The Efficiency of Data Hiding by Manipulating the DPCM Macroblocks in Compressed Video

Article Preview

Abstract:

Steganography is the idea of embedding a secret data in different media and has become an important regulation of methods of data integration. Although the still images are generally applied in the past, is very popular in recent years for the video. The techniques of video data hiding in recent year’s emphasis on the features generated by the video compression standard, a safer method for steganography uses MPEG-4/H.264 Bit Plane Complexity Segmentation (BPCS) algorithm is proposed in this approach. The reason for choosing such a video coverage is the enormous amount of data that can be hidden in each frame of MPEG-4 video. In other words, MPEG-4 has three types of images: I-frame, B, and P frames. Unlike other techniques used to hide data, such as the LSB algorithm, PBCS can achieve better results in both mathematics expression and human vision. In this paper, data is embedded in the videos of the I-frame until the BPCS can reach high levels of integration with low distortion based on the theory that regions of low noise-levels as in a picture can be replaced by noise without a significant loss of image quality. This approach invents data hidden in high-security environments. Experimental results show the success of hidden data in the selected and extracted data from the sequence of frames and also indicate the effectiveness of the implementation plan of steganography compressed video with high security features.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 230-232)

Pages:

69-74

Citation:

Online since:

May 2011

Export:

Price:

[1] A.M. Alattar, M.U. Celik, E.T. Lin: Evaluation of Watermarking Low Bit-rate MPEG-4 Bit Streams, Proceedings of the SPIE International Conference on Security and Watermarking of Multimedia Contents V, Santa Clara, CA( 2003)

DOI: 10.1117/12.477306

Google Scholar

[2] S.P. Mohanty: Digital Watermarking, A Tutorial Review (1999)

Google Scholar

[3] E. Kawaguchi, M. Niimi: Modeling Digital image into informative and Noise-Like Regions by a Complexity Measure, 7thEuropean-Japanese Conference on Information Modeling and knowledge Bases(1997)

Google Scholar

[4] M. Niimi, H. Noda, E. Kawaguchi: A Steganography Based on Region Segmentation by Using Complexity Measure, Trans. Of IEICE, Vol. J81-D-II, No. 6, pp.1132-1140.(1998)

Google Scholar

[5] Ross J. Anderson and Fabien A.P. Petitcolas: On the limits of steganography, IEEE Journal on Selected Areas in Communications (J-SAC), Special Issue on Copyright &Privacy Protection, vol. 16 no. 4, pp.474-481.(1998)

DOI: 10.1109/49.668971

Google Scholar

[6] T Mrkel,JHP Eloff and MS Olivier:An Overview of Image Steganography, in Proceedings of the fifth annual Information Security South Africa Conference.(2005)

Google Scholar