Professional Documents
Culture Documents
Crocus.
avi,
368 Table IV. PSNR of Proposed algorithms based SLT vs DWT
KB, Test Videos DWT SLT
12 Quetal.avi (cover) 27.0557 29.5112
frames and
15 fps Pod.avi(message)
Cartoo Crocus.avi(cover) and 27.47 28.346
fp.avi(message)
n.avi,
Earth.avi(cover) and 27.33 29.78
405,01 fp.avi(message)
2 KB, Cartoon.avi(cover)
28 fps and
counter.avi(message)
VI. CONCLUSION [7] R. J. Mstafa and K. M. Elleithy, ``Compressed and raw video
steganography techniques: A comprehensive survey and analysis,''
A new Video Steganographic Scheme based on Multimedia Tools Appl., pp. 1_38, 2016, doi: 10.1007/s11042-016-
uncompressed raw domain is proposed in this paper. Further 4055-1.
t-codes, self-synchronizing variable length codes are used in [8] Sushil Kumar, "Performance analysis of Image Steganography
Schemes based on different Transform Domains", International Journal
the pre-processing step to provided additional layer of of Management, Technology And Engineering (IJMTE), Volume 8,
security. For data hiding, Wavelet (DWT) and Wavelet-like Issue X, OCTOBER/2018, pp. 2810-2828
transforms (SLT) have been used [9] Sushil Kumar , “ Image Steganograpy based on Discrete Chebychev
This algorithm provides high capacity and imperceptible Transform”, International Conference on Strategy Innovation &
stego-image for human vision of the hidden secret Technology (ICSIT2014), Ansal University,Gurgaon,Haryana, 2014
information. The performance of the steganographic [10] Sushil Kumar nee’ Sushil Kumar Azad,
https://scholar.google.co.in/citations?user=RPVXo_QAAAAJ&hl=en
algorithm is studied and experimental results shows that this
[11] M. R. Titchener, “Generalised T-codes: extended construction
scheme can be applied on uncompressed videos (.avi) with no algorithm for self- synchronization codes”, IEE Proc. Commun., Vol.
noticeable degradation in visual quality. 143, No.3, pp. 122-128, 2006
[12] C Xu, X Ping, “A steganographic algorithm in uncompressed video
sequence based on difference between adjacent frames”, In: Fourth
REFERENCES International Conference on Image and Graphics (ICIG) 297–302,
2007.
[13] M Yang, N Bourbakis, “A high bitrate information hiding algorithm
[1] R Basheer & M.K Safiya “Video data hiding in selective pixels of
for digital video content under H.264/AVC compression”, In: 48th
forbidden zone using mapping function”, International Journal of
Midwest Symposium on Circuits and Systems 935–938, 2005.
Advanced Computer Technology (IJACT).ISSN:2319-7900, 2014.
[14] Patel, K., “Lazy Wavelet Transform Based Steganography in Video”,
[2] A. K. Bhaumik, M. Choi, , R. J. Robles , & M. O. Balitanas, “Data
International conference on communication systems and network
hiding in video”, International Journal of Database Theory and
technologies (CSNT) 2013.
Application, 2(2), 9-16, 2009.
[15] Mennatallah M. Sadek, Amal S. Khalifa, Mostafa G. M. Mostafa,
[3] A. Kolakalur, I. Kagalidis, and B. Vuksanovic, “Wavelet Based Color
“Video steganography: a comprehensive review”, Multimed Tools
Video Steganography”, IACSIT International Journal of Engineering
Appl, Springer Science+Business Media New York 2014, DOI
and Technology, Vol. 8, No. 3, June 2016
10.1007/s11042-014-1952-z
[4] Apau Richard,“ Enhancing data security using video steganography,
[16] A P Sherly, P P Amritha, “A Compressed Video Steganography using
RSA and Huffman code algorithms with LSB insertion “, M.Phil.
TPVD”, Int J of Database Manag Syst 2 (3). doi:5121/ijdms.2010.2307
thesis, Kwame Nkrumah University Of Science And Technology,
67, 2010.
Kumasi, Ghana, September, 2016
[17] ShengDun Hu, KinTak U, “A Novel Video Steganography based on
[5] Apau Richard, J. B. Hayfron-Acquah, Frimpong Twum, “A Modified
Non-uniform Rectangular Partition”, IEEE International Conference
High Capacity Video Steganography Technique Based On Spatial
on Computational Science and Engineering CSE/I-SPAN/IUCC 2011
Domain Method, Asymmetric Cryptography and Huffman Code
Algorithms”, Communications on Applied Electronics (CAE), Volume [18] G. Panda and S.K. Meher, “An efficient approach to signal
5, No.10, September 2016 compression using slantlet transform”, IETE Journal of
Research, Vol. 46, No. 5, September, pp. 299-307, 2000
[6] Ramadhan J. Mstafa, Khaled M. Elleithy, Eman Abdelfattah, “A
Robust and Secure Video SteganographyMethod in DWT-DCT [19] Ivan W. Selesnick, “The Slantlet Transform”, IEEE transactions on
Domains Based on Multiple Object Tracking and ECC”, Computer signal processing,Vol. 47, No. 5, May, pp. 1304-1312., 1998
Science & Information Technology, Sacred Heart University, IEEE
Access, May 2017.
oi:10.1109/ACCESS.2017.2691581(http://digitalcommons.sacredhear
t.edu/computersci_fac)