The International Arab Journal of Information Technology (IAJIT)

..............................
..............................
..............................


A Novel Secure Video Steganography Technique using Temporal Lifted Wavelet Transform and

Steganography is a term that refers to the process of concealing secret data inside a cover media which can be audio, image and video. A new video steganography scheme in the wavelet domain is presented in this paper. Since the convolutional discrete wavelet transform produces float numbers, a lifted wavelet transform is used to conceal data. The method embeds secret data in the detail coefficients of each temporal array of the cover video at spatial localization using a unique embedding via YCbCr color space and complementing the secret data to minimize error in the stego video before embedding. Three secret keys are used in the scheme. Method’s performance matrices such as peak signal to noise ratio and Normalized Cross Correlation (NCC) expresses good imperceptibility for the stego-video. The value of Peak Signal to Noise Ratio (PSNR) is in range of 34-40dB, and high embedding capacity.


[1] Abbas S., El-Arif T., Ghaleb F., and Khami S., “Optimized Video Steganography Using Cuckoo Search Algorithm,” in Proceedings of IEEE 7th International Conference on Intelligent Computing and Information Systems, Cairo, pp. 572-577, 2015.

[2] Al Korbi H., Al-Ataby A., Al-Taee M., and Al- Nuaimy W., “High-Capacity Images Steganography Based on Haar DWT for Hiding Miscellaneous Data,” in Proceedings of IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies, Amman, pp. 1-6, 2015.

[3] Al-Ataby A. and Al-Naima F., “A Modified High Capacity Image Steganography Technique Based on Wavelet Transform,” The International Arab Journal Information Technology, vol. 7, no. 4, pp. 358-364, 2010.

[4] Chantrapornchai C., Churin K., Preechasuk J., and Adulkasem S., “Video Steganography for Hiding Image with Wavelet Coefficients,” International Journal of Multimedia and Ubiquitous Engineering, vol. 9, no. 6, pp. 385- 396, 2014.

[5] Chanu Y., Tuithung T., and Singh K., “A Short Survey on Image Steganography and Steganalysis Techniques,” in Proceedings of 3rd National Conference on Emerging Trends and Applications in Computer Science, Shillong, pp. 52-55, 2012.

[6] Dasgupta K., Mondal J., and Duttac P., “Optimized Video Steganography using Genetic Algorithm,” Procedia Technology, vol. 10, pp. 131-137, 2013.

[7] EI-Safy R., Zayed H., and EI-Dessouki A., “An Adaptive Steganographic Technique Based on Integer Wavelet Transform,” in Proceedings of International Conference on Networking and Media Convergence, Cairo, pp. 111-117, 2009.

[8] Euphrasi K. and Rani M., “A Comparative Study on Video Steganography in Spatial and IWT Domain,” in Proceedings of IEEE International Conference on Advances in Computer Applications, Coimbatore, pp. 104-109, 2016.

[9] Gupta H. and Chaturvedi S., “Video Steganography through LSB Based Hybrid Approach,” International Journal of Engineering Research and Development, vol. 6, no. 12, pp. 32-42, 2014.

[10] Hossain M., Al Haque S., and Sharmin F., “Variable Rate Steganography in Gray Scale Digital Images Using Neighborhood Pixel Information,” The International Arab Journal of Information Technology, vol. 7, no. 1, pp. 34-38, 2009.

[11] Jue W., Zhang M., and Sun J., “Video Steganography Using Motion Vector Components” in Proceedings of IEEE 3rd International Conference on Communication Software and Networks, Xi'an, pp. 500-503, 2011. A Novel Secure Video Steganography Technique using Temporal Lifted Wavelet ... 153

[12] Juneja M. and Sandhu P., “Designing of Robust Image Steganography Technique Based on LSB Insertion and Encryption,” in Proceedings of International Conference on Advances in Recent Technologies in Communication and Computing, Kottayam, pp. 302-305, 2009.

[13] Karim S., Rahman M., and Hossain M., “A new Approach for LSB Based Image Steganography Using Secret Key,” in Proceedings of 14th International Conference on Computer and Information Technology, Dhaka, pp. 286-291, 2011.

[14] Kumar V. and Kumar D., “Performance Evaluation of DWT Based Image Steganography,” in proceedings of IEEE 2nd International Advance Computing Conference, Patiala, pp. 223-228, 2010.

[15] Mishra M., Tiwari G., and Yadav A., “Secret Communication using Public key Steganography,” in Proceedings of IEEE International Conference on Recent Advances and Innovations in Engineering, Jaipur, pp. 9-11, 2014.

[16] Moon S. and Raut R., “Analysis of Secured Video Steganography Using Computer Forensics Technique for Enhance Data Security,” in Proceedings of IEEE 2nd International Conference on Image Information Processing, Shimla, pp. 660-665, 2013.

[17] Mstafa R. and Elleithy K., “A Highly Secure Video Steganography Using Hamming Code (7, 4),” in Proceedings of IEEE Long Island Systems, Applications and Technology Conference, Farmingdale, pp. 1-6, 2014.

[18] Rajalakshmi K. and Mahesh K., “Video Steganography Based on Embedding the Video Using PCF Technique,” in Proceedings of International Conference on Information Communication and Embedded Systems, Chennai, pp. 1-4, 2017.

[19] Ramalingam M. and Isa N., “A Steganography Approach over Video Images to Improve Security,” Indian Journal of Science Technology, vol. 8, no. 1, pp. 79-86, 2015.

[20] Ramaswamy R. and Arumugam V., “Lossless Data Hiding based on Histogram Modification,” The International Arab Journal of Information Technology, vol. 9, no. 5, pp. 445-451, 2012.

[21] Shahadi H., Thahab A., and Ali M., “Adaptive Embedding Approach in Color Image Carrier for Covert Communication,” Indian Journal of Science and Technology, vol. 9, no. 46, pp. 1-11, 2016.

[22] Swain G. and Lenka S., “A Novel Approach to RGB Channel Based Image Steganography Technique,” The International Arab Journal of E-Technology, vol. 2, no. 4, pp. 181-186, 2012.

[23] Yusoff S. and Wah Y., “Comparison of Conventional Measures of Skewnwss and Kurtosis for small Sample Size,” in Proceedings of International Conference on Statistics in Science, Business and Engineering, Langkawi, pp. 1-6, 2012. Ahmed Thahab received his B.Sc in Electrical Engineering from the University of Babylon and M.Sc from the University of Babylon in 2011 in Electronic and Communication Engineering. Currently he is a faculty member in the University of Karbala. His research interest is in video, image processing and Information security.