scispace - formally typeset
Open AccessJournal ArticleDOI

Design and simulation a video steganography system by using FFT­turbo code methods for copyrights application

TLDR
A modern Video-Steganography method is presented by employing the benefits of TC (Turbo code) to encrypt the pixels of logo image and Least two Significant Bit Technique procedure to embed the encryption pixels inside the frames of the video file.
Abstract
Protecting information on various communication media is considered an essential requirement in the present information transmission technology. So, there is a continuous search around different modern techniques that may be used to protect the data from the attackers. Steganography is one of those techniques that can be used to maintain the copyright by employing it to cover the publisher logo image inside the video frames. Nowadays, most of the popular known of the Video-Steganography methods become a conventional technique to the attacker, so there is a requirement for a modern and smart strategy to protect the copyright of the digital video file. Where this proposed system goal to create a hybrid system that combines the properties of Cryptography and Steganography work to protect the copyright hidden data from different attack types with maintaining of characteristics of the original video (quality and resolution). In this article, a modern Video-Steganography method is presented by employing the benefits of TC (Turbo code) to encrypt the pixels of logo image and Least two Significant Bit Technique procedure to embed the encryption pixels inside the frames of the video file. The insertion is performed in the frequency domain by applying the Fast Fourier Transform (FFT)on the video frames. The examination of the suggested architecture is done by terms of Structural Similarity Index, MSE (mean squared error), and PSNR (peak signal-to-noise ratio) by comparing between an original and extracted logo as well as between original and Steganographic video (averaged overall digital frames in the video). The simulation results show that this method proved high security, robustness, capacity and produces a substantial performance enhancement over the present known ways with fewer distortions in the quality of the video

read more

Content maybe subject to copyright    Report

Citations
More filters
Proceedings Article

Image steganography using least significant bit with cryptography

Nidhi
TL;DR: Steganography plays an important role in Information Security, the art and science of writing hidden messages in such a way that no one apart from the sender and intended recipient even realizes there is a hidden message.
Journal ArticleDOI

4D chaotic system-based secure data hiding method to improve robustness and embedding capacity of videos

TL;DR: In this paper , the secret message is embedded in entire video with 4D chaotic system, which is also an important novelty of this paper, and the proposed method evaluated by objective criteria and achieved valuable results.
Book ChapterDOI

FFT-Based Robust Video Steganography over Non-dynamic Region in Compressed Domain

TL;DR: The proposed research work presents a novel data hiding method for video steganography in the compressed domain where the random numbered secret frames are selected from the RGB cover video sequence and extracts the specific non-dynamic region from the secret frame and transforms the pixel value to the frequency domain using Fast Fourier Transform.
Journal ArticleDOI

Hiding speech in video using swarm optimization and data mining

TL;DR: In this article , a speech signal file was encrypted in a video file through three stages, the first stage involved scrambling bits using a Brownian motion algorithm, scrambling blocks using a circle map algorithm, and finally shuffling the speech signal as a whole.
Journal ArticleDOI

Serial and parallel turbo code test over AWGN channel with different modulation

TL;DR: In this paper , the authors compared the performance of two types of concatenated codes, the Serial Concatenated Convolutional Code (SCCC) and the Parallel Concatenated Convolutionsal Code(PCCC), with the addition of the using modulation algorithm like Binary Phase Shift Keying (BPSK) and Quadrature Phase Shift Kening (QPSK), and compared the results using Simulink in MATLAB version R2020b.
References
More filters
Journal ArticleDOI

Image quality assessment: from error visibility to structural similarity

TL;DR: In this article, a structural similarity index is proposed for image quality assessment based on the degradation of structural information, which can be applied to both subjective ratings and objective methods on a database of images compressed with JPEG and JPEG2000.
Book

Error Correction Coding : Mathematical Methods and Algorithms

Todd K. Moon
TL;DR: This work aims to provide a context for Error Correcting Coding and to inspire a new generation of coders to tackle the challenge of Space-Time Coding.
Journal ArticleDOI

Video steganography: a comprehensive review

TL;DR: This paper intends to provide an up-to-date comprehensive review on the various video steganographic methods found in the literature in the last 5 years, and some relevant attacks and steganalysis techniques are surveyed.
Proceedings ArticleDOI

A Novel Video Steganography Based on Non-uniform Rectangular Partition

TL;DR: Experimental results showed that the proposed Video Steganography algorithm can hide a same-size video in the host video without obvious distortion in theHost video.
Proceedings ArticleDOI

A highly secure video steganography using Hamming code (7, 4)

TL;DR: A secure video steganography algorithm based on the principle of linear block code that has high embedding efficiency and the system's quality is close to the original video quality.