scispace - formally typeset
Search or ask a question

Showing papers on "Steganography tools published in 2008"


Proceedings ArticleDOI
09 Dec 2008
TL;DR: A new algorithm for RGB image based steganography that introduces the concept of storing variable number of bits in each channel based on the actual color values of that pixel: lower color component stores higher number of bit.
Abstract: In this paper, we present a new algorithm for RGB image based steganography. Our algorithm introduces the concept of storing variable number of bits in each channel (R, G or B) of pixel based on the actual color values of that pixel: lower color component stores higher number of bits. Our algorithm offers very high capacity for cover media compared to other existing algorithms. We present experimental results showing the superiority of our algorithm. We also present comparative results with other similar algorithms in image based steganography.

117 citations


Lip Yee Por1
01 Jun 2008
TL;DR: A new approach is proposed in information hiding using inter-word spacing and inter-paragraph spacing as a hybrid method and offers dynamic generated stego-text with six options of maximum capacity according to the length of the secret message.
Abstract: Sending encrypted messages frequently will draw the attention of third parties, i.e. crackers and hackers, perhaps causing attempts to break and reveal the original messages. In a digital world, steganography is introduced to hide the existence of the communication by concealing a secret message inside another unsuspicious message. Steganography is often being used together with cryptography and offers an acceptable amount of privacy and security over the communication channel. This paper presents an overview of text steganography and a brief history of steganography along with various existing text-based steganography techniques. Highlighted are some of the problems inherent in text steganography as well as issues with existing solutions. A new approach is proposed in information hiding using inter-word spacing and inter-paragraph spacing as a hybrid method. Our method offers dynamic generated stego-text with six options of maximum capacity according to the length of the secret message. This paper also analyzed the significant drawbacks of each existing method and how our new approach could be recommended as a solution.

114 citations


Proceedings ArticleDOI
22 Apr 2008
TL;DR: In this paper a new method for steganography in English texts is proposed, where the US and UK spellings of words substituted in order to hide data in an English text.
Abstract: One of the important issues in security fields is hidden exchange of information There are different methods for this purpose such as cryptography and steganography Steganography is a method of hiding data within a cover media so that other individuals fail to realize their existence In this paper a new method for steganography in English texts is proposed In this method the US and UK spellings of words substituted in order to hide data in an English text For example "color" has different spelling in UK (colour) and US (color) Therefore the data can be hidden in the text by substituting these words

106 citations


Book ChapterDOI
09 Nov 2008
TL;DR: In this article, the authors discuss available steganographic techniques that can be used for creating covert channels for VoIP (Voice over Internet Protocol) streams and provide new insights by presenting two new techniques: network steganography solution which exploits free/unused protocols' fields and is known for IP, UDP or TCP protocols, but has never been applied to RTP (Real-Time Transport Protocol) and RTCP (Real Time Control Protocol) which are characteristic for VOIP.
Abstract: The paper concerns available steganographic techniques that can be used for creating covert channels for VoIP (Voice over Internet Protocol) streams. Apart from characterizing existing steganographic methods we provide new insights by presenting two new techniques. The first one is network steganography solution which exploits free/unused protocols' fields and is known for IP, UDP or TCP protocols but has never been applied to RTP (Real-Time Transport Protocol) and RTCP (Real-Time Control Protocol) which are characteristic for VoIP. The second method, called LACK (Lost Audio Packets Steganography), provides hybrid storage-timing covert channel by utilizing delayed audio packets. The results of the experiment, that was performed to estimate a total amount of data that can be covertly transferred during typical VoIP conversation phase, regardless of steganalysis, are also included in this paper.

93 citations


Journal ArticleDOI
TL;DR: A new metric of image complexity is introduced to enhance the evaluation of steganalysis performance and indicates that the significance of features and the detection performance depend not only on the information-hiding ratio, but also on the image complexity.

89 citations



Proceedings ArticleDOI
31 Mar 2008
TL;DR: This paper proposes using human skin tone detection in colour images to form an adaptive context for an edge operator which will provide an excellent secure location for data hiding.
Abstract: Steganography is defined as the science of hiding or embedding ";data"; in a transmission medium. Its ultimate objectives, which are undetectability, robustness (i.e., against image processing and other attacks) and capacity of the hidden data (i.e., how much data we can hide in the carrier file), are the main factors that distinguish it from other "; sisters-in science"; techniques, namely watermarking and Cryptography. This paper provides an overview of well known Steganography methods. It identifies current research problems in this area and discusses how our current research approach could solve some of these problems. We propose using human skin tone detection in colour images to form an adaptive context for an edge operator which will provide an excellent secure location for data hiding.

70 citations


Proceedings ArticleDOI
12 May 2008
TL;DR: This method is a high capacity steganography method which can hide information up to 20% of the input speech and the Signal-to- Noise Ratio and listening tests show that the stegano audio is imperceptible from original audio.
Abstract: Steganography is the art of hiding information in a cover media without attracting attention. One of the cover media which can be used for steganography is speech. In this paper, we propose a new speech steganography in wavelet domain. In this method, lifting scheme is used to create perfect reconstruction Int2Int wavelets. The data is hidden in some of the Least Significant Bits (LSB) of detail wavelet coefficients. The LSB bits for hiding are selected with a new adaptive algorithm. This algorithm does not hide information in silent parts, so there is no need for silent detection algorithms. This method has zero error in hiding/unhiding process, while normal wavelet domain LSB has about 0.2 % error in equal hiding capacity. This method is a high capacity steganography method which can hide information up to 20% of the input speech. The Signal-to- Noise Ratio (SNR) and listening tests show that the stegano audio is imperceptible from original audio.

60 citations


Proceedings ArticleDOI
01 Nov 2008
TL;DR: This paper proposes an image steganography that can verify the reliability of the information being transmitted to the receiver and uses two special AC coefficients of the discrete wavelet transform domain to verify the veracity (integrity) of the secret information from the stego image.
Abstract: In recent years, steganography and steganalysis are two important areas of research that involve a number of applications. These two areas of research are important especially when reliable and secure information exchange is required. Steganography is an art of embedding information in a cover image without causing statistically significant variations to the cover image. Steganalysis is the technology that attempts to defeat steganography by detecting the hidden information and extracting. In this paper we propose an image steganography that can verify the reliability of the information being transmitted to the receiver. The method can verify whether the attacker has tried to edit, delete or forge the secret information in the stego-image. The technique embeds the hidden information in the spatial domain of the cover image and uses two special AC coefficients of the discrete wavelet transform domain to verify the veracity (integrity) of the secret information from the stego image. The analysis shows that the BER and PSNR is improved in the case of DWT than DCT.

58 citations


Journal Article
TL;DR: An overview of text steganography is presented and a new approach, named WhiteSteg is proposed in information hiding using interword spacing and inter-paragraph spacing as a hybrid method to reduce the visible detection of the embedded messages.
Abstract: Sending encrypted messages frequently will draw the attention of third parties, i.e. crackers and hackers, perhaps causing attempts to break and reveal the original messages. In this digital world, steganography is introduced to hide the existence of the communication by concealing a secret message inside another unsuspicious message. The hidden message maybe plaintext, or any data that can be represented as a stream of bits. Steganography is often being used together with cryptography and offers an acceptable amount of privacy and security over the communication channel. This paper presents an overview of text steganography and a brief history of steganography along with various existing techniques of text steganography. Highlighted are some of the problems inherent in text steganography as well as issues with existing solutions. A new approach, named WhiteSteg is proposed in information hiding using interword spacing and inter-paragraph spacing as a hybrid method to reduce the visible detection of the embedded messages. WhiteSteg offers dynamic generated cover-text with six options of maximum capacity according to the length of the secret message. Besides, the advantage of exploiting whitespaces in information hiding is discussed. This paper also analyzes the significant drawbacks of each existing method and how WhiteSteg could be recommended as a solution.

56 citations


Proceedings ArticleDOI
27 May 2008
TL;DR: A lossless, compressed domain steganography technique for AMBTC-compressed images based on the interchange of two quantization levels that is not only easy to implement but also provides an efficient mechanism for lossless data embedding.
Abstract: A lossless or reversible steganography is defined as an original image can be completely recovered from the stego-image after the embedded data has been extracted. This technique has been focused on spatial uncompressed domain recently, and is considered more challenging to carry out in the compressed domain. In this paper, we propose a lossless, compressed domain steganography technique for AMBTC-compressed images based on the interchange of two quantization levels. The location map, which is often used in lossless steganography, is not required in our scheme. Therefore, the hiding capacity is independent of the compressed codes. Moreover, the stego-image preserves the same image quality as the original compressed images. The experimental results show that the proposed scheme is not only easy to implement but also provides an efficient mechanism for lossless data embedding.

Journal ArticleDOI
TL;DR: Two novel steganalysis frameworks are designed to detect two kinds of distinct MLSB embedding methods and can fully meet the need to distinguish stego images under low false positive rate.
Abstract: Replacement of least-significant bit plane is one of the popular steganography techniques in digital images because of its extreme simplicity. But it is more difficult to precisely estimate the rate of secret message embedded by replacement of multiple least-significant bit (MLSB) planes of a carrier object. In order to model the MLSB embedding, a lemma is introduced to prove the transition relationships among some trace subsets. Then, based on these transition relationships, two novel steganalysis frameworks are designed to detect two kinds of distinct MLSB embedding methods. A series of experiments show that the proposed steganalysis frameworks are highly sensitive to MLSB steganography, and can estimate the rate of secret message with higher accuracy. Furthermore, these frameworks can fully meet the need to distinguish stego images under low false positive rate, especially when the embedded message is short.

Journal Article
TL;DR: This paper proposes a new improved version of Least Significant Bit (LSB) method, which is simple for implementation when compared to Pixel value Differencing (PVD) method and yet achieves a High embedding capacity and imperceptibility.
Abstract: — Steganography, derived from Greek, literally means “covered writing”. It includes a vast array of secret communications methods that conceal the message’s very existence. These methods include invisible inks, microdots, character arrangement, digital signatures, covert channels, and spread spectrum communications. This paper proposes a new improved version of Least Significant Bit (LSB) method. The approach proposed is simple for implementation when compared to Pixel value Differencing (PVD) method and yet achieves a High embedding capacity and imperceptibility. The proposed method can also be applied to 24 bit color images and achieve embedding capacity much higher than PVD. Keywords — Information Hiding, LSB Matching, PVD Steganography. I. I NTRODUCTION NFORMATION hiding techniques have been receiving much attention today. The main motivation for this is largely due to fear of encryption services getting outlawed [14], and copyright owners who want to track confidential and intellectual property copyright against unauthorized access and use in digital materials such as music, film, book and software through the use of digital watermarks. Encryption and Decryption algorithms are widely used to encrypt secret (confidential) data so that it is not directly accessible to the otherwise illegitimate person and whenever the owner or genuine person requires the data, it can be decrypted with the help of a key or with the help of a retrieving algorithm/function. Steganography has a different approach to deal with this problem. Steganography [15] is an application of information hiding. Steganography or Stego as it is often referred to in the IT community, literally means, "covered writing" which is derived from the Greek language. Steganography is defined by Markus Kahn [3] as follows, "Steganography is the art and science of communicating in a way which hides the existence of the communication. In contrast to Cryptography, where the enemy is allowed to detect, intercept and modify messages without being able to violate certain security premises guaranteed by a

Proceedings ArticleDOI
Naofumi Aoki1
15 Aug 2008
TL;DR: The proposed technique exploits the characteristics of G.711 for embedding steganogram information without any degradation and the capacity of the proposed technique is shown.
Abstract: This study proposes a technique of lossless steganography for G.711, the most common codec for digital speech communications such as VoIP (Voice over IP). The proposed technique in this study exploits the characteristics of G.711 for embedding steganogram information without any degradation. This paper shows the capacity of the proposed technique.

Proceedings ArticleDOI
18 Nov 2008
TL;DR: A more robust steganography technique is proposed that takes advantages of the strengths and limitations of the presented techniques and avoids the limitations.
Abstract: Various image steganography techniques have been proposed. In this paper, we investigate diverse steganography techniques and tools. We state a set of criteria to analyze and evaluate the strengths and weaknesses of the presented techniques. We propose a more robust steganography technique that takes advantages of the strengths and avoids the limitations.

Proceedings ArticleDOI
15 Aug 2008
TL;DR: A SIP UA (Session Initiation Protocol) UA (User Agent) that can dynamically embed some secret message into the speech carrier with good efficiency is implemented and a relatively new steganography algorithm is adopted, which is referred to as LSB matching method.
Abstract: With the development of Internet and multimedia technology, the information exchanged through Internet not only must be real-time, but also requires security and integrity. In this paper, a SIP (Session Initiation Protocol) UA (User Agent) that can dynamically embed some secret message into the speech carrier with good efficiency is implemented. The principle of the secret communication based on steganography technology over VoIP is introduced, and a new architecture of the software used to transmit the hidden information is proposed. Especially, we adopt a relatively new steganography algorithm, which is referred to as LSB matching method. In addition, an approach for avoiding the loss of secret data based on Redundant Audio Data is presented. Finally, we analyzed the performance of the implemented software.

Proceedings ArticleDOI
04 Mar 2008
TL;DR: Experimental results showed this scheme can be applied on compressed video steganography with high security properties, and the collusion resistant properties are obtained.
Abstract: A new compressed video secure steganography (CVSS) algorithm is proposed. In the algorithm, embedding and detection operations are both executed entirely in the compressed domain, with no need for the decompression process. The new criteria employing statistical invisibility of contiguous frames is used to adjust the embedding strategy and capacity, which increases the security of proposed algorithm. Therefore, the collusion resistant properties are obtained. Video steganalysis with closed loop feedback manner is design as a checker to find out obvious bugs. Experimental results showed this scheme can be applied on compressed video steganography with high security properties.

Proceedings ArticleDOI
28 May 2008
TL;DR: This paper discusses the possibility of embedding data in the frames of video files with face instances present and calls it adaptive as it selects the specific region of interest (ROI) in the cover image where it can safely embed data.
Abstract: The history of steganography can be traced back to ancient civilization - the Persian and Greek conflict around 480 B.C and ancient Egyptian civilization - when steganography was first reported to exist. Steganography is the process of hiding information in a multimedia carrier. Steganalysis, which is the official counter attack science, has defeated Steganographic algorithms whether they are based on the traditional spatial domain or the transform domain. This paper discusses the possibility of embedding data in the frames of video files. We call it adaptive as we select the specific region of interest (ROI) in the cover image where we can safely embed our data. We chose these regions based on human skin tone colour detection. As such the method is obviously constrained to image or video files with face instances present.

Proceedings ArticleDOI
01 Jan 2008
TL;DR: A steganography system is designed for encoding and decoding a secret file embedded into an image file using random LSB insertion method in which the secret data are spread out among the image data in a seemingly random manner.
Abstract: Steganography is the art and science of hiding the existence of communication. The techniques used in steganography make it difficult to detect that there is a hidden message inside an image file. This way we not only hide the message itself, but also the fact that we are sending the message. In this paper a steganography system is designed for encoding and decoding a secret file embedded into an image file using random LSB insertion method in which the secret data are spread out among the image data in a seemingly random manner. This can be achieved using a secret key. The key used to generate pseudorandom numbers, which will identify where, and in what order the hidden message is laid out. The advantage of this method is that it incorporates some cryptography in that diffusion is applied to the secret message.

Book
01 Jan 2008
TL;DR: Aoretical Framework for a Practical Evaluation and Comparison of Audio Watermarking Schemes in the Triangle of Robustness, Transparency and Capacity is presented.
Abstract: Theoretical Framework for a Practical Evaluation and Comparison of Audio Watermarking Schemes in the Triangle of Robustness, Transparency and Capacity.- Watermarking Security: A Survey.- Efficient Implementation of Zero-Knowledge Proofs for Watermark Detection in Multimedia Data.- Identity-Based DRM: Personal Entertainment Domain.- Improving Steganalysis by Fusion Techniques: A Case Study with Image Steganography.

Book ChapterDOI
15 Sep 2008
TL;DR: A novel distortion metric based on Hausdorff distance is proposed based on which the proposed algorithm has a strong discriminatory ability and the performance is significantly superior to existing methods.
Abstract: Steganography can be used to hide information in audio media both for the purposes of digital watermarking and establishing covert communication channels. Digital audio provides a suitable cover for high-throughput steganography as a result of its transient and unpredictable characteristics. Distortion measure plays an important role in audio steganalysis - the analysis and classification method of determining if an audio medium is carrying hidden information. In this paper, we propose a novel distortion metric based on Hausdorff distance. Given an audio object xwhich could potentially be a stego-audio object, we consider its de-noised version xi¾? as an estimate of the cover-object. We then use Hausdorff distance to measure the distortion from xto xi¾?. The distortion measurement is obtained at various wavelet decomposition levels from which we derive high-order statistics as features for a classifier to determine the presence of hidden information in an audio signal. Extensive experimental results for the Least Significant Bit (LSB) substitution based steganography tool show that the proposed algorithm has a strong discriminatory ability and the performance is significantly superior to existing methods. The proposed approach can be easily applied to other steganography tools and algorithms.

Book ChapterDOI
15 Oct 2008
TL;DR: A novel statistical algorithm for linguistic steganography detection is presented that uses the statistical characteristics of correlations between the general service words gathered in a dictionary to classify the given text segments into stego-text segments and normal text segments.
Abstract: Linguistic steganography is a branch of Information Hiding (IH) using written natural language to conceal secret messages. It plays an important role in Information Security (IS) area. Previous work on linguistic steganography was mainly focused on steganography and there were few researches on attacks against it. In this paper, a novel statistical algorithm for linguistic steganography detection is presented. We use the statistical characteristics of correlations between the general service words gathered in a dictionary to classify the given text segments into stego-text segments and normal text segments. In the experiment of blindly detecting the three different linguistic steganography approaches: Markov-Chain-Based, NICETEXT and TEXTO, the total accuracy of discovering stego-text segments and normal text segments is found to be 97.19%. Our results show that the linguistic steganalysis based on correlations between words is promising.

01 Mar 2008
TL;DR: A new idea is presented for using Arabic text in steganography to superimpose multiple invisible instances of Arabic diacritic marks over each other to hide the existence of data in other cover media.
Abstract: Steganography techniques are concerned with hiding the existence of data in other cover media. Today, text steganography has become particularly popular. This paper presents a new idea for using Arabic text in steganography. The main idea is to superimpose multiple invisible instances of Arabic diacritic marks over each other. This is possible because of the way in which diacritic marks are displayed on screen and printed to paper. Two approaches and several scenarios are proposed. The main advantage is in terms of the arbitrary capacity. The approach was compared to other similar methods in terms of overhead on capacity. It was shown to exceed any of these easily, provided the correct scenario is chosen.

Proceedings ArticleDOI
22 Sep 2008
TL;DR: This work presents a steganography technique using MPEG-4 videos aiming to increase documents secrecy and proposes an architecture for version control of collaborative documents using encryption techniques, together with Steganography, providing authentication and electronic documents integrity.
Abstract: The safety of communication in organizations is a very important issue. It is about confidentiality, integrity and authentication during access or editing of confidential internal documents. A non-conventional means to increase security is the use of steganography to hide documents in digital videos, which makes possible to hide higher amounts of information and documents than steganography in images. In this work, we present a steganography technique using MPEG-4 videos aiming to increase documents secrecy. We also propose an architecture for version control of collaborative documents using encryption techniques, together with steganography, providing authentication and electronic documents integrity.

Proceedings ArticleDOI
08 Jul 2008
TL;DR: An effective method for linguistic steganography detection that uses an information entropy-like statistical variable of words in detected text segment together with its variance as two classification features in the support vector machine.
Abstract: Linguistic steganography is an art of concealing secret messages. More specifically, it takes advantage of the properties of natural language, such as the linguistic structure to hide messages. In this paper, an effective method for linguistic steganography detection is presented. In virtue of the concepts in area of information theory, the method uses an information entropy-like statistical variable of words in detected text segment together with its variance as two classification features. The support vector machine is used as classifier. The method was centered on detection for small size text segments estimated in the hundreds in words. Its achievement is simple and its execution is fast and relatively accurate. In our experiment of detecting the three different linguistic steganography methods: NICETEXT, TEXTO and Markov-chain-based, the accuracy exceeds 90%. As a result, our method can be used as a common pre-detection method followed by a more specific and accurate detection method.

Journal ArticleDOI
TL;DR: Graphstega is resilient to contemporary attacks, such as traffic analysis, contrast, and comparison attack, even when launched by an adversary who is familiar with Graphstega.
Abstract: The Graph Steganography Methodology (Graphstega) is the art and science of avoiding the arousal of suspicion in covert communications by concealing a message in a graph-cover. Unlike other approaches, Graphstega does not embed a message as a noise in a cover. Instead the message is camouflaged as plotted data. Graphstega is keyless and the hidden message is anti-distortion. The popular usage of graphs in business, education, news, etc. and the availability of tremendous amount of graphs in electronic and non-electronic format make the investigation and detection of a hidden message extremely difficult. In addition, Graphstega is resilient to contemporary attacks, such as traffic analysis, contrast, and comparison attack, even when launched by an adversary who is familiar with Graphstega.

Journal Article
TL;DR: The algorithm can embed efficiently a large amount of information that has been reached to 75% of the image size (replace 18 bits for each pixel as a maximum) with high quality of the output.
Abstract: In this paper, we construct and implement a new Steganography algorithm based on learning system to hide a large amount of information into color BMP image. We have used adaptive image filtering and adaptive non-uniform image segmentation with bits replacement on the appropriate pixels. These pixels are selected randomly rather than sequentially by using new concept defined by main cases with sub cases for each byte in one pixel. According to the steps of design, we have been concluded 16 main cases with their sub cases that covere all aspects of the input information into color bitmap image. High security layers have been proposed through four layers of security to make it difficult to break the encryption of the input information and confuse steganalysis too. Learning system has been introduces at the fourth layer of security through neural network. This layer is used to increase the difficulties of the statistical attacks. Our results against statistical and visual attacks are discussed before and after using the learning system and we make comparison with the previous Steganography algorithm. We show that our algorithm can embed efficiently a large amount of information that has been reached to 75% of the image size (replace 18 bits for each pixel as a maximum) with high quality of the output.

Journal ArticleDOI
TL;DR: Nostega is promoted, which not only camouflages a message but also its transmission, and neither hides data in a noise nor produces noise, rendering the generated cover noiseless.
Abstract: Steganography is the science and art of covert communications. When using a steganographic approach, if an adversary suspects the existence of a hidden message the approach is defeated regardless of whether or not a plaintext is revealed. Contemporary steganography approaches found in the literature often hide data by altering a text, image, audio, etc., that serves as a cover. Although, an alteration is still considered a noise that is introduced to the cover, a sender opts to make the alterations look subtle and hard to detect, in order to avert suspicion. However, recent advances in steganalysis have rendered these approaches highly vulnerable to a wide variety of attacks such as traffic, contrast, comparison, statistical, etc., which may be able to defeat the steganographic goal. This article promotes a new paradigm for covert communication, namely noiseless steganography paradigm (Nostega), that overcomes the vulnerabilities of current approaches. Nostega neither hides data in a noise nor produces noise, rendering the generated cover noiseless. Instead, it camouflages messages in a form of unquestionable data in the generated cover. Unlike all other approaches, Nostega not only camouflages a message but also its transmission. Examples of Nostega-based steganography methodologies are discussed.

Proceedings ArticleDOI
18 Nov 2008
TL;DR: Experimental results show that the proposed video steganalysis technique can effectively detect the embedded data introduced by motion vector steganography algorithms.
Abstract: In contrast to steganography, steganalysis is the art of detecting the presence of the hidden information transmitted through the cover object. It has currently become a hot spot in the field of information security. In this paper, a video steganalysis technique is proposed against the video stegnanography methods which hide the secret message by a least modification of the motion vectors in the compressed bitstream. The method utilizes the feature classification technique, based on the analysis of some statistical properties, to determine the existence of the hidden message, in which the support vector machine (SVM) is then used as discriminator. Experimental results show that the proposed method can effectively detect the embedded data introduced by motion vector steganography algorithms.

Proceedings ArticleDOI
26 Aug 2008
TL;DR: This paper presents a Steganographic system which exploits the YCbCr colour space and shows that by adopting an object oriented Steganography mechanism, in the sense that the authors track skin tone objects in video frames, the system gets a higher PSNR value.
Abstract: Previous studies have shown that Steganography tools such as the S-Tools application outperforms counterpart tools in hiding data in the spatial domain. Another tool called F5 is identified as a robust tool in implementing Steganography in the frequency domain. This paper presents a Steganographic system which exploits the YCbCr colour space. YCbCr is intended to take advantage of human colour-response characteristics. Results show that our algorithm outperforms both F5 and S-Tools. Moreover, our system demonstrates improved performance in retrieving the hidden data after applying image processing attacks in the form of additive artificial noise. As a performance measurement for image distortion Peak-Signal-to-Noise Ratio (PSNR), which is classified under the difference distortion metrics, can be applied to the Stego images. This study also shows that by adopting an object oriented Steganography mechanism, in the sense that we track skin tone objects in video frames, we get a higher PSNR value.