Abstract
In this research work, an efficient robust video steganography in compressed domain is presented based on discrete cosine transform (DCT) encoded with H.264 codec. In this method, a compressed video (.mp4) of different resolutions, frame rates and sizes are used as a cover and RGB image is used as a secret message. Using appropriate stego key, the secret frames from the sequence of video frames are selected and the non-dynamic pixels of these frames are identified. The least significant bits (LSB) of the DCT component of these non-dynamic pixels are used as carrier object for hiding the R, G, and B components of secret message individually. An appropriate embedding key is designed to embed secret message in cover video such that the quality assessment parameters viz. Peak signal-to-noise ratio (PSNR) and mean square error (MSE) of imperceptibility can be optimized. Also, the successful extraction of secret message from the cover stego video is assessed by the robustness parameters viz. Bit error rate (BER) and similarity (Sim). The hiding capacity of proposed video steganography with respect to secret message and cover frame is measured by using hiding ratio (HR). The efficiency of proposed video steganography method is compared with the reported methodologies on the basis of the parameters of imperceptibility and robustness.
Similar content being viewed by others
References
Mstafa RJ, Elleithy KM (2017) Compressed and raw video steganography techniques: a comprehensive survey and analysis. Multimed Tools Appl 76(20):21749–21786
Mstafa RJ, Elleithy KM, Abdelfattah E (2017) Video steganography techniques: taxonomy, challenges, and future directions. In: Applications and technology conference (LISAT), 2017 IEEE long island, pp 1–6
Liu S, Xu D (2020) A robust steganography method for HEVC based on secret sharing. Cogn Syst Res 59:207–220. https://doi.org/10.1016/j.cogsys.2019.09.008
Shukur WA, Abdullah WN, Qurban LK (2018) Information hiding in digital video using DCT, DWT and CvT. J Phys Conf Ser 1003:1–19
Mstafa RJ, Elleithy KM (2016) A DCT-based robust video steganographic method using BCH error correcting codes. In: 2016 IEEE long island systems, applications and technology conference (LISAT), IEEE 2016
Mstafa RJ, Elleithy KM (2016) A novel video steganography algorithm in DCT domain based on hamming and BCH codes. In: 37th IEEE sarnoff symposium, pp 208–213, IEEE 2016. https://doi.org/10.1109/SARNOF.2016.7846757
Mstafa RJ, Elleithy KM, Abdelfattah E (2017) A robust and secure video steganography method in DWT-DCT domains based on multiple object tracking and ECC. In: IEEE access (volume 5), IEEE – Institute of Electrical Electronics Engineers, Inc., pp 5354–5365, 6 April 2017 (ISSN No.: 2169-3536). https://doi.org/10.1109/ACCESS.2017.2691581
Idbeaa T, Samad SA, Husain H (2016) A secure and robust compressed domain video steganography for intra- and interframes using embedding-based byte differencing (EBBD) scheme. PLoS ONE. https://doi.org/10.1371/journal.pone.0150732
Britanak V, Rao KR (2000) Two-dimensional DCT/DST universal computational structure for block sizes. IEEE Trans Signal Process. https://doi.org/10.1109/78.875483
Richardson IE (2010) The H.264 advanced video compression standard. Wiley Publications (ISBN: 978-0-470-51692-8)
Liu Y, Liu S, Wang Y, Zhao H, Liu Si (2018) Video steganography: a review. Neurocomputing. https://doi.org/10.1016/j.neucom.2018.09.091
Remega video database. https://github.com/remega/video_database/tree/master/videos. Accessed 8 Nov 2017
Video compression Guru, Elecard Video. https://www.elecard.com/videos. Accessed June 2019
PETS 2009 Benchmark Data, Miami, Florida. http://www.cvg.reading.ac.uk/PETS2009/a.html. Accessed 25 June 2009
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Patel, R., Lad, K., Patel, M. et al. An efficient DCT-SBPM based video steganography in compressed domain. Int. j. inf. tecnol. 13, 1073–1078 (2021). https://doi.org/10.1007/s41870-021-00648-4
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s41870-021-00648-4