Conference PaperPDF Available

A Novel Video Steganography Algorithm in DCT Domain Based on Hamming and BCH Codes

Authors:
A Novel Video Steganography Algorithm in DCT
Domain Based on Hamming and BCH Codes
Ramadhan J. Mstafa, IEEE Student Member
Department of Computer Science and Engineering
University of Bridgeport
Bridgeport, CT 06604, USA
rmstafa@my.bridgeport
.
edu
Khaled M. Elleithy, IEEE Senior Member
Department of Computer Science and Engineering
University of Bridgeport
Bridgeport, CT 06604, USA
elleithy@bridgeport.edu
Abstract— In the past decade, the science of information
hiding has gained tremendous significance due to advances in
information and communication technology. The performance of
any steganographic algorithm relies on the embedding efficiency,
embedding payload, and robustness against attackers. Low
hidden ratio, less security, and low quality of stego videos are the
major issues of many existing steganographic methods. In this
paper, we propose a novel video steganography method in DCT
domain based on Hamming
and BCH codes. To improve the
security of the proposed algorithm, a secret message is first
encrypted and encoded by using BCH codes. Then, it is
embedded into the discrete cosine transform (DCT) coefficients
of video frames. The hidden message is embedded into DCT
coefficients of each Y, U, and V planes excluding DC coefficients.
The proposed algorithm is tested under two types of videos that
contain slow and fast moving objects. The experiential results of
the proposed algorithm are compared with three existing
methods. The comparison results show that our proposed
algorithm outperformed other algorithms. The hidden ratio of
the proposed algorithm is approximately 27.53%, which is
considered as a high hiding capacity with a minimal tradeoff of
the visual quality. The robustness of the proposed algorithm was
tested under different attacks.
Keywords
Video Steganography; Hamming Codes; BCH
Codes; DCT; Embedding Efficiency; Embedding Payload;
Robustness
I.
I
NTRODUCTION
Steganography is a process that involves hiding important
information (message) inside other carrier (cover) data to
protect the message from unauthorized users. The mixed data
(stego objects) will be seen by the Human Visual System
(HVS) as one piece of data because the HVS will not be able to
recognize the small change that occurs in the cover data.
Message and cover data could be any type of data format such
as text, audio, image, and video [1]. The development of
steganalysis tools weakens unsecure steganography schemes
and rendering them useless. Hence, researchers have to
develop secure steganography algorithms that are protected
from both attackers and steganalysis detectors. Any successful
steganography system should consider two main important
factors: embedding payload and embedding efficiency [2].
First, the embedding payload is defined as the amount of
secret information that is going to be embedded inside the
cover data. The algorithm has a high embedding payload if it
has a large capacity for the secret message. The embedding
efficiency includes the stego visual quality, security, and
robustness against attackers. Second, both a low modification
rate and good quality of the cover data lead to a high
embedding efficiency [3]. The steganography algorithm that
contains a high embedding efficiency will reduce attacker
suspicion of finding hidden data and will be quite difficult to
detect through steganalysis tools. However, any distortion to
the cover data after the embedding process occurs will increase
the attention of attackers [4]. The embedding efficiency is
directly affected by the security of the steganographic scheme
[5]. In traditional steganographic schemes, embedding payload
and embedding efficiency are opposite. Increasing the capacity
of the secret message will decrease the quality of stego videos
that then weakens the embedding efficiency [6]. Both factors
should be considered. The deciding factors depend on the
steganography algorithm and the user requirements [3]. To
improve steganographic schemes, many of the algorithms use
matrix encoding and block code principles such as Hamming,
BCH, and Reed-Solomon codes [7]. The contributions of this
paper will provide “a state of the art” embedding algorithm in
the frequency domain that uses error correcting codes. In
addition, we proposed a novel video steganographic method in
DCT domain based on Hamming and BCH codes. This method
produces a reasonable tradeoff between quality, hiding
capacity, and robustness.
The remainder of this paper is organized as follows:
Section 2 presents some of the related works. Section 3
discusses discrete cosine transform. Section 4 explains some
principles of Hamming and BCH codes. Section 5 presents the
embedding and extracting phases of the proposed
steganography methodology. Section 6 illustrates and explains
the experimental results. Section 7 contains the conclusions.
II. R
ELATED
W
ORKS
In 2012, Zhang et al. proposed an efficient embedder using
BCH code for steganography. The embedder conceals the
secret message into a block of cover data. The embedding
process is completed by changing various coefficients in the
input block in order to make the syndrome values null. The
efficient embedder improves both storage capacity and
computational time compared with other algorithms.
According to the system complexity, Zhang’s algorithm
improves the system complexity from exponential to linear
[8]. In 2013, Liu et al. proposed a robust steganography
scheme using H.264/AVC compressed video stream without a
distortion drift in the intra-frame. The prevention of the intra-
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in
the Sarnoff 2016 proceedings.
978-1-5090-1539-9@2016 IEEE 208
frame distortion drift can be achieved using the directions of
the intra-frame prediction. Some blocks will be selected as
cover data for embedding the secret information. This process
will depend on the prediction of the intra-frame modes of
neighboring blocks to avert the distortion that propagates from
the adjacent blocks. To improve system efficiency and
robustness, Liu et al. applied BCH code to the message prior to
the embedding process. Then, the encoded message is
embedded into the 4x4 DCT block of quantized coefficients
with only a luminance component of the intra-frame [9]. In
2014, Diop et al. proposed an adaptive steganography
algorithm using a linear error correcting code, referred to as the
low-density parity-check (LDPC) code. The algorithm explains
how to minimize the effect of secret message insertion using
the LDPC code. For that purpose, Diop et al. demonstrated that
the LDPC code is a better encoding algorithm than all other
codes [10].
Previously mentioned algorithms are not robust against
various kinds of attacks. According to their embedding
payload, flexibility exists to increase the capacity of a secret
message. In this paper, we propose a video steganography
method in DCT coefficients based on error correcting codes.
III. D
ISCRETE
C
OSINE
T
RANSFORM
(DCT)
DCT is a well-known method which is utilized in many
applications such as image and video compression. The DCT
separates the signal into low, middle, and high frequency
regions. The DCT is closely related to the discrete Fourier
transform (DFT). It is a separable linear transformation; that is,
the 2D-DCT is equivalent to a 1D-DCT performed along a
single dimension followed by a 1D-DCT in the other
dimension [11]. For an input video frame, A, of resolution M x
N the DCT frequency coefficients for the transformed frame, B,
and the inverse DCT coefficients of the reconstructed frame
are calculated according to the following equations,
respectively:
ܤ
௣௤
ൌן
ן
෍෍ܣ
௠௡
ேିଵ
௡ୀ଴
ெିଵ
௠ୀ଴
ܿ݋ݏߨʹ݉ͳ݌
ʹܯ ܿ݋ݏߨʹ݊ͳݍ
ʹܰ ሺͳሻ
ܣ
௠௡
ൌ෍෍ן
ן
ܤ
௣௤
ேିଵ
௤ୀ଴
ெିଵ
௣ୀ଴
ܿ݋ݏߨሺʹ݉ͳሻ݌
ʹܯ ܿ݋ݏߨሺʹ݊ͳሻݍ
ʹܰ ሺʹሻ
Where ן
ൌ൞
ξ
ǡ݌Ͳ
ǡͳ൑݌൑ܯെͳ
And
ן
ە
ۖ
۔
ۖ
ۓ
ͳ
ξܰǡݍͲ
ʹ
ܰǡͳ൑ݍ൑ܰെͳ
A (m, n) is the pixel value in row m and column y of the
frame A, and B (p, q) is the coefficient in row p and column q
of the 2D-DCT matrix. Each of low, middle, and high
frequency coefficients were used as cover data to embed the
encoded secret message [12].
IV. H
AMMING AND
BCH
C
ODES
In this paper, Hamming (7, 4) codes are used (n=7, k=4, and
p=3), which can correct the identification of a single bit error. A
message of size ܯሺ݉
ǡ݉
ǡǥǡ݉
is encoded by adding
݌ሺ݌
ǡ݌
ǡ݌
extra bits as parity to become a codeword of 7-bit
length. The codeword is prepared to transmit through a
communication channel to the receiver end. The common
combination of both message and parity data using these type of
codes is to place the parity bits at the position of ʹ
(i=0, 1, ..., n-
k) such as
ǡ
ǡ
ǡ
ǡ
ǡ
ǡ
combination.
In addition of hamming codes, BCH (7, 4, 1) codes is also
used over the ʹ
ǡ where m=3, k=4, and ݊ൌʹ
െͳൌ͹.
Bose, Chaudhuri, and Hocquenghem invented the BCH
encoder. It is one of the most powerful random cyclic code
methods, which can be used for detecting and correcting errors
in a block of data. The BCH code is different from the
Hamming code because BCH can correct more than one bit.
The BCH codes inventors decided that the generator
polynomial g(x) will be the polynomial of the lowest degree in
the Galois field GF (2), with ןǡן
ǡן
ǡǥǡן
ଶ௧
as roots on the
condition that ן is a primitive of ʹ
Ǥ When
is a
minimal polynomial ofן
whereͳ൑݅൑ʹݐ, then the least
common multiple (LCM) of 2t minimal polynomials will be
the generator polynomial g(x). The g(x) function and the
parity-check matrix H of the BCH codes [13, 14] are described
as follows:
ܪൌۏ
ێ
ێ
ێ
ێ
ێ
ۍ
ͳןן
ן
ǥן
௡ିଵ

ͳן
ן
ן
ǥן
௡ିଵ
ͳן
ן
ן
ǥן
௡ିଵ
ǤǤǤǤǤ
ǤǤǤǤǤ
ǤǤǤǤǤ
ͳן
ଶ௧ିଵ
ן
ଶ௧ିଵ
ן
ଶ௧ିଵ
ǥן
ଶ௧ିଵ
௡ିଵ
ے
ۑ
ۑ
ۑ
ۑ
ۑ
ې
(3)
݃ݔൌ݈ܿ݉ܯ
ݔǡܯ
ݔǡܯ
ݔǡǥǡܯ
ଶ௧
ݔ
(4)
݃ሺݔሻܯ
ݔܯ
ݔܯ
ݔǥܯ
ଶ௧ିଵ
ݔ
(5)
A binary BCH (n, k, t) can correct errors of a maximum t
bits for a codeword ܹൌሼݓ
ǡݓ
ǡݓ
ǡǥǡݓ
௡ିଵ
of length n and
a message ܣൌሼܽ
ǡܽ
ǡܽ
ǡǥǡܽ
௞ିଵ
of length k [15]. An
embedded codeword ܥൌܿ
ǡܿ
ǡܿ
ǡǥǡܿ
௡ିଵ
ሽ is calculated as
follows:
ܥܹכܪ
ሺ͸ሻ
At the receiver side, the codeword ܴൌሼݎ
ǡݎ
ǡݎ
ǡǥǡݎ
௡ିଵ
is obtained. The transmitted and received codewords can both
be interpreted as polynomials, where ܥܺൌܿ
൅ܿ
ݔ
ڮ൅ܿ
௡ିଵ
ݔ
௡ିଵ
ǡ andܴܺൌݎ
൅ݎ
ݔ
൅ڮ൅ݎ
௡ିଵ
ݔ
௡ିଵ
. The
error E is the difference between C and R, which indicates the
number and location of flipped elements in C. The E and
syndrome Y are calculated as follows:
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in
the Sarnoff 2016 proceedings.
978-1-5090-1539-9@2016 IEEE 209
ܧܴܥሺ͹ሻ
ܻܴെܥܪ
ൌܧܪ
ሺͺሻ
V. T
HE
P
ROPOSED
S
TEGANOGRAPHY
M
ETHODOLOGY
In this section, we proposed a novel video steganography
algorithm in DCT domain based on Hamming and BCH (7, 4,
1) codes. At the beginning, the video sequence is separated into
frames; each frame is converted to YCbCr color space. The
reason for converting to YCbCr color space is to remove the
correlation between the red, green, and blue colors. The
proposal methodology consists of data embedding stage and
data extracting stage.
Data Embedding Stage
For a security purpose, the hidden message is encrypted
using a secret key, and then Hamming and BCH (7, 4, 1) codes
will be applied on it producing an encoded message. The whole
encoded message is converted from binary to base-8 digits. On
the other hand, each video sequence is converted into a number
of frames. Each frame separates into the YUV color space.
Then, 2D-DCT is applied individually on each plane.
Subsequently, the process of embedding is achieved by
concealing each base-8 digit of the encoded message into the
DCT frequency coefficients except the DC coefficients of each
of the Y, U, and V planes. Thereafter, the inverse of 2D-DCT
is applied on the three stego components of each frame
producing a stego frame. Finally, the stego video is constructed
from these stego frames. The secret message is concealed into
each of
୧୨
ǡ
୧୨
ǡ
୧୨
DCT coefficients as follows:
ܻ
௜௝
ൌቊܧܾ݉݁݀݀݅݊݃ሺܻ
௜௝
ǡܦ
ሻǢܻ
௜௝
൒Ͳ
ܧܾ݉݁݀݀݅݊݃ሺܾܽݏሺܻ
௜௝
ሻǡܦ
ሻǢܻ
௜௝
൏Ͳ(9)
ܷ
௜௝
ൌቊܧܾ݉݁݀݀݅݊݃ሺܷ
௜௝
ǡܦ
ሻǢܷ
௜௝
൒Ͳ
ܧܾ݉݁݀݀݅݊݃ሺܾܽݏሺܷ
௜௝
ሻǡܦ
ሻǢܷ
௜௝
൏Ͳ(10)
ܸ
௜௝
ൌቊܧܾ݉݁݀݀݅݊݃ሺܸ
௜௝
ǡܦ
ሻǢܸ
௜௝
൒Ͳ
ܧܾ݉݁݀݀݅݊݃ሺܾܽݏሺܸ
௜௝
ሻǡܦ
ሻǢܸ
௜௝
൏Ͳ(11)
Where
୧୨
ǡ
୧୨
ǡ
୧୨
are DCT coefficients of stego Y, U,
and V planes respectively, and ܦ
is the encoded digits,ܦ
ͲͲͲǡǥǡͳͳͳ. The block diagram of the data embedding stage
is illustrated in Fig. 1.
Data Extracting Stage
Data extracting is the process of retrieving the encoded
message from the stego videos. This process is achieved by
isolating the stego videos into frames. Each frame is divided
into Y, U, and V planes. Then, 2D-DCT is applied separately
on each plane. The process of extracting the encoded message
is accomplished by taking ܦ
digits from each of Y, U, and V
DCT coefficients, respectively, except DC coefficients. The
outcomes data are decoded by Hamming and BCH (7, 4, 1)
decoder followed by the deciphering process to extract the
valid embedded message. The purpose of using ciphering and
encoding methods prior the embedding process is to improve
the security and robustness of the proposed algorithm.
Moreover, the secret key is only shared between sender and
receiver, and used in both the data embedding and extracting
processes. The hidden message can be obtained as follows:
ܦ
ൌ൝ܧݔݐݎܽܿݐ݅݊݃൫ܻ
௜௝
൯Ǣሺܻ
௜௝
൒Ͳ
ܧݔݐݎܽܿݐ݅݊݃ቀܾܽݏ൫ܻ
௜௝
൯ቁǢሺܻ
௜௝
൏Ͳ(12)
ܦ
ൌ൝ܧݔݐݎܽܿݐ݅݊݃൫ܷ
௜௝
൯Ǣሺܷ
௜௝
൒Ͳ
ܧݔݐݎܽܿݐ݅݊݃ቀܾܽݏ൫ܷ
௜௝
൯ቁǢሺܷ
௜௝
൏Ͳ(13)
ܦ
ൌ൝ܧݔݐݎܽܿݐ݅݊݃൫ܸ
௜௝
൯Ǣሺܸ
௜௝
൒Ͳ
ܧݔݐݎܽܿݐ݅݊݃ቀܾܽݏ൫ܸ
௜௝
൯ቁǢሺܸ
௜௝
൏Ͳ(14)
Where
୧୨
ǡ
୧୨
ǡ
୧୨
are DCT coefficients of stego YUV
planes, and ܦ
is the retrieved secret message. The block
diagram of the data extracting process of the proposed
steganography algorithm is shown in Fig. 2.
Input: V //Video,
M //Secret message in characters,
Key
1
, Key
2
; //Stego keys
Output: SV; //Stego video
Initialize km, pm;
B і M; //Convert the alphabetic secret message to the binary
array
// Stego keys
Key
1
і Length(B)/4; //Length of the secret message
Key
2
і rand (2^7,Key
1
,1)'; //Randomization of the seed Key
1
EB і Encrypt(B, [Key
1
]); //Encrypt the binary array by Key
1
//Encode each 4 bits of encrypted message by Hamming and BCH
(7, 4, 1) codes
for
1
i = 1: (Key
1
*7) do
g(1:4) і get(EB(km:km+4));
E_EB і encode(g,7,4);
temp(1:7) і get(Key
2
(i));
Ecdmsg(pm:pm+7) і xor(E_EB,temp);
pm+7; km+4;
end
1
D і Ecdmsg; //Encoded message is segmented into 3-bit groups
{Vf
1
, Vf
2
,…, Vf
n
} і V; //Video V is divided into n frames
{Y, U, V} і Vf; //Each frame Vf is converted into Y, U, and V
components
DCT (Y, U, V); //Applying 2D-DCT on each frame components
//Embed the encoded message into YUV coefficients
for
2
i = 1:Vfx do
for
3
j= 1:Vfy do
࢏࢐
ൌቊࡱ࢓࢈ࢋࢊࢊ࢏࢔ࢍሺࢅ
࢏࢐
ǡࡰ
ሻǢ
࢏࢐
൒૙
ࡱ࢓࢈ࢋࢊࢊ࢏࢔ࢍሺࢇ࢈࢙ሺࢅ
࢏࢐
ሻǡ
ሻǢ
࢏࢐
൏૙
࢏࢐
ൌቊࡱ࢓࢈ࢋࢊࢊ࢏࢔ࢍሺࢁ
࢏࢐
ǡࡰ
ሻǢ
࢏࢐
൒૙
ࡱ࢓࢈ࢋࢊࢊ࢏࢔ࢍሺࢇ࢈࢙ሺࢁ
࢏࢐
ሻǡ
ሻǢ
࢏࢐
൏૙
࢏࢐
ൌቊࡱ࢓࢈ࢋࢊࢊ࢏࢔ࢍሺࢂ
࢏࢐
ǡࡰ
ሻǢ
࢏࢐
൒૙
ࡱ࢓࢈ࢋࢊࢊ࢏࢔ࢍሺࢇ࢈࢙ሺࢂ
࢏࢐
ሻǡ
ሻǢ
࢏࢐
൏૙
end
3
end
2
IDCT (
,
,
); //Applying 2D-IDCT on each frame component
get SVf //Obtain the stego frames
get SV //Obtain the stego video
Fig. 1 Data Embedding Algorithm
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in
the Sarnoff 2016 proceedings.
978-1-5090-1539-9@2016 IEEE 210
Input: SV; //Stego video
Key
1
, Key
2
; //Stego keys
Output: M; //Secret message in characters
Initialize km, pm;
{Sf
1
, Sf
2
,…, Sf
n
} і SV; //Stego Video SV is divided into n frames
{
,
,
} і Sf; //Each frame Sf is converted into Y, U, and V
components
DCT (
,
,
); //Applying 2D-DCT on each stego frame component
//Extract the encoded message from stego YUV coefficients
for
1
i = 1:Sfx do
for
2
j= 1:Sfy do
ൌ൝ࡱ࢚࢞࢘ࢇࢉ࢚࢏࢔ࢍ൫ࢅ
࢏࢐
൯Ǣሺࢅ
࢏࢐
൒૙
ࡱ࢚࢞࢘ࢇࢉ࢚࢏࢔ࢍቀࢇ࢈࢙൫ࢅ
࢏࢐
൯ቁǢሺࢅ
࢏࢐
൏૙

ൌ൝ࡱ࢚࢞࢘ࢇࢉ࢚࢏࢔ࢍ൫ࢁ
࢏࢐
൯Ǣሺࢁ
࢏࢐
൒૙
ࡱ࢚࢞࢘ࢇࢉ࢚࢏࢔ࢍቀࢇ࢈࢙൫ࢁ
࢏࢐
൯ቁǢሺࢁ
࢏࢐
൏૙
ࡰ
ൌ൝ࡱ࢚࢞࢘ࢇࢉ࢚࢏࢔ࢍ൫ࢂ
࢏࢐
൯Ǣሺࢂ
࢏࢐
૙ሻ
ࡱ࢚࢞࢘ࢇࢉ࢚࢏࢔ࢍቀࢇ࢈࢙൫ࢂ
࢏࢐
൯ቁǢሺࢂ
࢏࢐
൏૙
end
2
end
1
Ecdmsg і D; //Collect all 3-bit messages into a single array
//Decode each 7 bits of extracted data by Hamming and BCH (7,
4, 1) decoders
for
3
i = 1: (Key
1
*7) do
Sg(1:7) і get(Ecdmsg (km:km+7));
temp(1:7) і get(Key
2
(i));
E_EB і xor(Sg,temp)
EB і decode(E_EB ,7,4);
pm+4; km+7;
end
3
B і Decrypt(EB, [Key
1
]); //Decrypt the binary array by Key
1
M і B; //Convert the binary array to the alphabetic characters
get M //Obtain the secret message
Fig. 2 Data Extracting Algorithm
VI. E
XPERIMENTAL
R
ESULTS AND
D
ISCUSSION
The experimental environment uses several variables: the
cover data comprise a dataset consisting of six video sequences
Akiyo
,
Bus, Coastguard
,
Container, Foreman, and Soccer
of
CIF type; also, the format of YUV is 4:2:0. In addition, the
resolution of each video isሺ͵ͷʹʹͺͺሻ, and all videos are
equal in length with 150 frames. A large text file is used as a
secret message. The work is implemented using MATLAB to
test the proposed algorithm efficiency.
Visual Quality
Pick signal to noise ratio (PSNR) is an objective quality
measurement used to calculate the difference between the
original and the stego video frames. It can be obtained by
following equations [16]:
ܴܲܵܰͳͲכܮ݋݃
ଵ଴
ܯܣܺ
ܯܵܧ ሺͳͷሻ
ܯܵܧσσሾܱሺ݅ǡ݆ሻ
௝ୀଵ
௜ୀଵ
െܵ݅ǡ݆
݉כ݊ ሺͳ͸ሻ
Where O and S denote the original and stego YUV frame
components, respectively, and m and n are the video
resolutions. In Fig. 3, the PSNR of the Y-components are
calculated for all six videos. Overall, the
Akiyo
video has the
best luminance quality. Fig. 4 shows the PSNR of the U-
component for all six videos. The PSNR-U of the
Coastguard
video has the highest dBs among the group. Fig. 5 shows the
PSNR of the V-component for all experiments. The PSNR-V
for the
Coastguard
video has a better quality among all videos.
In Fig. 6, the PSNR comparison for 150 frames of each video
is shown. The comparison shows that the result of the objective
quality for each of the
Akiyo
,
Bus, Coastguard
,
Container,
Foreman, and Soccer
videos ranged between 38.95-42.73 dBs.
Overall, the results of the PSNR for the
Akiyo
,
Bus,
Container
,
and
Foreman
videos are more stable, while in the
Coastguard
and
Soccer
videos the quality is frequently changing. The
changes occur because these videos contain faster motion
objects that lead to unstable visual quality. Table I shows the
averages of the PSNR for each Y, U, and V component for all
video sequences. Moreover, the visual quality of each video is
measured separately by averaging each of the 150 frames per
video. The quality averages are various and depend on type of
videos.
Fig. 3 PSNR Comparisons for the Y-Components of All six Videos
Fig. 4 PSNR Comparisons for the U-Component of All six Videos
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in
the Sarnoff 2016 proceedings.
978-1-5090-1539-9@2016 IEEE 211
Fig. 5 PSNR Comparisons for the V-Component of All six Videos
Fig. 6 PSNR Comparisons for 150 Frames of All six Videos
TABLE I. T
HE
A
VERAGE
PSNR
FOR
E
ACH
Y,
U,
AND
V
C
OMPONENT
FOR
A
LL
S
IX
V
IDEOS
Sequences PSNRY PSNRU PSNRV PSNR
Akiyo
43.33 35.14 42.16 40.21
Bus
35.96 39.78 41.10 38.95
Coastguard
39.45 43.69 44.93 42.69
Container
37.91 40.71 39.28 39.30
Foreman
39.82 40.63 41.21 40.55
Soccer
42.85 41.40 43.94 42.73
Average
39.88 40.22 42.10 40.73
Embedding Payload
The average of the obtained hidden ratio of the proposed
algorithm is 27.53%. A reasonable tradeoff is noticed between
the amount of the embedded message in each video (5.99
Mbytes) and the average quality of six experiments (40.73 dB).
The hidden ratio (HR) can be calculated as in equation 17.
A number of experiments were conducted to compare the
performance of the proposed with three existing methods.
Table II illustrates the comparison of our proposed method
with the three existing methods in the literature, according to
the PSNR and the amount of secret data. Consequently, our
proposed algorithm outperformed three existing methods.
Table III shows the amount of secret message of proposed
algorithm in each Y, U, and V planes.
TABLE II. P
ERFORMANCE
C
OMPARISON OF THE
P
ROPOSED
A
LGORITHM
WITH
O
THER
A
CCORDING TO BOTH
PSNR
AND
H
IDDEN
R
ATIO
Criteria Patel et
al. [17]
Alavianmehr
et al. [18]
Hu et al.
[19]
Proposed
Algorithm
PSNR
(dB)
31.23 36.97 29.03
40.73
Hidden
Ratio
12.5% 1.34% 18.75%
27.53%
ܪܴܵ݅ݖ݁
݋݂
ܾ݁݉݁݀݀݁݀
݉݁ݏݏܽ݃݁
ܸ݅݀݁݋
ݏ݅ݖ݁ ͳͲͲΨ

ሺͳ͹ሻ
TABLE III. E
MBEDDING
C
APACITY OF THE
P
ROPOSED
A
LGORITHM
Video Resolution YUV Proposed Algorithm
(Bits/Frame)
352 x 288
Y 223344
U 55836
V 55836
Robustness
To measure the robustness of the proposed algorithm, the
Similarity (Sim) metric has been utilized. This metric is used to
test whether the extracted secret message has been corrupted
during communication [20]. The Sim Ͳ൑ܵ݅݉൑ͳcan be
calculated as in the following equation [21]:
ܵ݅݉σσሾܯሺ݅ǡ݆
௝ୀଵ
௜ୀଵ
ܯ
݅ǡ݆
σσܯሺ݅ǡ݆ሻ
௝ୀଵ
௜ୀଵ
ൈσσܯ
݅ǡ݆
௝ୀଵ
௜ୀଵ
ሺͳͺሻ
where ܯܯ
are the embedded and extracted secret
messages, respectively, and a and b are the dimensions of the
secret message array. The algorithm is tested under different
types of attacks (Gaussian noise with the zero mean and
variance=0.01 and 0.001, Salt & pepper noise with the
density=0.01 and 0.001, and median filtering). To achieve the
robustness of the algorithm, the higher Sim must be obtained.
Table IV illustrates the robustness of the proposed algorithm
under attacks while it retrieves the hidden data with a high Sim.
VII. C
ONCLUSION
A novel video steganography method in DCT domain
based on Hamming and BCH (7, 4, 1) error correcting codes
has been proposed in this paper. The steganography algorithm
converts the video into frames; then, it divides each frame into
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in
the Sarnoff 2016 proceedings.
978-1-5090-1539-9@2016 IEEE 212
Y, U, and V components. Prior to the embedding process, the
secret message is encrypted and encoded using hamming and
BCH codes. The 2D-DCT has been applied to each YUV
components. DCT coefficients, excluding DC coefficients, are
selected for embedding the secret data.
The proposed algorithm has a high embedding payload.
The amount of the secret data in each video is approximately
5.99 Mbytes and the HR is 27.53%. The visual quality of the
stego videos is also high: the PSNR ranged between 38.95-
42.73 dBs with an Sim=1. Moreover, the experimental results
showed that the proposed algorithm is robust against several
attacks. In addition, the security of the our method is improved
by ciphering and encoding processes prior to the embedding
process. The result of comparison shows that the proposed
algorithm outperformed three existing algorithms. For future
work, we would like to improve the embedding payload of the
proposed algorithm with the respect of the video quality by
using other techniques that operate in frequency domain. Also,
we would like to conduct efficient linear block codes to
enhance the security of the algorithm.
TABLE IV. S
IM
V
ALUES OF THE
P
ROPOSED
A
LGORITHM
U
NDER
A
TTACKS
No
attacks
(Salt & Pepper)
density=
(Gaussian
white)
variance= Median
filtering
Sequences 0.01 0.001 0.01 0.001
Akiyo
1 0.950 0.957 0.918 0.903 0.981
Bus
1 0.960 0.967 0.928 0.913 0.982
Coastguard
1 0.940 0.947 0.908 0.893 0.981
Container
1 0.970 0.977 0.938 0.923 0.993
Foreman
1 0.960 0.953 0.914 0.892 0.970
Soccer
1 0.918 0.926 0.897 0.868 0.954
R
EFERENCES
[1] R. J. Mstafa and K. M. Elleithy, "A video steganography
algorithm based on Kanade-Lucas-Tomasi tracking algorithm
and error correcting codes," Multimedia Tools and
Applications, pp. 1-23, 2015.
[2] R. J. Mstafa and K. M. Elleithy, "A highly secure video
steganography using Hamming code (7, 4)," in Systems,
Applications and Technology Conference (LISAT), 2014 IEEE
Long Island, 2014, pp. 1-6.
[3] C. Chin-Chen, T. D. Kieu, and C. Yung-Chen, "A High
Payload Steganographic Scheme Based on (7, 4) Hamming
Code for Digital Images," in Electronic Commerce and
Security, 2008 International Symposium on, 2008, pp. 16-21.
[4] L. Guangjie, L. Weiwei, D. Yuewei, and L. Shiguo, "An
Adaptive Matrix Embedding for Image Steganography," in
Multimedia Information Networking and Security (MINES),
2011 Third International Conference on, 2011, pp. 642-646.
[5] W. Jyun-Jie, C. Houshou, L. Chi-Yuan, and Y. Ting-Ya, "An
embedding strategy for large payload using convolutional
embedding codes," in ITS Telecommunications (ITST), 2012
12th International Conference on, 2012, pp. 365-369.
[6] R. J. Mstafa and K. M. Elleithy, "A New Video Steganography
Algorithm Based on the Multiple Object Tracking and
Hamming Codes," in 2015 IEEE 14th International Conference
on Machine Learning and Applications (ICMLA), 2015, pp.
335-340.
[7] R. Zhang, V. Sachnev, and H. Kim, "Fast BCH Syndrome
Coding for Steganography," in Information Hiding. vol. 5806,
S. Katzenbeisser and A.-R. Sadeghi, Eds., ed: Springer Berlin
Heidelberg, 2009, pp. 48-58.
[8] R. Zhang, V. Sachnev, M. B. Botnan, H. J. Kim, and J. Heo,
"An efficient embedder for BCH coding for Steganography,"
Information Theory, IEEE Transactions on, vol. 58, pp. 7272-
7279, 2012.
[9] Y. Liu, Z. Li, X. Ma, and J. Liu, "A Robust Data Hiding
Algorithm for H. 264/AVC Video Streams," Journal of
Systems and Software, 2013.
[10] I. Diop, S. M. Farss, K. Tall, P. A. Fall, M. L. Diouf, and A. K.
Diop, "Adaptive steganography scheme based on LDPC
codes," in 2014 16th International Conference on Advanced
Communication Technology (ICACT), 2014, pp. 162-166.
[11] A. K. Jain, Fundamentals of digital image processing:
Prentice-Hall, Inc., 1989.
[12] W. B. Pennebaker and J. L. Mitchell, JPEG: Still image data
compression standard: Springer Science & Business Media,
1992.
[13] Y. Hoyoung, J. Jaehwan, J. Jihyuck, and P. In-Cheol, "Area-
Efficient Multimode Encoding Architecture for Long BCH
Codes," Circuits and Systems II: Express Briefs, IEEE
Transactions on, vol. 60, pp. 872-876, 2013.
[14] R. J. Mstafa and K. M. Elleithy, "A high payload video
steganography algorithm in DWT domain based on BCH codes
(15, 11)," in Wireless Telecommunications Symposium (WTS),
2015, 2015, pp. 1-8.
[15] R. J. Mstafa and K. M. Elleithy, "An Efficient Video
Steganography Algorithm Based on BCH Codes," in American
Society for Engineering Education (ASEE Zone 1), 2015 Zone
1 Conference, Boston, 2015, p. 10.
[16] K. Muhammad, M. Sajjad, I. Mehmood, S. Rho, and S. Baik,
"A novel magic LSB substitution method (M-LSB-SM) using
multi-level encryption and achromatic component of an
image," Multimedia Tools and Applications, pp. 1-27,
2015/05/24 2015.
[17] K. Patel, K. K. Rora, K. Singh, and S. Verma, "Lazy Wavelet
Transform Based Steganography in Video," in Communication
Systems and Network Technologies (CSNT), 2013 International
Conference on, 2013, pp. 497-500.
[18] M. A. Alavianmehr, M. Rezaei, M. S. Helfroush, and A. Tashk,
"A lossless data hiding scheme on video raw data robust
against H.264/AVC compression," in Computer and
Knowledge Engineering (ICCKE), 2012 2nd International
eConference on, 2012, pp. 194-198.
[19] S. Hu and U. KinTak, "A Novel Video Steganography based on
Non-uniform Rectangular Partition," in Computational Science
and Engineering (CSE), 2011 IEEE 14th International
Conference on, 2011, pp. 57-61.
[20] R. J. Mstafa and K. M. Elleithy, "A novel video steganography
algorithm in the wavelet domain based on the KLT tracking
algorithm and BCH codes," in Systems, Applications and
Technology Conference (LISAT), 2015 IEEE Long Island,
2015, pp. 1-7.
[21] Y. He, G. Yang, and N. Zhu, "A real-time dual watermarking
algorithm of H.264/AVC video stream for Video-on-Demand
service," AEU - International Journal of Electronics and
Communications, vol. 66, pp. 305-312, 2012.
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in
the Sarnoff 2016 proceedings.
978-1-5090-1539-9@2016 IEEE 213
... Frequency domain steganography is another approach to steganography that involves embedding information in the frequency coefficients of digital media. Algorithms involving frequency domain steganography utilize mathematical transforms such as the DCT [41], the discrete wavelet transform (DWT) [42], the integer wavelet transform (IWT) [43], and the fast Fourier transform (FFT) [44] to modify the frequency coefficients of multimedia files. Frequency domain steganography enjoys a number of differentiating advantages, such as robustness against common multimedia processing operations, such as compression, filtering, or noise addition [45]. ...
... Next, they make use of an integer wavelet transform (IWT) to carry out frequency domain steganography. The authors of [41] make use of video files as cover media. First, they encrypt the sensitive data using BCH codes, then they embed it into the DCT coefficients of video frames. ...
Article
Full-text available
This research work presents a novel secured spatial steganography algorithm consisting of three stages. In the first stage, a secret message is divided into three parts, each is encrypted using a tan logistic map encryption key with a unique seed value. In the second stage, the encrypted parts are transformed into quick response codes, serving as a layer of channel coding. Subsequently, the quick response codes are decoded back into bit‐streams. To enhance security, a uniquely‐seeded Mersenne Twister key is generated and employed to apply DNA coding onto each bit‐stream. The resulting bit‐streams are then embedded in the least significant bits of the RGB channels of a cover image. Finally, the RGB channels are merged to form a single stego image. A comprehensive set of experimental analyses is conducted to evaluate the performance of the proposed secure steganography algorithm. The experimental results demonstrate the algorithm's robustness against various attacks and its ability to achieve high embedding capacity while maintaining imperceptibility. The proposed algorithm offers a promising solution for secure information hiding in the spatial domain, with potential applications in areas such as data transmission, digital forensics, and covert communication.
... The secret message is extracted from the stego file using the extraction technique, and the hidden message is integrated within the cover file using the embedding process. [11]. ...
... The secret message is extracted from the stego file using the extraction technique, and the hidden message is integrated within the cover file using the embedding process. [11]. The sender chooses the carrier file and the secret message to start the hiding process in a steganography system. ...
Article
- Steganography—the practice of hiding data in digital media—has attracted a lot of interest because of its possible uses in secure communication. This study offers a thorough summary of the most recent developments in steganography, emphasizing the incorporation of deep learning (DL) methods in particular. The review explores several steganographic techniques, classifies them, and assesses the advantages and disadvantages of each. Moreover, it reviews current research projects that use DL to improve security and resilience in steganographic systems. This evaluation finds new trends, problems, and possibilities in the field by examining related studies. The major goal is to advance this field and broaden our understanding of steganography-based secure communication.
Article
Full-text available
This paper introduces a novel steganographic technique for H.264 video that achieves an outstanding performance against state-of-the-art steganalysis techniques while maintaining real-time encoding performance constraints. The proposed technique embeds the secret message by altering the motion vectors (MVs) while preserving their local optimality and consistency feature to withstand the recently emerged steganalysis methods. Thanks to its macro-block (MB) basis architecture, the proposed technique satisfies the real-time constraints, eliminating the need to wait for the whole frame or group of pictures (GOP) and avoiding the need to perform any additional re-encoding step(s). Additionally, altering the MVs is performed in the motion estimation (ME) sub-pixel-refinement stage through a rule-based scheme that ensures each MB’s compatibility for embedding without detection by the aforementioned steganalysis methods. The proposed technique is integrated with the OpenH264 real-time video encoder and evaluated on widely used video sequences. The results prove that the proposed technique achieves a significant security performance against the steganalysis methods while maintaining an acceptable embedding rate, outperforming other state-of-the-art MV-based steganographic methods in real-time constrained environments. The proposed technique adds about 1-2%12%1-2\% overhead beyond the encoder running time. The source code is publicly available here: https://github.com/HassanMohamedGit/OpenH264-RealTime-steg.
Article
A novel data hiding approach is being proposed in this article, camouflaging secret data within a very high-quality video object. The proposed algorithm utilizes Discrete Wavelet Transform (DWT) and Discrete Cosine Transform (DCT) to hide image data, preprocessed using Arnold Transform. The novelty of this approach lies in the combination of five factors, which are – use of very high-resolution Ultra HD 4 K video as a cover object; Use of DCT coefficient in Scene Change Detection to identify cover frame; Scrambling the secret image by Arnold Transformation; Use of DCT-DWT in embedding and extraction process to that hide data in the blue plane of the RGB frame; and lastly, use of three different keys for data hiding to secure the proposed method against attacks, by adhering the Kerckhoff’s principle of a cryptosystem. Several quality metrics like Structural Content, Peak Signal-to-Noise Ratio, Normalized Cross-Correlation, Average Difference, Maximum Difference, and Normalized Absolute Error have been calculated to validate the imperceptibility. This method has also been validated against different steganalysis attacks like random cropping, rotating, resizing, noise addition, filtering, histogram attack, and lastly, compared with existing data hiding methods to prove superiority.
Conference Paper
Data mining is capable of giving and providing the hidden, unknown, and interesting information in terms of knowledge in healthcare industry. It is useful to form decision support systems for the disease prediction and valid diagnosis of health issues. The concepts of data mining can be used to recommend the solutions and suggestions in medical sector for precautionary measures to control the disease origin at early stage. Today, diabetes is a most common and life taking syndrome found all over theworld. The presence of diabetes itself is a cause tomany other health issues in the form of side effects in human body. In such cases when considered, a need is to find the hidden data patterns from diabetic data to discover the knowledge so as to reduce the invisible health problems that arise in diabetic patients. Many studies have shown that AssociativeClassification concept of dataminingworks well and can derive good outcomes in terms of prediction accuracy. This research work holds the experimental results of the work carried out to predict and detect the by-diseases in diabetic patients with the application of Associative Classification, and it discusses an improved algorithmic method of Associative Classification named Associative Classification using Maximum Threshold and Super Subsets (ACMTSS) to achieve accuracy in better terms. Keywords Knowledge · By-disease · Maximum threshold · Super subsets · ACMTSS · Associative Classification
Article
Full-text available
Most social media channels are lossy where videos are transcoded to reduce transmission bandwidth or storage space, such as social networking sites and video sharing platforms. Video transcoding makes most video steganographic schemes unusable for hidden communication based on social media. This paper proposes robust video steganography against video transcoding to construct reliable hidden communication on social media channels. A new strategy based on principal component analysis is provided to select robust embedding regions. Besides, side information is generated to label these selected regions. Side information compression is designed to reduce the transmission bandwidth cost. Then, one luminance component and one chrominance component are joined to embed secret messages and side information, notifying the receiver of correct extraction positions. Video preprocessing is conducted to improve the applicability of our proposed method to various video transcoding mechanisms. Experimental results have shown that our proposed method provides stronger robustness against video transcoding than other methods and achieves satisfactory security performance against steganalysis. Compared with some existing methods, our proposed method is more robust and reliable to realize hidden communication over social media channels, such as YouTube and Vimeo.
Article
Full-text available
Due to the significant growth of video data over the Internet, video steganography has become a popular choice. The effectiveness of any steganographic algorithm depends on the embedding efficiency, embedding payload, and robustness against attackers. The lack of the preprocessing stage, less security, and low quality of stego videos are the major issues of many existing steganographic methods. The preprocessing stage includes the procedure of manipulating both secret data and cover videos prior to the embedding stage. In this paper, we address these problems by proposing a novel video steganographic method based on Kanade-Lucas-Tomasi (KLT) tracking using Hamming codes (15, 11). The proposed method consists of four main stages: a) the secret message is preprocessed using Hamming codes (15, 11), producing an encoded message, b) face detection and tracking are performed on the cover videos, determining the region of interest (ROI), defined as facial regions, c) the encoded secret message is embedded using an adaptive LSB substitution method in the ROIs of video frames. In each facial pixel 1 LSB, 2 LSBs, 3 LSBs, and 4 LSBs are utilized to embed 3, 6, 9, and 12 bits of the secret message, respectively, and d) the process of extracting the secret message from the RGB color components of the facial regions of stego video is executed. Experimental results demonstrate that the proposed method achieves higher embedding capacity as well as better visual quality of stego videos. Furthermore, the two preprocessing steps increase the security and robustness of the proposed algorithm as compared to state-of-the-art methods.
Article
Full-text available
Image Steganography is a thriving research area of information security where secret data is embedded in images to hide its existence while getting the minimum possible statistical detectability. This paper proposes a novel magic least significant bit substitution method (M-LSB-SM) for RGB images. The proposed method is based on the achromatic component (I-plane) of the hue-saturation-intensity (HSI) color model and multi-level encryption (MLE) in the spatial domain. The input image is transposed and converted into an HSI color space. The I-plane is divided into four sub-images of equal size, rotating each sub-image with a different angle using a secret key. The secret information is divided into four blocks, which are then encrypted using an MLE algorithm (MLEA). Each sub-block of the message is embedded into one of the rotated sub-images based on a specific pattern using magic LSB substitution. Experimental results validate that the proposed method not only enhances the visual quality of stego images but also provides good imperceptibility and multiple security levels as compared to several existing prominent methods.
Conference Paper
Full-text available
In this paper, in order to improve the security and efficiency of the steganography algorithm, we propose an efficient video steganography algorithm based on the binary BCH codes. First the pixels’ positions of the video frames’ components are randomly permuted by using a private key. Moreover, the bits’ positions of the secret message are also permuted using the same private key. Then, the secret message is encoded by applying BCH codes (n, k, t), and XORed with random numbers before the embedding process in order to protect the message from being read. The selected embedding area in each Y, U, and V frame components is randomly chosen, and will differ from frame to frame. The embedding process is achieved by hiding each of the encoded blocks into the 3-2-2 least significant bit (LSB) of the selected YUV pixels. Experimental results have demonstrated that the proposed algorithm have a high embedding efficiency, high embedding payload, and resistant against hackers.
Conference Paper
Full-text available
Video steganography has become a popular topic due to the significant growth of video data over the Internet. The performance of any steganography algorithm depends on two factors: embedding efficiency and embedding payload. In this paper, a high embedding payload of video steganography algorithm has been proposed based on the BCH coding. To improve the security of the algorithm, a secret message is first encoded by BCH(n,k,t) coding. Then, it is embedded into the discrete wavelet transform (DWT) coefficients of video frames. As the DWT middle and high frequency regions are considered to be less sensitive data, the secret message is embedded only into the middle and high frequency DWT coefficients. The proposed algorithm is tested under two types of videos that contain slow and fast motion objects. The results of the proposed algorithm are compared to both the Least Significant Bit (LSB) and [1] algorithms. The results demonstrate better performance for the proposed algorithm than for the others. The hiding ratio of the proposed algorithm is approximately 28%, which is evaluated as a high embedding payload with a minimal tradeoff of visual quality. The robustness of the proposed algorithm was tested under various attacks. The results were consistent.
Conference Paper
Full-text available
Recently, video steganography has become a popular option for a secret data communication. The performance of any steganography algorithm is based on the embedding efficiency, embedding payload, and robustness against attackers. In this paper, we propose a novel video steganography algorithm in the wavelet domain based on the KLT tracking algorithm and BCH codes. The proposed algorithm includes four different phases. First, the secret message is preprocessed, and BCH codes (n, k, t) are applied in order to produce an encoded message. Second, face detection and face tracking algorithms are applied on the cover videos in order to identify the facial regions of interest. Third, the process of embedding the encoded message into the high and middle frequency wavelet coefficients of all facial regions is performed. Forth, the process of extracting the secret message from the high and middle frequency wavelet coefficients for each RGB components of all facial regions is accomplished. Experimental results of the proposed video steganography algorithm have demonstrated a high embedding efficiency and a high embedding payload.
Conference Paper
Full-text available
Video steganography has become a popular topic due to the significant growth of video data over the Internet. The performance of any steganography algorithm depends on two factors: embedding efficiency and embedding payload. In this paper, a high embedding payload of video steganography algorithm has been proposed based on the BCH coding. To improve the security of the algorithm, a secret message is first encoded by BCH(n,k,t) coding. Then, it is embedded into the discrete wavelet transform (DWT) coefficients of video frames. As the DWT middle and high frequency regions are considered to be less sensitive data, the secret message is embedded only into the middle and high frequency DWT coefficients. The proposed algorithm is tested under two types of videos that contain slow and fast motion objects. The results of the proposed algorithm are compared to both the Least Significant Bit (LSB) and [1] algorithms. The results demonstrate better performance for the proposed algorithm than for the others. The hiding ratio of the proposed algorithm is approximately 28%, which is evaluated as a high embedding payload with a minimal tradeoff of visual quality. The robustness of the proposed algorithm was tested under various attacks. The results were consistent.
Conference Paper
Full-text available
people are becoming more worried about information being hacked by attackers. Recently, many algorithms of steganography and data hiding have been proposed. Steganography is a process of embedding the secret information inside the host medium (text, audio, image and video). Concurrently, many of the powerful steganographic analysis software programs have been provided to unauthorized users to retrieve the valuable secret information that was embedded in the carrier files. Some steganography algorithms can be easily detected by steganalytical detectors because of the lack of security and embedding efficiency. In this paper, we propose a secure video steganography algorithm based on the principle of linear block code. Nine uncompressed video sequences are used as cover data and a binary image logo as a secret message. The pixels' positions of both cover videos and a secret message are randomly reordered by using a private key to improve the system's security. Then the secret message is encoded by applying Hamming code (7, 4) before the embedding process to make the message even more secure. The result of the encoded message will be added to random generated values by using XOR function. After these steps that make the message secure enough, it will be ready to be embedded into the cover video frames. In addition, the embedding area in each frame is randomly selected and it will be different from other frames to improve the steganography scheme's robustness. Furthermore, the algorithm has high embedding efficiency as demonstrated by the experimental results that we have obtained. Regarding the system's quality, the Pick Signal to Noise Ratio (PSNR) of stego videos are above 51 dB, which is close to the original video quality. The embedding payload is also acceptable, where in each video frame we can embed 16 Kbits and it can go up to 90 Kbits without noticeable degrading of the stego video's quality.
Conference Paper
Steganography is the art of secret communication. Since the advent of modern steganography, in the 2000s, many approaches based on the error correcting codes (Hamming, BCH, RS, STC ...) have been proposed to reduce the number of changes of the cover medium while inserting the maximum bits. The works of LDiop and al [1], inspired by those of T. Filler [2] have shown that the LDPC codes are good candidates in minimizing the impact of insertion. This work is a continuation of the use of LDPC codes in steganography. We propose in this paper a steganography scheme based on these codes inspired by the adaptive approach to the calculation of the map detectability. We evaluated the performance of our method by applying an algorithm for steganalysis.
Article
This brief presents a new area-efficient multimode encoder for long Bose-Chaudhuri-Hocquenghen codes. In the proposed multimode encoding architecture, several short linear-feedback shift registers (LFSRs) are cascaded in series to achieve the same functionality that a long LFSR has, and the output of a short LFSR is fed back to the input side to support multimode encoding. Whereas previous multimode architectures necessitate huge overhead due to preprocessing and postprocessing, the proposed architecture completely eliminates the overhead by exploiting an efficient transformation. Without sacrificing the latency, the proposed architecture reduces hardware complexity by up to 97.2% and 49.1% compared with the previous Chinese-remainder-theorem-based and weighted-summation-based multimode architectures, respectively.