2016 IEEE Long Island Systems, Applications and Technology Conference (LISAT) 2016
DOI: 10.1109/lisat.2016.7494111
|View full text |Cite
|
Sign up to set email alerts
|

A DCT-based robust video steganographic method using BCH error correcting codes

Abstract: Due to the significant growth of video data over the Internet, it has become a popular choice for data hiding field. The performance of any steganographic algorithm relies on the embedding efficiency, embedding payload, and robustness against attackers. Low hidden ratio, less security, and low quality of stego videos are the major issues of many existing steganographic methods. In this paper, we propose a DCT-based robust video steganographic method using BCH codes. To improve the security of the proposed algo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
13
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 32 publications
(14 citation statements)
references
References 18 publications
1
13
0
Order By: Relevance
“…As seen in the table, in case of the Container video, survival rate attained by proposed BCH(7, 4, 1) error correcting code is better than both Swati et al [15] and Liu et al [14] at all QP values. As expected, BCH (31,11,5) scheme performs much better than both the literature at all QP values in the range 29-35. The proposed Turbo error correcting schemes gives interesting results.…”
Section: Robustness Performancesupporting
confidence: 78%
See 3 more Smart Citations
“…As seen in the table, in case of the Container video, survival rate attained by proposed BCH(7, 4, 1) error correcting code is better than both Swati et al [15] and Liu et al [14] at all QP values. As expected, BCH (31,11,5) scheme performs much better than both the literature at all QP values in the range 29-35. The proposed Turbo error correcting schemes gives interesting results.…”
Section: Robustness Performancesupporting
confidence: 78%
“…As seen is the table, the coding scheme with block length K t = 16 performs much better than both Swati et al [15] and Liu et al [14]. In addition, its performance is similar to BCH (31,11,5). This means that, in the proposed method, Turbo code with block length 16 is almost as powerful as BCH (31,11,5).…”
Section: Robustness Performancementioning
confidence: 65%
See 2 more Smart Citations
“…This method is called perturbed because Macroblock partitioning is perturbed during inter-frame coding. In [133][134] authors discussed a method of video steganography where DCT (Discreet Cosine Transform) has been performed on all the frames of the video and secret data is embedded in the higher order coefficient of the DCT . In [135] authors used DWT (Discreet Wavelet transform) to embed secret data which is BCH encoded before embedding.…”
Section: Figure 1 Grey Level Representation In Histogram Of An Imagementioning
confidence: 99%