Open Access

Comparison of Video Steganography Methods for Watermark Embedding


Cite

[1] E. Zielinska, W. Mazurczyk and K. Szczypiorski, “Trends in Steganography,” Communications of the ACM, no. 03, issue 57, 2014, pp. 86–95. http://dx.doi.org/10.1145/2566590.2566610Search in Google Scholar

[2] I. Cox, M. Miller, J. Bloom, J. Fridrich and T. Kalker, Digital Watermarking and Steganography, 2nd Ed., Burlington: Morgan Kaufmann, 2007.10.1016/B978-012372585-1.50015-2Search in Google Scholar

[3] G. Konahovich and A. Puzirenko, Digital Steganography, Theory and Practice – Компьютерная стеганография, теория и практика. Kiev: MK-Press, 2006. (in Russian)Search in Google Scholar

[4] A. K. Al-Frajat, H. A. Jalab, Z. M. Kasirun, A. A. Zaiden and B. B. Zaiden, “Hiding Data in Video File: An Overview,” J. of Applied Sciences, no. 10, pp. 1644–1649, June 2010. http://dx.doi.org/10.3923/jas.2010.1644.1649Search in Google Scholar

[5] M. M. Sadek, A. S. Khalifa and M. G. M. Mostafa, “Video steganography: a comprehensive review,” Multimedia Tools and Applications, pp. 1–32, 2014. http://dx.doi.org/10.1007/s11042-014-1952-zSearch in Google Scholar

[6] A. P. Sherly, P. P. Amritha, “A Compressed Video Steganography using TPVD,” Int. J. of Database Management Systems (IJDMS), vol. 2, no. 3, pp. 67–80, August 2010. http://dx.doi.org/10.5121/ijdms.2010.2307Search in Google Scholar

[7] N. D. Amsden and L. Chen, “Analysis of Facebook Steganographic Capabilities,” in Int. Conf. on Computing, Networking and Communications, Communications and Information Security Symposium, 2015, pp. 67–71. http://dx.doi.org/10.1109/iccnc.2015.7069317Search in Google Scholar

[8] “MSU Video StegoVideo tool and plugin,” March 2011. [Online]. Available: http://www.compression.ru/video/stego_video/index_en.html. [Accessed: October 3, 2015].Search in Google Scholar

[9] “OpenPuff tool,” 2015. [Online]. Available: http://embeddedsw.net/OpenPuff_Steganography_Home.html. [Accessed: October 3, 2015].Search in Google Scholar

[10] “RT Steganography in Video Streaming tool,” July 2013. [Online]. Available: http://sourceforge.net/projects/rtstegvideo. [Accessed: October 3, 2015].Search in Google Scholar

[11] “Steganosaurus tool,” April 2013. [Online]. Available: http://steganosaur.us. [Accessed: October 3, 2015].Search in Google Scholar

[12] B. Kaur, A. Kaur and J. Singh, “Steganographic Approach for Hiding Image in DCT Domain,” Int. J. of Advances in Engineering & Technology, vol. 1, issue 3, pp. 72–78, July 2011.Search in Google Scholar

[13] A. M. Kothari and V. V. Dwivedi, “Performance Analysis of Digital Video Watermarking using Discrete Cosine Transform,” Int. J. of Electrical and Computer Engineering Systems, vol. 2, no. 1, pp. 11–16, 2011.Search in Google Scholar

[14] S. AL-Mansoori and A. Kunhu, “Robust Watermarking Technique based on DCT to Protect the Ownership of DubaiSat-1 Images agains Attacks,” IJCSNS Int. J. of Computer Science and Network Security, vol. 12, no. 6, June 2012.Search in Google Scholar

[15] K. R. Chetan and K. Raghavendra, “DWT Based Blind Digital Video Watermarking Scheme for Video Authentication,” Int. J. of Computer Applications, vol. 4, no. 10, pp. 19–26, Augusts 2010. http://dx.doi.org/10.5120/863-1213Search in Google Scholar

[16] “Xuggler,” 2011. [Online]. Available: http://www.xuggle.com/xuggler. [Accessed: October 3, 2015].Search in Google Scholar

[17] Dai-Kyung Hyun and Heung-Kyu Lee, “A Low-Complexity Mobile Watermarking Scheme Resisting Scale Distortions,” J. of Computer and Communications, vol. 2, pp. 77–81, 2014. http://dx.doi.org/10.4236/jcc.2014.24011Search in Google Scholar

[18] M. Kutter, F. Jordan and F. Bossen, “Digital Signature of Color Images using Amplitude Modulation,” January 1997. [Online]. Available: http://www.alpvision.com/pdf/3022-51.pdf [Accessed: Oct. 11, 2015].Search in Google Scholar

[19] A. Swathi and S.A.K. Jilani, “Video Steganography by LSB Substitution Using Different Polynomial Equations,” Int. J. Of Computational Engineering Research, vol. 2, issue 5, pp. 1620–1623, September 2012.Search in Google Scholar

[20] S. Gujjunoori and B. B. Amberker, “Reversible Data Embedding for MPEG-4 Video Using Middle Frequency DCT Coefficients,” J. of Information Hiding and Multimedia Signal Processing, vol. 5, no. 3, pp. 408–419, July 2014.10.1109/ISSP.2013.6526886Search in Google Scholar

[21] R. J. Mstafa and K. M. Elleithy, “A high payload video steganography algorithm in DWT domain based on BCH codes (15, 11),” in Wireless Telecommunications Symposium (WTS), 2015, pp. 1–8. http://dx.doi.org/10.1109/wts.2015.7117257Search in Google Scholar

[22] N. Chaturvedi and S. J. Basha, “Comparison of Digital Image watermarking Methods DWT & DWT-DCT on the Basis of PSNR,” Int. J. of Innovative Research in Science, Engineering and Technology, vol. 1, no. 2, pp. 147–153, December 2012.Search in Google Scholar

[23] J. Mansouri and M. Khademi, “An adaptive scheme for compressed video steganography using temporal and spatial features of the video signal,” Int. J. of Imaging Systems and Technology, vol. 19, issue 4, pp. 306–315, December 2009. http://dx.doi.org/10.1002/ima.20207Search in Google Scholar

[24] S. Khupse and N. N. Patil, “An adaptive steganography technique for videos using Steganoflage,” in Issues and Challenges in Intelligent Computing Techniques (ICICT), 2014, pp.811-815.10.1109/ICICICT.2014.6781384Search in Google Scholar

[25] S. A. Hosseini-pour, M. Soleimanpour and H. Nezamabadi-pour, “A novel approach to secure image based steganography by using eigenvalue and eigenvector principles,” in 2013 21st Iranian Conference on Electrical Engineering, ICEE, 2013, pp. 1–5. http://dx.doi.org/10.1109/IranianCEE.2013.6599635Search in Google Scholar

[26] U. Budhia, D. Kundur and T. Zourntos, “Digital Video Steganalysis Exploiting Statistical Visibility in the Temporal Domain,” in IEEE Transactions on Information Forensics and Security, vol. 1, no. 4, pp. 502–516, December 2006. http://dx.doi.org/10.1109/TIFS.2006.885020Search in Google Scholar

[27] K. Bryan, “Video Steganalysis for Digital Forensics Investigation,” PhD thesis, University of Rhode Island, Kingston, US, 2013.Search in Google Scholar

eISSN:
2255-8691
Language:
English