Advertisement

A Highly Secure Video Steganography Inside DWT Domain Hinged on BCD Codes

  • Sonali Rana
  • Rosepreet Kaur Bhogal
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 624)

Abstract

Prime need of hiding data from eavesdroppers is accomplished by the use of steganography, which is an area of research from years. Steganography is an artifice and science of hiding information inside a medium. Modern mediums are text, image, audio tracks and video streams. After the evolution of Internet, wide researches have been carried out on video steganography due to high capacity of information been stored in a video file. Hiding of information in a video file can be achieved in a variety of ways. Each and every technique used has its own merits and demerits. In this paper, a highly secure video steganography has been propounded rooted on BCD coding. To ameliorate the collateral of the algorithm, the covert message is first encoded by BCD coding. Then, it is implanted in the DWT coefficients of video frames. The middle and high frequencies zones of DWT are regarded as less sensitive to HVS, so the covert message is implanted only into mesial and high frequency DWT coefficients. The results of propounded algorithm are correlated with the LSB insertion method. The results manifest superior performance for propounded algorithm as compared to LSB insertion method, hence shows minimal trade-off of visual quality.

Keywords

BCD (Binary coded decimal) codes DWT (Discrete wavelet transform) Eavesdroppers HVS (Human visual system) LSB (Least significant bit) Video steganography 

References

  1. 1.
    Eric Cole, Hiding in Plain Sight: Steganography and the Art of Covert Communication, Canada: Wiley, 2003.Google Scholar
  2. 2.
    Mennatallah M. Sadek, Amal S. Khalifa & Mostafa G.M. Mostafa, “Video steganography: a comprehensive review,” Springer, pp. 1–32, Mar 2014.Google Scholar
  3. 3.
    Prabakaran. G & Bhavani. R, “A modified secure digital image steganography based on discrete wavelet transform,” IEEE, pp. 1096–1100, 2012.Google Scholar
  4. 4.
    R. Zhang, et al., “Fast BCH Syndrome Coding for Steganography,” in Information Hiding. vol. 5806, S. Katzenbeisser and A.-R. Sadeghi, Eds., ed: Springer Berlin Heidelberg, pp. 48–58, 2009.Google Scholar
  5. 5.
    Ramadhan J. Mstafa and Khaled M. Elleithy, “A high payload video steganography algorithm in DWT domain based on BCH codes (15, 11),” IEEE, pp. 1–9, Apr 2015.Google Scholar
  6. 6.
    Ramadhan J. Mstafa and Khaled M. Elleithy, “A highly secure video steganography using hamming codes (7, 4),” IEEE, pp. 1–6, 2015.Google Scholar
  7. 7.
    Ramadhan J. Mstafa and Khaled M. Elleithy, “A video steganography algorithm based on kanade-lucas-tomasi tracking algorithm and error correcting codes,” Springer, vol. 75, issue 17, pp. 10311–10333, Sept 2016.Google Scholar
  8. 8.
    R. O. El Safy, H. H. Zayed &A. El Dessouki, “An adaptive steganographic technique based on integer wavelet transform,” IEEE, pp. 111–117, 2009.Google Scholar
  9. 9.
    S. Faragallah, “Efficient video watermarking based on singular value decomposition in the discrete wavelet transform domain,” AEU - International Journal of Electronics and Communications, vol. 67, pp. 189–196, 2013.Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  1. 1.Lovely Professional UniversityPhagwaraIndia

Personalised recommendations