Abstract
The proposed research work presents a comparative analysis of Discrete Cosine Transform (DCT) and Discrete Sine Transform (DST) based video steganography in compressed domain. In this method, the random numbered secret frames are selected from the sequence of RGB cover video. This method increases the complexity level of video steganography by considering the specific host to conceal secret data. It extracts the specific non-dynamic region from secret frame, transforms the pixel value of non-dynamic region into frequency domain using transform coefficient DCT or DST. The random Least Significant Bit (LSB) of integer component of DCT and DST is used as a carrier object that leads to good video quality and secret data-carrying capacity. Furthermore, the secure compressed stego video is reconstructed by using H.264 video compression technique facilitates communication over the network channel between sender and receiver. The proposed method has been experimented on some well-known video datasets by considering RGB images with different resolutions as a secret message. The efficiency of proposed video steganography method is evaluated by performance evaluation parameters; imperceptibility, robustness, and embedding capacity and the improved results of proposed method have been compared with reported methodologies.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Mstafa RJ, Elleithy KM (2017) Compressed and raw video steganography techniques: a comprehensive survey and analysis. Multimed Tools Appl 76(20):21749–21786
Mstafa RJ, Elleithy KM, Abdelfattah E (2017) Video steganography techniques: taxonomy, challenges, and future directions. In: IEEE Long Island Systems, Applications and Technology Conference (LISAT) 2017, p 1–6
Yilmaz A, Alatan AA (2003) Error concealment of video sequences by data hiding. In: Proceedings 2003 International Conference on image processing, p 679–682
Shukur WA, Abdullah WN, Qurban LK (2018) Information hiding in digital video using DCT, DWT and CvT. J Phys Conf Ser 1003:012035
Mstafa RJ, Elleithy KM (2016) A DCT-based robust video steganographic method using BCH error correcting codes. In: Long island systems, applications and technology conference (LISAT), p 1–6
Mstafa RJ, Elleithy KM (2016) A novel video steganography algorithm in DCT domain based on hamming and BCH codes. IEEE Sarnoff Symp. https://doi.org/10.1109/SARNOF.2016.7846757
Mstafa RJ, Elleithy KM, Abdelfattah E (2017) A robust and secure video steganography method in DWT-DCT domains based on multiple object tracking and ECC. IEEE Access 5:5354–5365. https://doi.org/10.1109/ACCESS.2017.2691581
Idbeaa T, Abdul Samad S, Husain H (2016) A secure and robust compressed domain video steganography for intra-and inter-frames using embedding-based byte differencing (EBBD) scheme. PLOS ONE. https://doi.org/10.1371/journal.pone.0150732,March
Liu S, Degang Xu (2020) A robust steganography method for HEVC based on secret sharing. Cogn Syst Res. https://doi.org/10.1016/j.cogsys.2019.09.008
Yang J, Li S (2017) An efficient information hiding method based on motion vector space encoding for HEVC. Multimed Tools Appl 77:11979–12001
Britanak V, Rao KR (2000) Two-dimensional DCT/DST universal computational structure for 2m×2n block sizes. IEEE Trans Signal Process. https://doi.org/10.1109/78.875483
Richardson IE (2010) The H.264 advanced video compression standard. Wiley, New York
https://github.com/remega/video_database/tree/master/videos, remega video database. Accessed 8 Nov 2017
https://www.elecard.com/videos, video compression Guru, Elecard video. Accessed Jun 2019
http://www.cvg.reading.ac.uk/PETS2009/a.html, PETS 2009 Benchmark Data, Miami, Florida. Accessed 25 Jun 2009
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Patel, R., Lad, K. & Patel, M. Novel DCT and DST based video steganography algorithms over non-dynamic region in compressed domain: a comparative analysis. Int. j. inf. tecnol. 14, 1649–1657 (2022). https://doi.org/10.1007/s41870-021-00788-7
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s41870-021-00788-7