Design and simulation a video steganography system by using FFTturbo code methods for copyrights application
TLDR
A modern Video-Steganography method is presented by employing the benefits of TC (Turbo code) to encrypt the pixels of logo image and Least two Significant Bit Technique procedure to embed the encryption pixels inside the frames of the video file.Abstract:
Protecting information on various communication media is considered an essential requirement in the present information transmission technology. So, there is a continuous search around different modern techniques that may be used to protect the data from the attackers. Steganography is one of those techniques that can be used to maintain the copyright by employing it to cover the publisher logo image inside the video frames. Nowadays, most of the popular known of the Video-Steganography methods become a conventional technique to the attacker, so there is a requirement for a modern and smart strategy to protect the copyright of the digital video file. Where this proposed system goal to create a hybrid system that combines the properties of Cryptography and Steganography work to protect the copyright hidden data from different attack types with maintaining of characteristics of the original video (quality and resolution). In this article, a modern Video-Steganography method is presented by employing the benefits of TC (Turbo code) to encrypt the pixels of logo image and Least two Significant Bit Technique procedure to embed the encryption pixels inside the frames of the video file. The insertion is performed in the frequency domain by applying the Fast Fourier Transform (FFT)on the video frames. The examination of the suggested architecture is done by terms of Structural Similarity Index, MSE (mean squared error), and PSNR (peak signal-to-noise ratio) by comparing between an original and extracted logo as well as between original and Steganographic video (averaged overall digital frames in the video). The simulation results show that this method proved high security, robustness, capacity and produces a substantial performance enhancement over the present known ways with fewer distortions in the quality of the videoread more
Citations
More filters
Proceedings Article
Image steganography using least significant bit with cryptography
TL;DR: Steganography plays an important role in Information Security, the art and science of writing hidden messages in such a way that no one apart from the sender and intended recipient even realizes there is a hidden message.
Journal ArticleDOI
4D chaotic system-based secure data hiding method to improve robustness and embedding capacity of videos
TL;DR: In this paper , the secret message is embedded in entire video with 4D chaotic system, which is also an important novelty of this paper, and the proposed method evaluated by objective criteria and achieved valuable results.
Book ChapterDOI
FFT-Based Robust Video Steganography over Non-dynamic Region in Compressed Domain
TL;DR: The proposed research work presents a novel data hiding method for video steganography in the compressed domain where the random numbered secret frames are selected from the RGB cover video sequence and extracts the specific non-dynamic region from the secret frame and transforms the pixel value to the frequency domain using Fast Fourier Transform.
Journal ArticleDOI
Hiding speech in video using swarm optimization and data mining
TL;DR: In this article , a speech signal file was encrypted in a video file through three stages, the first stage involved scrambling bits using a Brownian motion algorithm, scrambling blocks using a circle map algorithm, and finally shuffling the speech signal as a whole.
Journal ArticleDOI
Serial and parallel turbo code test over AWGN channel with different modulation
M. A. Lafta,Samir Jasim Mohammed +1 more
TL;DR: In this paper , the authors compared the performance of two types of concatenated codes, the Serial Concatenated Convolutional Code (SCCC) and the Parallel Concatenated Convolutionsal Code(PCCC), with the addition of the using modulation algorithm like Binary Phase Shift Keying (BPSK) and Quadrature Phase Shift Kening (QPSK), and compared the results using Simulink in MATLAB version R2020b.
References
More filters
Journal ArticleDOI
Image quality assessment: from error visibility to structural similarity
TL;DR: In this article, a structural similarity index is proposed for image quality assessment based on the degradation of structural information, which can be applied to both subjective ratings and objective methods on a database of images compressed with JPEG and JPEG2000.
Book
Error Correction Coding : Mathematical Methods and Algorithms
TL;DR: This work aims to provide a context for Error Correcting Coding and to inspire a new generation of coders to tackle the challenge of Space-Time Coding.
Journal ArticleDOI
Video steganography: a comprehensive review
TL;DR: This paper intends to provide an up-to-date comprehensive review on the various video steganographic methods found in the literature in the last 5 years, and some relevant attacks and steganalysis techniques are surveyed.
Proceedings ArticleDOI
A Novel Video Steganography Based on Non-uniform Rectangular Partition
Sheng Dun Hu,Kin Tak U +1 more
TL;DR: Experimental results showed that the proposed Video Steganography algorithm can hide a same-size video in the host video without obvious distortion in theHost video.
Proceedings ArticleDOI
A highly secure video steganography using Hamming code (7, 4)
TL;DR: A secure video steganography algorithm based on the principle of linear block code that has high embedding efficiency and the system's quality is close to the original video quality.
Related Papers (5)
A hybrid approach for video steganography using edge detection and identical match techniques
Ramandeep Kaur,Pooja,Varsha +2 more
Improved protection in video steganography used compressed video bitstreams
S. Suma,Christal Mary +1 more