Campus, Nibong Tebal 14300, Penang, Malaysia
关键词
Data hiding; Video steganography; Security; Scene change detection; Discrete wavelet transform;
D O I
10.1016/j.compeleceng.2015.10.005
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a data-hiding technique using scene-change detection for video steganography. Reducing the distortions in videos and securing the embedded data remain as competing goals in any video steganographic system. In this study, a data-hiding technique using discrete cosine transform (DCT) and discrete wavelet transform (DWT) coefficients is proposed to enhance the security of hidden data and minimize distortions to maintain better video quality. In this work, scene changes are detected using the DCT coefficients of video sequences for hiding data. Then, the cover-video and the payload are fused and normalized using the DWT coefficients to enhance video quality. The MATLAB simulation results indicate that the proposed method outperforms existing state-of-the-art methods. The comparison results reveal that the proposed data-hiding method offers better security and minimizes distortions for better video quality. (C) 2015 Elsevier Ltd. All rights reserved.
引用
收藏
页码:423 / 434
页数:12
相关论文
共 25 条
  • [1] Ali A., 2010, The Int. Arab. J. Inform. Technol., V7, P358
  • [2] [Anonymous], INT J COMPUTER APPL
  • [3] [Anonymous], 2011, WORLD APPL SCI J
  • [4] [Anonymous], 2010, P IEEE INT C COMP IN, DOI 10.1109/ICCIC.2010.5705870.
  • [5] [Anonymous], 2011, INT J COMPUTER SCI C
  • [6] Beenish M, 2008, IEEE INT S BIOM SEC, P1
  • [7] Bhattacharyya S., 2012, International Journal of Computer Network and Information Security, V4, P27, DOI [DOI 10.5815/IJCNIS.2012.07.04, DOI 10.5815/IJCNIS2012.07.04]
  • [8] Celik M, 2002, INT C IM PROC NEW YO
  • [9] Digital image steganography: Survey and analysis of current methods
    Cheddad, Abbas
    Condell, Joan
    Curran, Kevin
    Mc Kevitt, Paul
    [J]. SIGNAL PROCESSING, 2010, 90 (03) : 727 - 752
  • [10] Chen M, 2006, IEEE INT C INT INF H