A video steganography algorithm based on Kanade-Lucas-Tomasi tracking algorithm and error correcting codes

被引:1
作者
Ramadhan J. Mstafa
Khaled M. Elleithy
机构
[1] University of Bridgeport,Department of Computer Science and Engineering
来源
Multimedia Tools and Applications | 2016年 / 75卷
关键词
Video steganography; Smart video transmission; Hamming codes; Face detection; Smart video tracking; KLT tracking; ROI;
D O I
暂无
中图分类号
学科分类号
摘要
Due to the significant growth of video data over the Internet, video steganography has become a popular choice. The effectiveness of any steganographic algorithm depends on the embedding efficiency, embedding payload, and robustness against attackers. The lack of the preprocessing stage, less security, and low quality of stego videos are the major issues of many existing steganographic methods. The preprocessing stage includes the procedure of manipulating both secret data and cover videos prior to the embedding stage. In this paper, we address these problems by proposing a novel video steganographic method based on Kanade-Lucas-Tomasi (KLT) tracking using Hamming codes (15, 11). The proposed method consists of four main stages: a) the secret message is preprocessed using Hamming codes (15, 11), producing an encoded message, b) face detection and tracking are performed on the cover videos, determining the region of interest (ROI), defined as facial regions, c) the encoded secret message is embedded using an adaptive LSB substitution method in the ROIs of video frames. In each facial pixel 1 LSB, 2 LSBs, 3 LSBs, and 4 LSBs are utilized to embed 3, 6, 9, and 12 bits of the secret message, respectively, and d) the process of extracting the secret message from the RGB color components of the facial regions of stego video is executed. Experimental results demonstrate that the proposed method achieves higher embedding capacity as well as better visual quality of stego videos. Furthermore, the two preprocessing steps increase the security and robustness of the proposed algorithm as compared to state-of-the-art methods.
引用
收藏
页码:10311 / 10333
页数:22
相关论文
共 53 条
  • [1] Cheddad A(2009)A secure and improved self-embedding algorithm to combat digital document forgery Sig Process 89 2324-2332
  • [2] Condell J(2009)A skin tone detection algorithm for an adaptive approach to steganography Sig Process 89 2465-2478
  • [3] Curran K(2010)Digital image steganography: survey and analysis of current methods Sig Process 90 727-752
  • [4] Mc Kevitt P(2012)A novel chaotic approach for information hiding in image Nonlinear Dyn 69 1525-1539
  • [5] Cheddad A(2014)Multi-symbol QIM video watermarking Sig Process Image Commun 29 107-127
  • [6] Condell J(2012)A real-time dual watermarking algorithm of H.264/AVC video stream for video-on-demand service AEU Int J Electron Commun 66 305-312
  • [7] Curran K(2014)Edge-based image steganography EURASIP J Inf Secur 2014 1-14
  • [8] Mc Kevitt P(2008)Robust object detection with interleaved categorization and segmentation Int J Comput Vis 77 259-289
  • [9] Cheddad A(2013)A novel approach to digital watermarking, exploiting colour spaces Sig Process 93 1268–-1294
  • [10] Condell J(2013)A blind scene-based watermarking for video copyright protection AEU Int J Electron Commun 67 528-535