A Coverless Video Steganography Technique Based on Integer Wavelet Transform

Coverless steganography‏ ‏has received a lot of attention lately because it is a ‎technique that ‎completely defies ‎steganalysis detection by not modifying the ‎carriers.‎‏ ‏The majority of ‎currently used coverless steganography ‎algorithms, ‎however, use images as their carriers, and ‎there aren&...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Ingénierie des systèmes d'Information 2024-10, Vol.29 (5), p.1991-1997
Hauptverfasser: Kadhim, Mohammed Ayad, Jawad, Majid Jabbar
Format: Artikel
Sprache:eng ; fre
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Coverless steganography‏ ‏has received a lot of attention lately because it is a ‎technique that ‎completely defies ‎steganalysis detection by not modifying the ‎carriers.‎‏ ‏The majority of ‎currently used coverless steganography ‎algorithms, ‎however, use images as their carriers, and ‎there aren't many studies on coverless ‎video steganography. Actually, video is a more trustworthy and educational medium. In addition, most of covert ‎video ‎steganography techniques in ‎use today hide information in a specific video frame. These ‎techniques ‎are ‎insufficiently robust and do not take into account the distinct ‎sequential ‎characteristics of video carriers that set ‎them apart from images. This ‎research ‎proposes a coverless steganography scheme depend on the integer ‎wavelet ‎transform ‎‎(IWT) of video. At first, a new method is proposed to generate hash ‎sequences based on ‎IWT ‎coefficients. We take each frame in the video and divide ‎it into sub matrices(blocks). ‎After that, the coefficients of ‎each block are converted ‎into a bit sequence. Then, a video ‎index structure was created to expedite the ‎process of ‎finding matching blocks in the video. ‎The procedure of information ‎embedding involves segmenting the confidential ‎info‏ ‏into ‎binary segments (8 ‎bits) and choosing the blocks based on the video index structure whose ‎hash ‎sequence ‎matches the confidential information segment. Finally, all the chosen ‎blocks ‎and ancillary information are ‎transmitted to the recipient. The suggested ‎method outperforms ‎the most recent coverless steganography algorithms ‎in terms ‎of capacity, resilience, and safety, ‎according to experimental findings and analysis.‎
ISSN:1633-1311
2116-7125
DOI:10.18280/isi.290530