Have a personal or library account? Click to login
Comparison of Video Steganography Methods for Watermark Embedding Cover

Comparison of Video Steganography Methods for Watermark Embedding

Open Access
|May 2016

References

  1. [1] E. Zielinska, W. Mazurczyk and K. Szczypiorski, “Trends in Steganography,” Communications of the ACM, no. 03, issue 57, 2014, pp. 86–95. http://dx.doi.org/10.1145/2566590.2566610
  2. [2] I. Cox, M. Miller, J. Bloom, J. Fridrich and T. Kalker, Digital Watermarking and Steganography, 2nd Ed., Burlington: Morgan Kaufmann, 2007.10.1016/B978-012372585-1.50015-2
  3. [3] G. Konahovich and A. Puzirenko, Digital Steganography, Theory and Practice – Компьютерная стеганография, теория и практика. Kiev: MK-Press, 2006. (in Russian)
  4. [4] A. K. Al-Frajat, H. A. Jalab, Z. M. Kasirun, A. A. Zaiden and B. B. Zaiden, “Hiding Data in Video File: An Overview,” J. of Applied Sciences, no. 10, pp. 1644–1649, June 2010. http://dx.doi.org/10.3923/jas.2010.1644.1649
  5. [5] M. M. Sadek, A. S. Khalifa and M. G. M. Mostafa, “Video steganography: a comprehensive review,” Multimedia Tools and Applications, pp. 1–32, 2014. http://dx.doi.org/10.1007/s11042-014-1952-z
  6. [6] A. P. Sherly, P. P. Amritha, “A Compressed Video Steganography using TPVD,” Int. J. of Database Management Systems (IJDMS), vol. 2, no. 3, pp. 67–80, August 2010. http://dx.doi.org/10.5121/ijdms.2010.2307
  7. [7] N. D. Amsden and L. Chen, “Analysis of Facebook Steganographic Capabilities,” in Int. Conf. on Computing, Networking and Communications, Communications and Information Security Symposium, 2015, pp. 67–71. http://dx.doi.org/10.1109/iccnc.2015.7069317
  8. [8] “MSU Video StegoVideo tool and plugin,” March 2011. [Online]. Available: http://www.compression.ru/video/stego_video/index_en.html. [Accessed: October 3, 2015].
  9. [9] “OpenPuff tool,” 2015. [Online]. Available: http://embeddedsw.net/OpenPuff_Steganography_Home.html. [Accessed: October 3, 2015].
  10. [10] “RT Steganography in Video Streaming tool,” July 2013. [Online]. Available: http://sourceforge.net/projects/rtstegvideo. [Accessed: October 3, 2015].
  11. [11] “Steganosaurus tool,” April 2013. [Online]. Available: http://steganosaur.us. [Accessed: October 3, 2015].
  12. [12] B. Kaur, A. Kaur and J. Singh, “Steganographic Approach for Hiding Image in DCT Domain,” Int. J. of Advances in Engineering & Technology, vol. 1, issue 3, pp. 72–78, July 2011.
  13. [13] A. M. Kothari and V. V. Dwivedi, “Performance Analysis of Digital Video Watermarking using Discrete Cosine Transform,” Int. J. of Electrical and Computer Engineering Systems, vol. 2, no. 1, pp. 11–16, 2011.
  14. [14] S. AL-Mansoori and A. Kunhu, “Robust Watermarking Technique based on DCT to Protect the Ownership of DubaiSat-1 Images agains Attacks,” IJCSNS Int. J. of Computer Science and Network Security, vol. 12, no. 6, June 2012.
  15. [15] K. R. Chetan and K. Raghavendra, “DWT Based Blind Digital Video Watermarking Scheme for Video Authentication,” Int. J. of Computer Applications, vol. 4, no. 10, pp. 19–26, Augusts 2010. http://dx.doi.org/10.5120/863-1213
  16. [16] “Xuggler,” 2011. [Online]. Available: http://www.xuggle.com/xuggler. [Accessed: October 3, 2015].
  17. [17] Dai-Kyung Hyun and Heung-Kyu Lee, “A Low-Complexity Mobile Watermarking Scheme Resisting Scale Distortions,” J. of Computer and Communications, vol. 2, pp. 77–81, 2014. http://dx.doi.org/10.4236/jcc.2014.24011
  18. [18] M. Kutter, F. Jordan and F. Bossen, “Digital Signature of Color Images using Amplitude Modulation,” January 1997. [Online]. Available: http://www.alpvision.com/pdf/3022-51.pdf [Accessed: Oct. 11, 2015].
  19. [19] A. Swathi and S.A.K. Jilani, “Video Steganography by LSB Substitution Using Different Polynomial Equations,” Int. J. Of Computational Engineering Research, vol. 2, issue 5, pp. 1620–1623, September 2012.
  20. [20] S. Gujjunoori and B. B. Amberker, “Reversible Data Embedding for MPEG-4 Video Using Middle Frequency DCT Coefficients,” J. of Information Hiding and Multimedia Signal Processing, vol. 5, no. 3, pp. 408–419, July 2014.10.1109/ISSP.2013.6526886
  21. [21] R. J. Mstafa and K. M. Elleithy, “A high payload video steganography algorithm in DWT domain based on BCH codes (15, 11),” in Wireless Telecommunications Symposium (WTS), 2015, pp. 1–8. http://dx.doi.org/10.1109/wts.2015.7117257
  22. [22] N. Chaturvedi and S. J. Basha, “Comparison of Digital Image watermarking Methods DWT & DWT-DCT on the Basis of PSNR,” Int. J. of Innovative Research in Science, Engineering and Technology, vol. 1, no. 2, pp. 147–153, December 2012.
  23. [23] J. Mansouri and M. Khademi, “An adaptive scheme for compressed video steganography using temporal and spatial features of the video signal,” Int. J. of Imaging Systems and Technology, vol. 19, issue 4, pp. 306–315, December 2009. http://dx.doi.org/10.1002/ima.20207
  24. [24] S. Khupse and N. N. Patil, “An adaptive steganography technique for videos using Steganoflage,” in Issues and Challenges in Intelligent Computing Techniques (ICICT), 2014, pp.811-815.10.1109/ICICICT.2014.6781384
  25. [25] S. A. Hosseini-pour, M. Soleimanpour and H. Nezamabadi-pour, “A novel approach to secure image based steganography by using eigenvalue and eigenvector principles,” in 2013 21st Iranian Conference on Electrical Engineering, ICEE, 2013, pp. 1–5. http://dx.doi.org/10.1109/IranianCEE.2013.6599635
  26. [26] U. Budhia, D. Kundur and T. Zourntos, “Digital Video Steganalysis Exploiting Statistical Visibility in the Temporal Domain,” in IEEE Transactions on Information Forensics and Security, vol. 1, no. 4, pp. 502–516, December 2006. http://dx.doi.org/10.1109/TIFS.2006.885020
  27. [27] K. Bryan, “Video Steganalysis for Digital Forensics Investigation,” PhD thesis, University of Rhode Island, Kingston, US, 2013.
DOI: https://doi.org/10.1515/acss-2016-0007 | Journal eISSN: 2255-8691 | Journal ISSN: 2255-8683
Language: English
Page range: 53 - 60
Published on: May 28, 2016
Published by: Riga Technical University
In partnership with: Paradigm Publishing Services
Publication frequency: 1 issue per year

© 2016 David Griberman, Pavel Rusakov, published by Riga Technical University
This work is licensed under the Creative Commons Attribution 4.0 License.