Open Access Open Access  Restricted Access Subscription or Fee Access

Robust Verification Method for Video Communication

E. M. El-Bakary, O. Zahran, S. El-Rabaie, F. E. Abd El-Samie

Abstract


Video is compressed to move the redundancies for efficient communication. In this paper, we use a steganography method for verification of the video content at the receiver side. The main idea of the proposed steganography method is based on the Discrete Cosine Transform (DCT). It is based on creating a signature for each block of the DCT of the compressed video sequence to be embedded in another block. This is attributed to the fact that most DCT coefficients of the compressed video sequence are either zero or close to zero. Simulation results reveal the robustness of the suggested steganography method.


Keywords


Video Compression, Data Hiding, Steganography

Full Text:

PDF

References


Campisi, P., Kundur, D., Hatzinakos, D., & Neri, A. (2002). Compressive data hiding: An unconventional approach for improved color image coding. EURASIP Journal on Applied Signal Processing, 2002(2), 152–163.

Christopoulos, C., Skodras, A., & Ebrahimi, T. (2000). The JPEG2000 still image coding system: an overview. IEEE Transaction on Consumer Electronics, 46(4).

de Queiroz, R., Choi, C. K., Huh, Y., & Rao, K. R. (1997). Wavelet transforms in a JPEG-like image coder. IEEE Transactions on Circuits and Systems for Video Technology, 7(2), 419–424.

Solanki, K., Jacobsen, N., Madhow, U., Manjunath, B. S., & Chandrasekaran, S. (2004). Robust image adaptive data hiding based on erasure and error correction. IEEE Transaction on Image Processing, 13(12), 1627–1639.

Tseng, H., & Chang, C. (2004). High capacity data hiding in JPEG-compressed images. Informatica, 15(1), 127–142

Wang, Z., Bovik, A. C., Sheikh, H. R., & Simoncelli, E. P. (2004). Image quality assessments: From error visibility to structural similarity. IEEE Transaction on Image Processing, 3(4), 600–612.

N.F. Johnson, S. Jajodia, Exploring steganography: seeing the unseen, IEEE Computer 31 (2) (1998) 26–34.

J.C. Judge,Steganography: past, present, future. SANS Institute publication, /http://www.sans.org/reading_room/whitepapers/ stenganography/552.phpS, 2001

S.B. Sadkhan, Cryptography: current status and future trends, in: Proceedings of IEEE International Conference on Information & Communication Technologies: From Theory to Applications, Da-mascus. Syria, April 19–23, 2004, pp. 417–418.

J.C. Hernandez-Castro, I. Blasco-Lopez, J.M. Estevez-Tapiador, Stegano-graphy in games: a general methodology and its application to the game of Go, Computers and Security, Elsevier Science 25 (2006) 64–71.

Y. Li, C. Li, C. Wei, Protection of mammograms using blind steganography and watermarking, in: Proceedings of the IEEE International Symposium on Information Assurance and Security, 2007, pp. 496–499.

D. Frith, Steganography approaches, options, and implications, Network Security 2007 (8) (2007) 4–7.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.