2 research outputs found

    Coverless Video Steganography based on Maximum DC Coefficients

    Full text link
    Coverless steganography has been a great interest in recent years, since it is a technology that can absolutely resist the detection of steganalysis by not modifying the carriers. However, most existing coverless steganography algorithms select images as carriers, and few studies are reported on coverless video steganography. In fact, video is a securer and more informative carrier. In this paper, a novel coverless video steganography algorithm based on maximum Direct Current (DC) coefficients is proposed. Firstly, a Gaussian distribution model of DC coefficients considering video coding process is built, which indicates that the distribution of changes for maximum DC coefficients in a block is more stable than the adjacent DC coefficients. Then, a novel hash sequence generation method based on the maximum DC coefficients is proposed. After that, the video index structure is established to speed up the efficiency of searching videos. In the process of information hiding, the secret information is converted into binary segments, and the video whose hash sequence equals to secret information segment is selected as the carrier according to the video index structure. Finally, all of the selected videos and auxiliary information are sent to the receiver. Especially, the subjective security of video carriers, the cost of auxiliary information and the robustness to video compression are considered for the first time in this paper. Experimental results and analysis show that the proposed algorithm performs better in terms of capacity, robustness, and security, compared with the state-of-the-art coverless steganography algorithms

    Digital Watermarking of video streams: Review of the State-Of-The-Art

    Full text link
    Digital Watermarking is an extremely wide aspect of information security, either by its applications, by its properties, or by its designs. In particular, a lot of research has been made about video watermarking and it can make it quite difficult to put into perspective the various schemes possible in order to implement a watermarking process for a given application. This paper presents an in-depth overview of the current video watermarking technologies and how they each respond to certain criteria that may be imposed by the aimed application. The goal being in first place to be able to define the desired equilibrium point between invisibility, robustness and efficiency for an application. Then, given this balance, being able to deduce the best location of the information embedding as well as the method used to embed it. The equilibrium point is to be found using the needed properties of the watermark and by studying the threat model that the scheme will have to face. The location describes whether the extra information should be added to the metadata of the video, to its frames or to specific regions of its frames. Finally, the method to embed the watermark refers to the insertion domain and its coefficients to be altered in order to insert the wanted information.Comment: 33 pages, 11 figue
    corecore