A Robust and Secure Video Steganography Method in DWT-DCT Domains Based on Multiple Object Tracking and ECC

被引:68
作者
Mstafa, Ramadhan J. [1 ]
Elleithy, Khaled M. [1 ]
Abdelfattah, Eman [2 ]
机构
[1] Univ Bridgeport, Dept Comp Sci & Engn, Bridgeport, CT 06604 USA
[2] Sacred Heart Univ, Sch Comp, Fairfield, CT 06825 USA
关键词
Video steganography; multimedia security; data hiding techniques; multiple object tracking; DWT; DCT; ECC; imperceptibility; embedding capacity; robustness; DATA HIDING ALGORITHM; IMAGE STEGANOGRAPHY; DUAL WATERMARKING;
D O I
10.1109/ACCESS.2017.2691581
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Over the past few decades, the art of secretly embedding and communicating digital data has gained enormous attention because of the technological development in both digital contents and communication. The imperceptibility, hiding capacity, and robustness against attacks are three main requirements that any video steganography method should take into consideration. In this paper, a robust and secure video steganographic algorithm in discretewavelet transform (DWT) and discrete cosine transform (DCT) domains based on the multiple object tracking (MOT) algorithm and error correcting codes is proposed. The secret message is preprocessed by applying both Hamming and Bose, Chaudhuri, and Hocquenghem codes for encoding the secret data. First, motion-based MOT algorithm is implemented on host videos to distinguish the regions of interest in the moving objects. Then, the data hiding process is performed by concealing the secret message into the DWT and DCT coefficients of all motion regions in the video depending on foreground masks. Our experimental results illustrate that the suggested algorithm not only improves the embedding capacity and imperceptibility but also enhances its security and robustness by encoding the secret message and withstanding against various attacks.
引用
收藏
页码:5354 / 5365
页数:12
相关论文
共 45 条
[1]  
Alavianmehr M. A., 2012, 2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE 2012), P194, DOI 10.1109/ICCKE.2012.6395377
[2]  
[Anonymous], 2016, IEEE LONG ISL SYST A
[3]   A DCT/DST-based error propagation-free data hiding algorithm for HEVC intra-coded frames [J].
Chang, Po-Chun ;
Chung, Kuo-Liang ;
Chen, Jiann-Jone ;
Lin, Chien-Hsiung ;
Lin, Tseng-Jung .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2014, 25 (02) :239-253
[4]   A secure and improved self-embedding algorithm to combat digital document forgery [J].
Cheddad, Abbas ;
Condell, Joan ;
Curran, Kevin ;
Mc Kevitt, Paul .
SIGNAL PROCESSING, 2009, 89 (12) :2324-2332
[5]  
Ferris J, 2009, PALG STUD THEAT PERF, P1
[6]  
Fontaine C, 2007, LECT NOTES COMPUT SC, V4567, P130
[7]   Multi-symbol QIM video watermarking [J].
Hasnaoui, Manmen ;
Mitrea, Mihai .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2014, 29 (01) :107-127
[8]   A real-time dual watermarking algorithm of H.264/AVC video stream for Video-on-Demand service [J].
He Yingliang ;
Yang Gaobo ;
Zhu Ningbo .
AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2012, 66 (04) :305-312
[9]   Edge-based image steganography [J].
Islam, Saiful ;
Modi, Mangat R. ;
Gupta, Phalguni .
EURASIP JOURNAL ON INFORMATION SECURITY, 2014, 2014 (01)
[10]  
Jain Anil K., 1989, Fundamentals of Digital Image Processing