Conference PaperPDF Available

An Efficient Video Steganography Algorithm Based on BCH Codes

Authors:

Abstract and Figures

In this paper, in order to improve the security and efficiency of the steganography algorithm, we propose an efficient video steganography algorithm based on the binary BCH codes. First the pixels’ positions of the video frames’ components are randomly permuted by using a private key. Moreover, the bits’ positions of the secret message are also permuted using the same private key. Then, the secret message is encoded by applying BCH codes (n, k, t), and XORed with random numbers before the embedding process in order to protect the message from being read. The selected embedding area in each Y, U, and V frame components is randomly chosen, and will differ from frame to frame. The embedding process is achieved by hiding each of the encoded blocks into the 3-2-2 least significant bit (LSB) of the selected YUV pixels. Experimental results have demonstrated that the proposed algorithm have a high embedding efficiency, high embedding payload, and resistant against hackers.
Content may be subject to copyright.
2015 ASEE Northeast Section Conference
1
© American Society for Engineering Education, 2015
An Efficient Video Steganography Algorithm Based on BCH Codes
Ramadhan J. Mstafa and Khaled M. Elleithy
Department of Computer Science and Engineering
University of Bridgeport
Bridgeport, CT 06604, USA
rmstafa@my.bridgeport.edu elleithy@bridgeport.edu
Abstract
In this paper, in order to improve the security and efficiency of the steganography algorithm, we
propose an efficient video steganography algorithm based on the binary BCH codes. First the
pixels positions of the video frames’ components are randomly permuted by using a private key.
Moreover, the bits positions of the secret message are also permuted using the same private key.
Then, the secret message is encoded by applying BCH codes (n, k, t), and XORed with random
numbers before the embedding process in order to protect the message from being read. The
selected embedding area in each Y, U, and V frame components is randomly chosen, and will
differ from frame to frame. The embedding process is achieved by hiding each of the encoded
blocks into the 3-2-2 least significant bit (LSB) of the selected YUV pixels. Experimental results
have demonstrated that the proposed algorithm have a high embedding efficiency, high
embedding payload, and resistant against hackers.
Keywords
Video Steganography, BCH Codes, Linear Block Code, Embedding Efficiency, Embedding
Payload.
Introduction
Due to technological advances and the speed of the Internet, people are concerned that their
personal information will be stolen by hackers. In today’s society, many data hiding algorithms
and steganographic algorithms have been introduced in order to protect valuable information.
Steganography is one of the methods that protects and hides valuable data from unauthorized
people without hackers having any suspicion of the data’s existence. The Human Visual System
(HVS) cannot recognize a slight change that occurs in the cover data such as audio, image and
video1,2. Unfortunately, many strong steganography analyzing tools have been provided to
unauthorized users in order for them to retrieve valuable secret data previously embedded in
cover objects. The weakness of some steganography algorithms occur through steganalytical
detectors because of the lack of security and embedding efficiency in these algorithms.
The embedding efficiency and the embedding payload are two important factors that every
successful steganography system should take into consideration3. First, the steganography
scheme that has a high embedding efficiency translates to a good visual quality of stego data and
a less amount of host (carrier) data are going to be changed4. Any obvious distortion to the
viewers will increase the probability of the attacker's suspicion, and the secret information can be
easily detected by some of the steganalysis tools5. These kinds of schemes are difficult to detect
2015 ASEE Northeast Section Conference
2
© American Society for Engineering Education, 2015
by the steganalytical detectors. The security of the steganography scheme depends directly on the
embedding efficiency6. Second, a high embedding payload means that the capacity of secret
information to be hidden inside host data is large. These two factors, embedding efficiency and
embedding payload, contradict one another. Once, the data embedding efficiency is increased,
the data embedding payload is decreased. These two factors will change depending on the users
requirements and the type of steganography scheme4,7. The remainder of the paper is organized
as follows: Section 2 presents some related work. Section 3 introduces an overview of the Linear
Block Code and BCH codes, and then presents the proposed steganography algorithm. Section 4
presents experimental results and discussion. Section 5 provides the conclusion.
Related Work
Feng et al. proposed a novel of a video steganography scheme based on motion vectors as carrier
data in order to embed the secret message in H.264 video compression processing. The algorithm
also uses the principle of linear block codes to reduce motion vectors modification rate. The
algorithm has a good visual quality of stego data, which is proved by the low modification rate of
motion vectors. The Peak Signal to Noise Ratio that was obtained in both Flower and Foreman
videos are more than 37 dB8. Hao et al. proposed a novel video steganography method based on
a motion vector by using matrix encoding. A motion vector component that has high amplitude
among both horizontal and vertical components is chosen to embed the secret message. The HVS
can identify the change that occurs when the object is moving slowly. However, if the same
object moves quickly, the HVS will not be able to recognize the change that occurs. Motion
vectors with large sizes are selected for embedding the secret messages. The macro blocks that
are moving quickly will generate motion vectors with large amplitudes. The direction of macro
blocks depends on the motion vectors components. For example, if the vertical component is
equal to zero, then the macro block direction is moving vertically. The visual quality of the tested
videos that were obtained is more than 36 dB9. Rongyue et al. proposed an efficient BCH coding
for steganography which is embedding the secret information inside a block of cover data by
changing some coefficients. Authors have improved the computational time of the system and
the complexity becomes low because of the system’s linearity10. Liu et al. proposed a robust
data hiding scheme in an H.264 compressed video stream, where they have prevented a drift of
intra-frame distortion. To give the system more robustness, the authors have encoded the
message using BCH codes before the embedding process. The host data is the DCT coefficients
of the luminance Intra frame component. The obtained results have a high visual quality and
robustness against hackers11.
The Proposed Steganography Algorithm
The proposed algorithm uses an uncompressed video stream which is based on the frames as still
images. The video sequences are divided into frames, and each frame’s color space is converted
to YCbCr. The reason for using YCbCr color space is to remove the correlation between Red,
Green, and Blue colors. The luminance (Y) component represents the brightness data, which the
human eye is more sensitive to than the other color components. As a result, the chrominance
(CbCr) components can be subsampled in the video stream and some information might be
discarded.
2015 ASEE Northeast Section Conference
3
© American Society for Engineering Education, 2015
A. Linear block codes
Any specific block code is defined as a linear block code if the sum of any two codewords equals
a new codeword. Furthermore, a binary linear block code includes a linear block code that
contains a block of binary bits. A binary linear block code (n, k) consists of  columns and
rows in a linear code array. This code is an n-dimensional vector space and a k-
dimensional subspace. N refers to the length of the
codeword and K refers to the number of symbols in each codeword. In the standard array, it is
not possible for two equal vectors to exist in the same row. For example, if C is a (n, k) code on
the Galois Field GF (2), then:
Each coset has  vectors.
All F vectors of length n belong to coset of C.
If C+Z is a coset of C and F as belonging to (C+Z), then C+Z=C+F.
B. BCH codes (7, 4, 1)
Bose, Chaudhuri, and Hocquenghem invented the BCH encoder. It is one of the most powerful
random cyclic code methods, which can be used for detecting and correcting errors in a block of
data. The BCH codes are different from the Hamming codes because BCH can correct more than
one bit. A binary BCH (n, k, t) can correct errors of a maximum t bits for codewords of the
length n  and message length k. Encoded codewords and
messages can both be interpreted as polynomials, where 
and. When m and t are any positive integers where 
and, there will be a binary BCH codes with the following properties:
Block codeword length
Message length k
Maximum correctable error bits t
Minimum distance  
Parity check bits 
The BCH codes inventors decided that the generator polynomial g(x) will be the polynomial of
the lowest degree in the Galois field GF (2), with  as roots on the condition that
is a primitive of  When is a minimal polynomial of where ,
then the least common multiple (LCM) of 2t minimal polynomials will be the generator
polynomial g(x). In this paper, the BCH codes (7, 4, 1) is used. The parity-check matrix H of the
BCH codes12,13 is described as follows:








(1)
2015 ASEE Northeast Section Conference
4
© American Society for Engineering Education, 2015
C. Data embedding stage
Data embedding is the process of hiding a secret message inside cover videos. This process
converts the video stream into frames. Each frame separates into the Y, U and V components of
color space. For security purposes, the pixels positions of Y, U, and V components are permuted
by using a special key (Key1). Also, characters of the secret message are converted into an array
of binary bits. In order to change the bits positions of the secret message, the entire bits
positions within the array are permuted using Key1. After permutation, the array is divided into
4-bit blocks. Then, each block is encoded by the BCH (7, 4, 1) encoder. The outcome of the 7-bit
encoded block (consists of 4-bit message and 3-bit parity) is XORed with the 7-bit number.
These numbers are randomly generated by using Key2. In order to select the locations for hiding
the secret message into the frame components, Key2 is utilized. In other words, Key2 chooses
random rows and columns for data embedding in each disordered Y, U, and V component. The
embedding process is achieved by hiding each of encoded blocks into the 3-2-2 LSB of the
selected YUV pixels. The pixels of the YUV components will be repositioned in order to the
original frame pixel positions to produce the stego frames. Finally, the stego video is constructed
from these stego frames. The block diagrams of the data embedding stage and the data extracting
stage are illustrated in Fig. 1 and Fig. 2, respectively.
Fig. 1: Block diagram for data embedding stage.
2015 ASEE Northeast Section Conference
5
© American Society for Engineering Education, 2015
D. Data extracting stage
Data extracting is the process of retrieving the secret message from the stego videos. This
process is achieved by converting the distorted videos into frames. Then, each frame is
partitioned into Y, U and V components. In every Y, U, and V component, the pixels’ positions
are permuted by using Key1. The process of extracting the secret message from YUV
components is accomplished by taking out 3-2-2 LSB in each selected pixel. The obtained
message block will be XORed with the 7-bit number that is generated by using Key2. The
outcomes of 7 bits are decoded by the BCH (7, 4, 1) decoder in order to produce 4-bit blocks.
These blocks are stored into a binary array. Since the message of entire bits is permutated prior
to the data embedding process, the permutation process of the entire binary array to the original
bits order will be performed again. Then, the binary array of bits will be converted into the
characters of the secret message. The purpose of using two keys and the XOR operation is to
improve the security and robustness of the proposed algorithm. These keys are only shared
between sender and receiver, and used in both the data embedding and extracting processes.
Fig. 2: Block diagram for data extracting stage.
2015 ASEE Northeast Section Conference
6
© American Society for Engineering Education, 2015
Experimental Results and Discussion
A database of eight standard of Common Interchange Format (CIF) video sequences is used,
with the video resolutions equaled to (288 x 352), and the format represented by 4:2:0 YUV.
Video sequences are equal in length to 300 frames. A text file consisting of alphabet characters is
used as a secret message. This work is implemented using MATLAB program to test the
proposed algorithm’s performance. The Peak Signal to Noise Ratio (PSNR) is a visual quality
measurement which is used to compute the difference between the original and the stego video
frames. PSNR is calculated by the following equation:
 
 
And Mean Square Error (MSE) is calculated as follows:
 

 

Where O and S denote the original and stego YUV frame components, respectively, and m and n
are the video resolutions.
Fig. 3 illustrates the PSNRs of 300 stego frames for the Hall video. In Fig. 4, the PSNRs of 300
Stefan stego video frames are shown. Fig. 5 illustrates the PSNRs of 300 stego frames for the
Foreman video. By using our proposed algorithm, the obtained visual quality is similar to the
original videos’ visual quality. In general, PSNRs are greater than 55 dB, and the V component
has a better visual quality among the three components. The reason of V component has a better
visual quality among other components is because V component has a longest wavelength.
Fig. 3: PSNR of 300 stego frames for the Hall video.
2015 ASEE Northeast Section Conference
7
© American Society for Engineering Education, 2015
In Table 1, the PSNR for eight video sequences is shown for each Y, U, and V component,
separately. The visual quality of the stego videos is the same as the original videos visual
quality because all PSNR values are greater than 55 dB.
TABLE 1 THE AVERAGES OF PSNRY, PSNRU, AND PSNRV FOR
ALL VIDEOS
Sequences
Frame No.
PSNRY
PSNRU
PSNRV
Hall
1-100
55.401
56.34
56.52
101-200
55.357
56.324
56.649
201-300
55.317
56.459
56.638
Stefan
1-100
55.381
56.388
57.031
101-200
55.359
56.378
57.058
201-300
55.359
56.343
57.028
Coastguard
1-100
55.335
56.064
56.454
101-200
55.324
56.082
56.406
201-300
55.323
56.055
56.395
Mobile
1-100
55.321
56.546
56.667
101-200
55.306
56.517
56.608
201-300
55.285
56.456
56.57
Foreman
1-100
55.287
56.484
56.621
101-200
55.297
56.479
56.616
201-300
55.285
56.463
56.605
Container
1-100
55.362
56.527
56.665
101-200
55.329
56.476
56.674
201-300
55.334
56.464
56.672
News
1-100
55.527
56.567
56.381
101-200
55.512
56.539
56.369
201-300
55.498
56.535
56.364
Akiyo
1-100
55.385
56.482
56.561
101-200
55.31
56.511
56.564
201-300
55.348
56.481
56.504
2015 ASEE Northeast Section Conference
8
© American Society for Engineering Education, 2015
Fig. 4: PSNR of 300 stego frames for the Stefan video.
Fig. 5: PSNR of 300 stego frames for the Foreman video.
Fig. 6 shows the comparison of the visual quality between eight stego videos. The PSNR of each
component, Y, U, and V is separately calculated, in which the average equals 300 frames per
video. The values of PSNRs are between 55 and 57 dBs, which are considered excellent visual
quality results.
2015 ASEE Northeast Section Conference
9
© American Society for Engineering Education, 2015
Fig. 6: Comparison between the averages of the PSNRY, PSNRU, and PSNRV components for
eight video sequences
Conclusion
In this paper, an efficient video steganography based on the BCH codes concepts has been
proposed. The proposed steganography algorithm utilized frames as still images. It divides the
video stream into frames, and then converts the frames to the YUV format. This algorithm is
considered a high embedding efficiency algorithm due to the low modification on the cover data
that translates into perfect visual quality in the stego videos. The visual quality is measured by
the PSNR metric, and all the obtained experimental results have a PSNR above 55 dB. By
achieving a good visual quality for stego videos, hackers will have difficulty retrieving secret
messages. The security of our proposed algorithm has been satisfied by having more than one
key to embed and extract the secret message. In addition to the secret keys that we have used, we
also encoded and decoded the message with the BCH codes (7, 4, 1).
Experimental results prove both a high embedding efficiency and a high embedding payload of
the proposed algorithm exist. The visual qualities of the stego videos are the same as the original
video visual qualities. The PSNR of stego videos is above 55 dB. In each video frame, the
embedding capacity is 246 Kbits, and can increase up to 405 Kbits without any noticeable
degradation in the visual quality.
References
1. Yuh-Ming, H. and J. Pei-Wun. Two improved data hiding schemes. in Image and Signal Processing
(CISP), 2011 4th International Congress on. 2011.
2. Mstafa, R.J. and C. Bach. Information Hiding in Images Using Steganography Techniques. in American
Society for Engineering Education (ASEE Zone 1), 2013 Zone 1 Conference. 2013.
3. Mstafa, R.J. and K.M. Elleithy. A highly secure video steganography using Hamming code (7, 4). in
Systems, Applications and Technology Conference (LISAT), 2014 IEEE Long Island. 2014.
2015 ASEE Northeast Section Conference
10
© American Society for Engineering Education, 2015
4. Chin-Chen, C., T.D. Kieu, and C. Yung-Chen. A High Payload Steganographic Scheme Based on (7, 4)
Hamming Code for Digital Images. in Electronic Commerce and Security, 2008 International Symposium
on. 2008.
5. Guangjie, L., et al. An Adaptive Matrix Embedding for Image Steganography. in Multimedia Information
Networking and Security (MINES), 2011 Third International Conference on. 2011.
6. Jyun-Jie, W., et al. An embedding strategy for large payload using convolutional embedding codes. in ITS
Telecommunications (ITST), 2012 12th International Conference on. 2012.
7. Mstafa, R.J. and K.M. Elleithy. A Novel Video Steganography Algorithm in the Wavelet Domain Based on
the KLT Tracking Algorithm and BCH Codes. in Systems, Applications and Technology Conference
(LISAT), 2015 IEEE Long Island. 2015.
8. Feng, P., et al. Video steganography using motion vector and linear block codes. in Software Engineering
and Service Sciences (ICSESS), 2010 IEEE International Conference on. 2010.
9. Hao, B., L.-Y. Zhao, and W.-D. Zhong. A novel steganography algorithm based on motion vector and
matrix encoding. in Communication Software and Networks (ICCSN), 2011 IEEE 3rd International
Conference on. 2011.
10. Rongyue, Z., et al., An Efficient Embedder for BCH Coding for Steganography. Information Theory, IEEE
Transactions on, 2012. 58(12): p. 7272-7279.
11. Liu, Y., et al., A Robust Data Hiding Algorithm for H. 264/AVC Video Streams. Journal of Systems and
Software, 2013.
12. Hoyoung, Y., et al., Area-Efficient Multimode Encoding Architecture for Long BCH Codes. Circuits and
Systems II: Express Briefs, IEEE Transactions on, 2013. 60(12): p. 872-876.
13. Mstafa, R.J. and K.M. Elleithy. A High Payload Video Steganography Algorithm in DWT Domain Based
on BCH Codes (15, 11). in Wireless Telecommunications Symposium (WTS), 2015. 2015.
Ramadhan J. Mstafa
Ramadhan J. Mstafa is originally from Duhok, Kurdistan Region, Iraq. He is pursuing his PhD
degree in Computer Science and Engineering at the University of Bridgeport, Bridgeport,
Connecticut, USA. He received his Bachelor’s degree in Computer Science from the University
of Salahaddin, Erbil, Iraq. Mr. Mstafa received his Master’s degree in Computer Science from
University of Duhok, Duhok, Iraq. He is IEEE Student Member. His research areas of interest
include image processing, mobile communication, security, and steganography.
Prof. Khaled M. Elleithy
Dr. Elleithy is the Associate Vice President of Graduate Studies and Research at the University
of Bridgeport. He is a professor of Computer Science and Engineering. He has research interests
are in the areas of wireless sensor networks, mobile communications, network security, quantum
computing, and formal approaches for design and verification. He has published more than three
hundred research papers in international journals and conferences in his areas of expertise. Dr.
Elleithy has more than 25 years of teaching experience. His teaching evaluations are
distinguished in all the universities he joined. He supervised hundreds of senior projects, MS
theses and Ph.D. dissertations. He supervised several Ph.D. students. He developed and
introduced many new undergraduate/graduate courses. He also developed new teaching /
research laboratories in his area of expertise. Dr. Elleithy is the editor or co-editor for 12 books
by Springer. He is a member of technical program committees of many international conferences
as recognition of his research qualifications. He served as a guest editor for several International
Journals. He was the chairman for the International Conference on Industrial Electronics,
Technology & Automation, IETA 2001, 19-21 December 2001, Cairo Egypt. Also, he is the
General Chair of the 2005-2013 International Joint Conferences on Computer, Information, and
Systems Sciences, and Engineering virtual conferences.
... Initially, the pixel positions of Y, U, and V components in the cover frames are altered using a specific key. The secret data is encoded using hamming code and the resulted encoded data is further [84]. The proposed work followed the same color space conversion and pixel position alteration scheme introduced in [81]. ...
Article
Full-text available
Video steganography approach enables hiding chunks of secret information inside video sequences. The features of video sequences including high capacity as well as complex structure make them more preferable for choosing as cover media over other media such as image, text, or audio. Video steganography is a prominent as well as the evolving field in the information security domain and significant number of video steganography methods are proposed in recent years. This article provides a comprehensive review of video steganography methods proposed in the literature. This article initially reviews various raw domain-based video steganography methods. In particular, the raw domain-based methods include spatial domain approaches such as least significant bits (LSB), transform domain-based methods such as discrete wavelet transform, discrete cosine transform, etc. Furthermore, the article looks into various compressed domain steganography methods. A critical comparative analysis is included in the article to analyze and contrast the steganography methods proposed in the literature. A brief description of various evaluation matrices for video steganography methods is provided in this article. Moreover, a brief introduction to steganalysis and video steganalysis is provided. The article concludes with a discussion focused on the limitations and challenges of the video steganography methods. Further, a brief insight into future directions in video steganography systems is provided.
... The second thing is to develop a method that achieve as high data hiding efficiency as possible in the cover file. The more efficient the hidden data is; the less data load will be [3]. Many algorithms have been used for steganography, some of which are complex because they need a long time to hide secret data, while others are characterized by simplicity and flexibility and least complexity of hiding secret data as in the Least Significant Bit (LSB) [4]. ...
Article
In this paper, we present Modify Deep Hiding Extraction Algorithm (MDHEA) that is a steganography algorithm with Multi-Level Steganography (MLS) and color image segmentation. Through experimental results, MDHEA shows improvement in the results of previous works by securing encrypted secret data against attacks. We use segmentation to choose the appropriate segment, pass it on the cover image, calculate the value of the change at the pixel of the segment and select the best segment and its location in the cover image based on the least effect. MDHEA applies multi-level steganography to hide the confidential data in color images to ensure the integrity of the hidden data and obtain the largest volume of hidden data without distorting the image of the stego image. To reduce distortion in the cover image due to hiding a large amount of secret data and obtaining a high-quality stego image after hiding the secret data, we implement the Blue Smoothing Algorithm (BSA) to achieve smoothing the largest possible number of pixels in the image.
... R J Mstafa et al. [30] proposed an approach in which secret text message is encrypted using BCH codes [31] and this encrypted message is concealed into DCT coefficients of every Y, U & V planes of video frames. The author also use two different types of videos consists of fast & slow-moving object for hiding the message. ...
Conference Paper
Full-text available
In the current modern era the transmission of any confidential information over any communication network is an important concern. We can secure any message using the concept of cryptography or embedding the private message into any multimedia file like text, audio, image & video. If we use both concepts separately then it is not more effective in the context of security. So, the combination of both concepts means combination of cryptography and steganography provides more security to the confidential message. In this review paper we analyse the several combinations of cryptographic and steganographic algorithms over different multimedia messages.
... The practice of inserting a private message into a cover video is known as video steganography. It is utilized in a variety of applications, including copyright, remote access, health fields, and enforcement agencies [14][15][16]. ...
Article
Full-text available
The rapid transmission of multimedia information has been achieved mainly by recent advancements in the Internet's speed and information technology. In spite of this, advancements in technology have resulted in breaches of privacy and data security. When it comes to protecting private information in today's Internet era, digital steganography is vital. Many academics are interested in digital video because it has a great capability for concealing important data. There have been a vast number of video steganography solutions developed lately to guard against the theft of confidential data. The visual imperceptibility, robustness, and embedding capacity of these approaches are all challenges that must be addressed. In this paper, a novel solution to reversible video steganography based on Discrete Wavelet Transform (DWT) and Quick Response (QR) codes is proposed to address these concerns. In order to increase the security level of the suggested method, an enhanced ElGamal cryptosystem has also been proposed. Prior to the embedding stage, the suggested method uses the modified ElGamal algorithm to encrypt secret QR codes. Concurrently, it applies two-dimensional DWT on the Y-component of each video frame resulting in Approximation (LL), Horizontal (LH), Vertical (HL), and Diagonal (HH) sub-bands. Then, the encrypted Low (L), Medium (M), Quantile (Q), and High (H) QR codes are embedded into the HL sub-band, HH sub-band, U-component, and V-component of video frames, respectively, using the Least Significant Bit (LSB) technique. As a consequence of extensive testing of the approach, it was shown to be very secure and highly invisible, as well as highly resistant to attacks from Salt & Pepper, Gaussian, Poisson, and Speckle noises, which has an average Structural Similarity Index (SSIM) of more than 0.91. Aside from visual imperceptibility, the suggested method exceeds current methods in terms of Peak Signal-to-Noise Ratio (PSNR) average of 52.143 dB, and embedding capacity 1 bpp.
... The effectiveness of any such steganographic method is measured though both detectability (through steganalysis tools), as well as the embedding payload size allowed through the method [17]. There is generally a trade-off between these two factors: as detectability decreases, so does payload size, and vice versa [18]. Other concerns include transparency and robustness. ...
... ., w n−1 } of length n and a message A = {a 0 , a 1 , a 2 , . . ., a k−1 } of length k [41]. An embedded codeword C = {c 0 , c 1 , c 2 , . . ...
Article
Nowadays, the science of information hiding has gained tremendous significance due to advances in information and communication technology. The performance of any steganographic algorithm relies on the embedding efficiency, embedding payload, and robustness against attackers. Low hidden ratio, less security, and low quality of stego videos are the major issues of many existing steganographic methods. In this paper, we propose a novel video steganography method in discrete cosine transform (DCT) domain based on error correcting codes (ECC). To improve the security of the proposed algorithm, a secret message is first encrypted and encoded by using Hamming and BCH codes. Then, it is embedded into the DCT coefficients of video frames. The hidden message is embedded into DCT coefficients of each Y, U, and V planes excluding DC coefficients. The proposed algorithm is tested under two types of videos that contain slow and fast moving objects. The experiential results of the proposed algorithm are compared with three existing methods. The comparison results show that our proposed algorithm outperformed other algorithms. The hidden ratio of the proposed algorithm is approximately 27.53%, which is considered as a high hiding capacity with a minimal tradeoff of the visual quality. The robustness of the proposed algorithm was tested under different attacks.
... These techniques have been preferred recently for information hiding as information could be hidden in the frames so that its security can be improved. This is due to the fact that human eyes cannot recognize it compared to the simple data [17,18]. ...
Article
Full-text available
Recent developments in the speed of the Internet and information technology have made the rapid exchange of multimedia information possible. However, these developments in technology lead to violations of information security and private information. Digital steganography provides the ability to protect private information that has become essential in the current Internet age. Among all digital media, digital video has become of interest to many researchers due to its high capacity for hiding sensitive data. Numerous video steganography methods have recently been proposed to prevent secret data from being stolen. Nevertheless, these methods have multiple issues related to visual imperceptibly, robustness, and embedding capacity. To tackle these issues, this paper proposes a new approach to video steganography based on the corner point principle and LSBs algorithm. The proposed method first uses Shi-Tomasi algorithm to detect regions of corner points within the cover video frames. Then, it uses 4-LSBs algorithm to hide confidential data inside the identified corner points. Besides, before the embedding process, the proposed method encrypts confidential data using Arnold's cat map method to boost the security level. Experimental results revealed that the proposed method is highly secure and highly invisible, in addition to its satisfactory robustness against Salt & Pepper noise, Speckle noise, and Gaussian noise attacks, which has an average Structural Similarity Index (SSIM) of more than 0.81. Moreover, the results showed that the proposed method outperforms state-of-the-art methods in terms of visual imperceptibility, which offers excellent peak signal-to-noise ratio (PSNR) of average 60.7 dB, maintaining excellent embedding capacity. INDEX TERMS Arnold's Cat map, corner detector, embedding capacity, imperceptibility, robustness, security, video steganography.
Conference Paper
Full-text available
The internet plays a key role in transferring information or data from one organization to another organization. But anyone can modify and misuse the valuable information through hacking at the time. Steganography plays a very important role in hiding the secret data or information inside the digitally covered information. The hidden message can be text, image, speech or even video .Steganography is a type of cryptography in which the secret message is hidden in a digital picture but here the message, as well as the fact that a secret communication is taking place, is hidden. The hided data can embedded in a video file and it can be extracted in a proper way. In this review paper hiding a Text in Image Using STool has been described.
Conference Paper
Full-text available
Video steganography has become a popular topic due to the significant growth of video data over the Internet. The performance of any steganography algorithm depends on two factors: embedding efficiency and embedding payload. In this paper, a high embedding payload of video steganography algorithm has been proposed based on the BCH coding. To improve the security of the algorithm, a secret message is first encoded by BCH(n,k,t) coding. Then, it is embedded into the discrete wavelet transform (DWT) coefficients of video frames. As the DWT middle and high frequency regions are considered to be less sensitive data, the secret message is embedded only into the middle and high frequency DWT coefficients. The proposed algorithm is tested under two types of videos that contain slow and fast motion objects. The results of the proposed algorithm are compared to both the Least Significant Bit (LSB) and [1] algorithms. The results demonstrate better performance for the proposed algorithm than for the others. The hiding ratio of the proposed algorithm is approximately 28%, which is evaluated as a high embedding payload with a minimal tradeoff of visual quality. The robustness of the proposed algorithm was tested under various attacks. The results were consistent.
Conference Paper
Full-text available
Recently, video steganography has become a popular option for a secret data communication. The performance of any steganography algorithm is based on the embedding efficiency, embedding payload, and robustness against attackers. In this paper, we propose a novel video steganography algorithm in the wavelet domain based on the KLT tracking algorithm and BCH codes. The proposed algorithm includes four different phases. First, the secret message is preprocessed, and BCH codes (n, k, t) are applied in order to produce an encoded message. Second, face detection and face tracking algorithms are applied on the cover videos in order to identify the facial regions of interest. Third, the process of embedding the encoded message into the high and middle frequency wavelet coefficients of all facial regions is performed. Forth, the process of extracting the secret message from the high and middle frequency wavelet coefficients for each RGB components of all facial regions is accomplished. Experimental results of the proposed video steganography algorithm have demonstrated a high embedding efficiency and a high embedding payload.
Conference Paper
Full-text available
Video steganography has become a popular topic due to the significant growth of video data over the Internet. The performance of any steganography algorithm depends on two factors: embedding efficiency and embedding payload. In this paper, a high embedding payload of video steganography algorithm has been proposed based on the BCH coding. To improve the security of the algorithm, a secret message is first encoded by BCH(n,k,t) coding. Then, it is embedded into the discrete wavelet transform (DWT) coefficients of video frames. As the DWT middle and high frequency regions are considered to be less sensitive data, the secret message is embedded only into the middle and high frequency DWT coefficients. The proposed algorithm is tested under two types of videos that contain slow and fast motion objects. The results of the proposed algorithm are compared to both the Least Significant Bit (LSB) and [1] algorithms. The results demonstrate better performance for the proposed algorithm than for the others. The hiding ratio of the proposed algorithm is approximately 28%, which is evaluated as a high embedding payload with a minimal tradeoff of visual quality. The robustness of the proposed algorithm was tested under various attacks. The results were consistent.
Conference Paper
Full-text available
people are becoming more worried about information being hacked by attackers. Recently, many algorithms of steganography and data hiding have been proposed. Steganography is a process of embedding the secret information inside the host medium (text, audio, image and video). Concurrently, many of the powerful steganographic analysis software programs have been provided to unauthorized users to retrieve the valuable secret information that was embedded in the carrier files. Some steganography algorithms can be easily detected by steganalytical detectors because of the lack of security and embedding efficiency. In this paper, we propose a secure video steganography algorithm based on the principle of linear block code. Nine uncompressed video sequences are used as cover data and a binary image logo as a secret message. The pixels' positions of both cover videos and a secret message are randomly reordered by using a private key to improve the system's security. Then the secret message is encoded by applying Hamming code (7, 4) before the embedding process to make the message even more secure. The result of the encoded message will be added to random generated values by using XOR function. After these steps that make the message secure enough, it will be ready to be embedded into the cover video frames. In addition, the embedding area in each frame is randomly selected and it will be different from other frames to improve the steganography scheme's robustness. Furthermore, the algorithm has high embedding efficiency as demonstrated by the experimental results that we have obtained. Regarding the system's quality, the Pick Signal to Noise Ratio (PSNR) of stego videos are above 51 dB, which is close to the original video quality. The embedding payload is also acceptable, where in each video frame we can embed 16 Kbits and it can go up to 90 Kbits without noticeable degrading of the stego video's quality.
Conference Paper
Full-text available
people are becoming more worried about information being hacked by attackers. Recently, many algorithms of steganography and data hiding have been proposed. Steganography is a process of embedding the secret information inside the host medium (text, audio, image and video). Concurrently, many of the powerful steganographic analysis software programs have been provided to unauthorized users to retrieve the valuable secret information that was embedded in the carrier files. Some steganography algorithms can be easily detected by steganalytical detectors because of the lack of security and embedding efficiency. In this paper, we propose a secure video steganography algorithm based on the principle of linear block code. Nine uncompressed video sequences are used as cover data and a binary image logo as a secret message. The pixels' positions of both cover videos and a secret message are randomly reordered by using a private key to improve the system's security. Then the secret message is encoded by applying Hamming code (7, 4) before the embedding process to make the message even more secure. The result of the encoded message will be added to random generated values by using XOR function. After these steps that make the message secure enough, it will be ready to be embedded into the cover video frames. In addition, the embedding area in each frame is randomly selected and it will be different from other frames to improve the steganography scheme's robustness. Furthermore, the algorithm has high embedding efficiency as demonstrated by the experimental results that we have obtained. Regarding the system's quality, the Pick Signal to Noise Ratio (PSNR) of stego videos are above 51 dB, which is close to the original video quality. The embedding payload is also acceptable, where in each video frame we can embed 16 Kbits and it can go up to 90 Kbits without noticeable degrading of the stego video's quality.
Conference Paper
Full-text available
Innovation of technology and having fast Internet make information to distribute over the world easily and economically. This is made people to worry about their privacy and works. Steganography is a technique that prevents unauthorized users to have access to the important data. The steganography and digital watermarking provide methods that users can hide and mix their information within other information that make them difficult to recognize by attackers. In this paper, we review some techniques of steganography and digital watermarking in both spatial and frequency domains. Also we explain types of host documents and we focused on types of images.
Article
This brief presents a new area-efficient multimode encoder for long Bose-Chaudhuri-Hocquenghen codes. In the proposed multimode encoding architecture, several short linear-feedback shift registers (LFSRs) are cascaded in series to achieve the same functionality that a long LFSR has, and the output of a short LFSR is fed back to the input side to support multimode encoding. Whereas previous multimode architectures necessitate huge overhead due to preprocessing and postprocessing, the proposed architecture completely eliminates the overhead by exploiting an efficient transformation. Without sacrificing the latency, the proposed architecture reduces hardware complexity by up to 97.2% and 49.1% compared with the previous Chinese-remainder-theorem-based and weighted-summation-based multimode architectures, respectively.
Article
This paper presents a robust readable data hiding algorithm for H.264/AVC video streams without intra-frame distortion drift. We first encode the embedded data using BCH (n, k, t) syndrome code before data hiding to improve robustness, then we embed the encoded data into coefficients of the 4x4 luminance discrete cosine transform (DCT) blocks in I frames which meet our conditions to avert the distortion drift, and finally we recover the original video as much as possible when the hidden data is extracted out. The experimental results show that our scheme can get more robustness, effectively avert intra-frame distortion drift and get high visual quality.
Conference Paper
A matrix embedding (ME) code is a commonly used steganographic technique that used linear block codes to perform the embedding process. However, a lack of low-complexity maximum-likelihood decoding schemes in linear block codes limited the embedding efficiency for sufficiently large lengths. This paper proposes a novel and practical hiding algorithm for binary data based on convolutional codes. Compared to a matrix embedding algorithm that uses linear block codes, the method proposed in this study is appropriate for embedding a sufficiently long message into a cover object. The proposed method employs the Viterbi decoding algorithm for embedding to identify the coset leader of convolutional codes for large payloads. Experimental results show that the embedding efficiency of the proposed scheme using convolutional codes is substantially superior to that of the scheme using linear block codes.
Article
This paper presents an improved data hiding technique based on BCH (n,k,t ) coding. The proposed embedder hides data into a block of input data by modifying some coefficients in the block in order to null the syndrome. The proposed embedder can hide data with less computational time and less storage capacity compared to the existing methods. The complexity of the proposed method is linear while that of other methods are exponential for any block size n. Thus, it is easy to extend this method to a large n. The BCH syndrome coding for steganography is now viable ascribed to the reduced complexity and its simplicity of the proposed embedder.