Hiding Data in Video Sequences Using Steganography Algorithms

被引:0
作者
Kelash, Hamdy M. [1 ]
Wahab, Osama F. Abdel [1 ]
Elshakankiry, Osama A. [1 ]
El-sayed, Hala S. [1 ]
机构
[1] Menoufia Univ, Fac Elect Engn, Dept Comp Sci & Engn, Menoufia, Egypt
来源
2013 INTERNATIONAL CONFERENCE ON ICT CONVERGENCE (ICTC 2013): FUTURE CREATIVE CONVERGENCE TECHNOLOGIES FOR NEW ICT ECOSYSTEMS | 2013年
关键词
Steganography; cover video; stego-video; Peak Signal-to-Noise Ratio (PSNR); Mean Square Error (MSE);
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper focuses on the utilization of digital video/images as cover to hide data. The proposed steganography algorithm based on color histograms for data embedding into Video clips directly, where each pixel in each video frame is divided in two parts, the number of bits which will be embedded in the right part are counted in the left part of the pixel. This algorithm is characterized by the ability of hiding larger size of data and the ability of extracting the written text without errors, besides it gives a high level of authentication to guarantee integrity of the video/images before being extracted. Furthermore, the data were embedded inside the video/images randomly which gave the video/images a higher security and resistance against extraction by attackers.
引用
收藏
页码:353 / 358
页数:6
相关论文
共 12 条
[1]  
[Anonymous], J SIGNAL IMAGE PROCE
[2]  
[Anonymous], INT J COMPUTER SCI S
[3]   A survey of skin-color modeling and detection methods [J].
Kakumanu, P. ;
Makrogiannis, S. ;
Bourbakis, N. .
PATTERN RECOGNITION, 2007, 40 (03) :1106-1122
[4]  
Kavitha KK., 2012, INT J ENG RES APPL I, V2, P338
[5]   Multilevel reversible data hiding based on histogram modification of difference images [J].
Lin, Chia-Chen ;
Tai, Wei-Liang ;
Chang, Chim-Chen .
PATTERN RECOGNITION, 2008, 41 (12) :3582-3591
[6]  
Netravali A.N., 1995, DIGITAL PICTURES REP, V2nd
[7]   Data Hiding in MPEG Video Files Using Multivariate Regression and Flexible Macroblock Ordering [J].
Shanableh, Tamer .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (02) :455-464
[8]  
Sharma Vijay Kumar, 2012, Journal of Theoretical and Applied Information Technology, V36, P1
[9]  
Shirali-Shahreza MH, 2010, ARAB J SCI ENG, V35, P213
[10]  
Singh N., 2012, Computer Science and Information Technology (CSIT), P161