Abstract
In this paper, Viola-Jones’s face detection method is used to find a human face in videos that act as a Region of Interest. Region of Interest can be used for concealing secret messages to increase the robustness of the output stage file. Viola-Jones’s method can work efficiently in unlike situations such as different skin color, aging, different facial expressions, scars on the face, makeup on face, different hairs color, and complex background details. The Viola-Jones detect faces with minimum calculation time while maintaining high detection precision. Integrating Viola-Jones algorithm with steganography technique challenge of robustness can be avoided by the user.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Aashish, K., Vijayalakshmi, A.: Comparison of Viola-Jones and Kanade-Lucas-Tomasi face detection algorithms. Orient. J. Comput. Sci. Technol. 10(1), 151–159 (2017). https://doi.org/10.13005/ojcst/10.01.20
Amjad, A., Griffiths, A., Patwary, M.N.: Multiple face detection algorithm using color skin modeling. IET Image Proc. 6(8), 1093–1101 (2012). https://doi.org/10.1049/iet-ipr.2012.0167
Castrillón, M., Déniz, O., Hernández, D., Lorenzo, J.: A comparison of the face and facial feature detectors based on the Viola-Jones general object detection framework. Mach. Vis. Appl. 22(3), 481–494 (2011). https://doi.org/10.1007/s00138-010-0250-7
Cheddad, A., Condell, J., Curran, K., Mc Kevitt, P.: Digital image steganography: survey and analysis of current methods. Signal Process. 90(3), 727–752 (2010). https://doi.org/10.1016/j.sigpro.2009.08.010
Elgammal, A., Muang, C., Hu, D.: Skin detection. Encycl. Biom., 1407–1414 (2015). https://doi.org/10.1007/978-1-4899-7488-4_89
Hatem, H., Beiji, Z., Majeed, R.: A survey of feature base methods for human face detection. Int. J. Control Autom. 8(5), 61–78 (2015). https://doi.org/10.14257/ijca.2015.8.5.07
Hazim, N., Sameer, S., Esam, W., Abdul, M.: Face detection and recognition using Viola-Jones with PCA-LDA and square euclidean distance. Int. J. Adv. Comput. Sci. Appl. 7(5) (2016). https://doi.org/10.14569/ijacsa.2016.070550
Jones, M.J., Jones, M.: Fast multi-view face detection, December 2003 (2017)
Kumar, P., Singh, K.: An improved data-hiding approach using skin-tone detection for video steganography. Multimedia Tools Appl. 77(18), 24247–24268 (2018). https://doi.org/10.1007/s11042-018-5709-y
Lanitis, A.: Facial biometric templates and aging: Problems and challenges for artificial intelligence. In: CEUR Workshop Proceedings, vol. 475, pp. 142–149 (2009)
Mittal, S., Shivnani, C.: Face detection and tracking: a comparative study of two algorithms. Int. J. Comput. Sci. Commun. 7(1), 76–82 (2016)
Mondal, S.K., Mukhopadhyay, I., Dutta, S.: Review and comparison of face detection techniques. In: Chakraborty, M., Chakrabarti, S., Balas, V.E. (eds.) eHaCON 2019. AISC, vol. 1065, pp. 3–14. Springer, Singapore (2020). https://doi.org/10.1007/978-981-15-0361-0_1
Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Information hiding - a survey. Proc. IEEE 87(7), 1062–1078 (1999). https://doi.org/10.1109/5.771065
Sandford, A., Burton, A.M.: Tolerance for distorted faces: challenges to a configural processing account of familiar face recognition. Cognition 132(3), 262–268 (2014). https://doi.org/10.1016/j.cognition.2014.04.005
Wang, Y.-Q.: An analysis of the Viola-Jones face detection algorithm. Image Process. Line 4, 128–148 (2014). https://doi.org/10.5201/ipol.2014.104
Winarno, E., Hadikurniawati, W., Nirwanto, A.A., Abdullah, D.: Multi-view faces detection using Viola-Jones method. J. Phys. Conf. Ser. 1114(1) (2018). https://doi.org/10.1088/1742-6596/1114/1/012068
Xie, P., et al.: Adaptive VP8 steganography based on deblocking filtering. In: IH and MMSec 2019 - Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, pp. 25–30 (2019). https://doi.org/10.1145/3335203.3335711
Yap, M.H., Ugail, H., Zwiggelaar, R., Rajoub, B.: Facial image processing for facial analysis. In: Proceedings - International Carnahan Conference on Security Technology, July 2016, pp. 198–204 (2010). https://doi.org/10.1109/CCST.2010.5678706
Zehra, N., Sharma, M., Ahuja, S., Bansal, S.: Bio-authentication-based secure transmission system using steganography. 8(1), 318–324 (2010). http://arxiv.org/abs/1005.4264
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Pilania, U., Kumar, M., Kaur, G. (2022). Region of Interest Using Viola-Jones Algorithm for Video Steganography. In: Iyer, B., Crick, T., Peng, SL. (eds) Applied Computational Technologies. ICCET 2022. Smart Innovation, Systems and Technologies, vol 303. Springer, Singapore. https://doi.org/10.1007/978-981-19-2719-5_38
Download citation
DOI: https://doi.org/10.1007/978-981-19-2719-5_38
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-2718-8
Online ISBN: 978-981-19-2719-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)