Comparative analysis of steganographic algorithms within compressed video domain

Tarik Faraj Idbeaa, Salina Abdul Samad, Hafizah Husain

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

Steganographic techniques with varying degrees of embedding capacity, perceptual transparency, and security are presented. These techniques have been developed to protect privileged or confidential information restricted to public access and to replace cryptography methods. In this study, three embedding algorithms, namely, least significant bit insertion, bit-plane complexity segmentation, and enhanced version of pixel value difference (EPVD) were implemented and analyzed in terms of the main steganography issues (payload, invisibility, and security) using a different proper performance metrics. This study was motivated by the minimal research focus accorded to hiding data in compression domain for the class of video-based embedding methods. Therefore, analyzing steganographic algorithms is generally based on hiding information in the quantized AC-Coefficients of the frames during the MPEG-2 compression process. Simulation results reveal that EPVD provides better embedded payload and acceptable visual quality, but lower PSNR value.

Original languageEnglish
Title of host publication2014, 8th International Conference on Signal Processing and Communication Systems, ICSPCS 2014 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Print)9781479952557
DOIs
Publication statusPublished - 23 Jan 2014
Event8th International Conference on Signal Processing and Communication Systems, ICSPCS 2014 - Gold Coast, Australia
Duration: 15 Dec 201417 Dec 2014

Other

Other8th International Conference on Signal Processing and Communication Systems, ICSPCS 2014
CountryAustralia
CityGold Coast
Period15/12/1417/12/14

Fingerprint

Pixels
Steganography
Transparency
Cryptography

Keywords

  • BPCS
  • EPVD
  • LSB
  • MPEG-2
  • steganography

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Signal Processing
  • Electrical and Electronic Engineering

Cite this

Idbeaa, T. F., Abdul Samad, S., & Husain, H. (2014). Comparative analysis of steganographic algorithms within compressed video domain. In 2014, 8th International Conference on Signal Processing and Communication Systems, ICSPCS 2014 - Proceedings [7021067] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ICSPCS.2014.7021067

Comparative analysis of steganographic algorithms within compressed video domain. / Idbeaa, Tarik Faraj; Abdul Samad, Salina; Husain, Hafizah.

2014, 8th International Conference on Signal Processing and Communication Systems, ICSPCS 2014 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 2014. 7021067.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Idbeaa, TF, Abdul Samad, S & Husain, H 2014, Comparative analysis of steganographic algorithms within compressed video domain. in 2014, 8th International Conference on Signal Processing and Communication Systems, ICSPCS 2014 - Proceedings., 7021067, Institute of Electrical and Electronics Engineers Inc., 8th International Conference on Signal Processing and Communication Systems, ICSPCS 2014, Gold Coast, Australia, 15/12/14. https://doi.org/10.1109/ICSPCS.2014.7021067
Idbeaa TF, Abdul Samad S, Husain H. Comparative analysis of steganographic algorithms within compressed video domain. In 2014, 8th International Conference on Signal Processing and Communication Systems, ICSPCS 2014 - Proceedings. Institute of Electrical and Electronics Engineers Inc. 2014. 7021067 https://doi.org/10.1109/ICSPCS.2014.7021067
Idbeaa, Tarik Faraj ; Abdul Samad, Salina ; Husain, Hafizah. / Comparative analysis of steganographic algorithms within compressed video domain. 2014, 8th International Conference on Signal Processing and Communication Systems, ICSPCS 2014 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 2014.
@inproceedings{58fa082ac42043faab21d06f24cd472a,
title = "Comparative analysis of steganographic algorithms within compressed video domain",
abstract = "Steganographic techniques with varying degrees of embedding capacity, perceptual transparency, and security are presented. These techniques have been developed to protect privileged or confidential information restricted to public access and to replace cryptography methods. In this study, three embedding algorithms, namely, least significant bit insertion, bit-plane complexity segmentation, and enhanced version of pixel value difference (EPVD) were implemented and analyzed in terms of the main steganography issues (payload, invisibility, and security) using a different proper performance metrics. This study was motivated by the minimal research focus accorded to hiding data in compression domain for the class of video-based embedding methods. Therefore, analyzing steganographic algorithms is generally based on hiding information in the quantized AC-Coefficients of the frames during the MPEG-2 compression process. Simulation results reveal that EPVD provides better embedded payload and acceptable visual quality, but lower PSNR value.",
keywords = "BPCS, EPVD, LSB, MPEG-2, steganography",
author = "Idbeaa, {Tarik Faraj} and {Abdul Samad}, Salina and Hafizah Husain",
year = "2014",
month = "1",
day = "23",
doi = "10.1109/ICSPCS.2014.7021067",
language = "English",
isbn = "9781479952557",
booktitle = "2014, 8th International Conference on Signal Processing and Communication Systems, ICSPCS 2014 - Proceedings",
publisher = "Institute of Electrical and Electronics Engineers Inc.",

}

TY - GEN

T1 - Comparative analysis of steganographic algorithms within compressed video domain

AU - Idbeaa, Tarik Faraj

AU - Abdul Samad, Salina

AU - Husain, Hafizah

PY - 2014/1/23

Y1 - 2014/1/23

N2 - Steganographic techniques with varying degrees of embedding capacity, perceptual transparency, and security are presented. These techniques have been developed to protect privileged or confidential information restricted to public access and to replace cryptography methods. In this study, three embedding algorithms, namely, least significant bit insertion, bit-plane complexity segmentation, and enhanced version of pixel value difference (EPVD) were implemented and analyzed in terms of the main steganography issues (payload, invisibility, and security) using a different proper performance metrics. This study was motivated by the minimal research focus accorded to hiding data in compression domain for the class of video-based embedding methods. Therefore, analyzing steganographic algorithms is generally based on hiding information in the quantized AC-Coefficients of the frames during the MPEG-2 compression process. Simulation results reveal that EPVD provides better embedded payload and acceptable visual quality, but lower PSNR value.

AB - Steganographic techniques with varying degrees of embedding capacity, perceptual transparency, and security are presented. These techniques have been developed to protect privileged or confidential information restricted to public access and to replace cryptography methods. In this study, three embedding algorithms, namely, least significant bit insertion, bit-plane complexity segmentation, and enhanced version of pixel value difference (EPVD) were implemented and analyzed in terms of the main steganography issues (payload, invisibility, and security) using a different proper performance metrics. This study was motivated by the minimal research focus accorded to hiding data in compression domain for the class of video-based embedding methods. Therefore, analyzing steganographic algorithms is generally based on hiding information in the quantized AC-Coefficients of the frames during the MPEG-2 compression process. Simulation results reveal that EPVD provides better embedded payload and acceptable visual quality, but lower PSNR value.

KW - BPCS

KW - EPVD

KW - LSB

KW - MPEG-2

KW - steganography

UR - http://www.scopus.com/inward/record.url?scp=84946685750&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84946685750&partnerID=8YFLogxK

U2 - 10.1109/ICSPCS.2014.7021067

DO - 10.1109/ICSPCS.2014.7021067

M3 - Conference contribution

AN - SCOPUS:84946685750

SN - 9781479952557

BT - 2014, 8th International Conference on Signal Processing and Communication Systems, ICSPCS 2014 - Proceedings

PB - Institute of Electrical and Electronics Engineers Inc.

ER -