2 research outputs found
Coverless Video Steganography based on Maximum DC Coefficients
Coverless steganography has been a great interest in recent years, since it
is a technology that can absolutely resist the detection of steganalysis by not
modifying the carriers. However, most existing coverless steganography
algorithms select images as carriers, and few studies are reported on coverless
video steganography. In fact, video is a securer and more informative carrier.
In this paper, a novel coverless video steganography algorithm based on maximum
Direct Current (DC) coefficients is proposed. Firstly, a Gaussian distribution
model of DC coefficients considering video coding process is built, which
indicates that the distribution of changes for maximum DC coefficients in a
block is more stable than the adjacent DC coefficients. Then, a novel hash
sequence generation method based on the maximum DC coefficients is proposed.
After that, the video index structure is established to speed up the efficiency
of searching videos. In the process of information hiding, the secret
information is converted into binary segments, and the video whose hash
sequence equals to secret information segment is selected as the carrier
according to the video index structure. Finally, all of the selected videos and
auxiliary information are sent to the receiver. Especially, the subjective
security of video carriers, the cost of auxiliary information and the
robustness to video compression are considered for the first time in this
paper. Experimental results and analysis show that the proposed algorithm
performs better in terms of capacity, robustness, and security, compared with
the state-of-the-art coverless steganography algorithms
Digital Watermarking of video streams: Review of the State-Of-The-Art
Digital Watermarking is an extremely wide aspect of information security,
either by its applications, by its properties, or by its designs. In
particular, a lot of research has been made about video watermarking and it can
make it quite difficult to put into perspective the various schemes possible in
order to implement a watermarking process for a given application. This paper
presents an in-depth overview of the current video watermarking technologies
and how they each respond to certain criteria that may be imposed by the aimed
application. The goal being in first place to be able to define the desired
equilibrium point between invisibility, robustness and efficiency for an
application. Then, given this balance, being able to deduce the best location
of the information embedding as well as the method used to embed it. The
equilibrium point is to be found using the needed properties of the watermark
and by studying the threat model that the scheme will have to face. The
location describes whether the extra information should be added to the
metadata of the video, to its frames or to specific regions of its frames.
Finally, the method to embed the watermark refers to the insertion domain and
its coefficients to be altered in order to insert the wanted information.Comment: 33 pages, 11 figue