A Coverless Video Steganography Technique Based on Integer Wavelet Transform
Coverless steganography has received a lot of attention lately because it is a technique that completely defies steganalysis detection by not modifying the carriers. The majority of currently used coverless steganography algorithms, however, use images as their carriers, and there aren&...
Gespeichert in:
Veröffentlicht in: | Ingénierie des systèmes d'Information 2024-10, Vol.29 (5), p.1991-1997 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng ; fre |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Coverless steganography has received a lot of attention lately because it is a technique that completely defies steganalysis detection by not modifying the carriers. The majority of currently used coverless steganography algorithms, however, use images as their carriers, and there aren't many studies on coverless video steganography. Actually, video is a more trustworthy and educational medium. In addition, most of covert video steganography techniques in use today hide information in a specific video frame. These techniques are insufficiently robust and do not take into account the distinct sequential characteristics of video carriers that set them apart from images. This research proposes a coverless steganography scheme depend on the integer wavelet transform (IWT) of video. At first, a new method is proposed to generate hash sequences based on IWT coefficients. We take each frame in the video and divide it into sub matrices(blocks). After that, the coefficients of each block are converted into a bit sequence. Then, a video index structure was created to expedite the process of finding matching blocks in the video. The procedure of information embedding involves segmenting the confidential info into binary segments (8 bits) and choosing the blocks based on the video index structure whose hash sequence matches the confidential information segment. Finally, all the chosen blocks and ancillary information are transmitted to the recipient. The suggested method outperforms the most recent coverless steganography algorithms in terms of capacity, resilience, and safety, according to experimental findings and analysis. |
---|---|
ISSN: | 1633-1311 2116-7125 |
DOI: | 10.18280/isi.290530 |