当前位置: X-MOL 学术J. Electron. Imaging › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Robust approach of video steganography using combined keypoints detection algorithm against geometrical and signal processing attacks
Journal of Electronic Imaging ( IF 1.0 ) Pub Date : 2020-07-16 , DOI: 10.1117/1.jei.29.4.043007
Suganthi Kumar 1 , Rajkumar Soundrapandiyan 1
Affiliation  

Abstract. To secure the secret communication, a robust video steganography algorithm is proposed. The major objectives of the proposed method (PM) are: (1) perceiving the region of interest (ROI) keypoints’ locations in video frames for concealing the secret data and (2) determining the appropriate amount of data to be embedded into the perceived ROI keypoints’ region. In the PM, keypoints are initially extracted from each video frame using scale-invariant feature transform (SIFT) and a speeded-up robust features (SURF) descriptor against a set of predefined geometrical and signal processing attacks. Next, ROI keypoints are generated by comparing the SIFT and SURF keypoint descriptors of the original frame and attacked versions of the frame. Then ROI keypoints are divided into four least significant bit (LSB) groups to determine the embedding capacity of each ROI keypoint. Subsequently, the secret data are encrypted using a symmetric key-based shift cipher to provide an additional security layer for secret communication. Finally, the encrypted secret data have been embedded into the ROI keypoints using the LSB substitution method based on the four LSB groups’ values. The PM is tested on 22 standard benchmark videos. The efficiency of the PM is evaluated in terms of the perceptual invisibility, robustness, and concealing capacity. From experimental results, it is observed that the PM outperforms contemporary methods by attaining significant outcomes.

中文翻译:

使用组合关键点检测算法对抗几何和信号处理攻击的视频隐写术的鲁棒方法

摘要。为了保护秘密通信,提出了一种鲁棒的视频隐写算法。所提出的方法(PM)的主要目标是:(1)感知视频帧中感兴趣区域(ROI)关键点的位置以隐藏秘密数据和(2)确定要嵌入到感知中的适当数据量ROI 关键点区域。在 PM 中,针对一组预定义的几何和信号处理攻击,最初使用尺度不变特征变换 (SIFT) 和加速鲁棒特征 (SURF) 描述符从每个视频帧中提取关键点。接下来,通过比较原始帧和帧的攻击版本的 SIFT 和 SURF 关键点描述符来生成 ROI 关键点。然后将 ROI 关键点分为四个最低有效位 (LSB) 组,以确定每个 ROI 关键点的嵌入容量。随后,使用基于对称密钥的移位密码对秘密数据进行加密,为秘密通信提供额外的安全层。最后,使用基于四个 LSB 组值的 LSB 替换方法将加密的秘密数据嵌入到 ROI 关键点中。PM 在 22 个标准基准视频上进行了测试。PM 的效率是根据感知不可见性、鲁棒性和隐藏能力来评估的。从实验结果可以看出,PM 通过获得显着的结果优于当代方法。秘密数据使用基于对称密钥的移位密码进行加密,为秘密通信提供额外的安全层。最后,使用基于四个 LSB 组值的 LSB 替换方法将加密的秘密数据嵌入到 ROI 关键点中。PM 在 22 个标准基准视频上进行了测试。PM 的效率是根据感知不可见性、鲁棒性和隐藏能力来评估的。从实验结果可以看出,PM 通过获得显着的结果优于当代方法。秘密数据使用基于对称密钥的移位密码进行加密,为秘密通信提供额外的安全层。最后,使用基于四个 LSB 组值的 LSB 替换方法将加密的秘密数据嵌入到 ROI 关键点中。PM 在 22 个标准基准视频上进行了测试。PM 的效率是根据感知不可见性、鲁棒性和隐藏能力来评估的。从实验结果可以看出,PM 通过获得显着的结果优于当代方法。PM 的效率是根据感知不可见性、鲁棒性和隐藏能力来评估的。从实验结果可以看出,PM 通过获得显着的结果优于当代方法。PM 的效率是根据感知不可见性、鲁棒性和隐藏能力来评估的。从实验结果可以看出,PM 通过获得显着的结果优于当代方法。
更新日期:2020-07-16
down
wechat
bug