Building a Statistical Model to Detect Foreground Objects and using it in Video Steganography

Main Article Content

Mithal Hadi Jebur
https://orcid.org/0000-0002-4788-1066
Fanar Ali Joda
Mohammed Abdullah Naser
https://orcid.org/0000-0002-0420-7514

Abstract

Video steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the changes in the moving objects instead of using background area for embedding in the video. The experimental results showed the better visual quality of the stego video with PSNR values exceeding 58 dB, this indicates that the proposed method works without causing much distortion in the original video and transmitted secret message.

Article Details

How to Cite
1.
Building a Statistical Model to Detect Foreground Objects and using it in Video Steganography. Baghdad Sci.J [Internet]. 2023 Dec. 1 [cited 2024 Apr. 27];20(6). Available from: https://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/7926
Section
article

How to Cite

1.
Building a Statistical Model to Detect Foreground Objects and using it in Video Steganography. Baghdad Sci.J [Internet]. 2023 Dec. 1 [cited 2024 Apr. 27];20(6). Available from: https://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/7926

References

Raju R, Philip FM. Video steganography in haar wavelet domain based on multiple object tracking and error correction codes. Int Res J Eng Technol. 2018; 5(04): 3985-3990. https://www.irjet.net/archives/V5/i4/IRJET-V5I4890.pdf.

Msallam MM. A Development of Least Significant Bit Steganography Technique. Iraqi J Comput, Comm, Control and Sys Eng. 2020 Jan 1; 20(1): 31-9. https://doi.org/10.33103/uot.ijccce.20.1.4.

Dalal M, Juneja M. A survey on information hiding using video steganography. Artif Intell Rev. 2021 Dec; 54(8): 5831-95. https://doi.org/10.1007/s10462-021-09968-0.

Jenifer JM, Ratna SR, Loret JS, Gethsy DM. A survey on different video steganography techniques. In 2018 2nd International Conference on Trends in Electronics and Informatics (ICOEI). IEEE. 2018 May 11: 627-632. https://doi.org/10.1109/ICOEI.2018.8553847.

Pal SK, Pramanik A, Maiti J, Mitra P. Deep learning in multi-object detection and tracking: state of the art. Appl Intell. 2021 Sep; 51(9): 6400- 6429. https://doi.org/10.1007/s10489-021-02293-7.

Shtayt BA, Zakaria NH, Harun NH. A comprehensive review on medical image steganography based on LSB technique and potential challenges. Baghdad Sci J. 2021 Jun 20; 18:957-974. http://dx.doi.org/10.21123/bsj.2021.18.2(Suppl.).0957.

Chapel MN, Bouwmans T. Moving objects detection with a moving camera: A comprehensive review. Comput Sci Rev. 2020 Nov 1; 38: 100310. https://doi.org/10.1016/j.cosrev.2020.100310.

Naser MA, Al-alak SMK, Hussein AM, Jawad MJ. Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel. Baghdad Sci J. 2022 Dec. 1; 19(6): 1362. https://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/6142.

Sahib MG. Foreground Object Detection Based on Chrominance and Texture Features with Enhancement by Canny Filter. Iraqi J Inf. Technol. 2018; 9(2): 171-193. https://www.iasj.net/iasj/download/a247a1734195fd25.

Ogla RA. Symmetric-Based steganography technique using spiral-searching method for HSV color images. Baghdad Sci J. 2019 Dec 1; 16(4): 0948-. https://doi.org/10.21123/bsj.2019.16.4.0948.

Hashim AT, Ali YH, Ghazoul SS. Developed method of information hiding in video AVI file based on hybrid encryption and steganography. Eng Tech J. 2011; 29(2): 359-373. https://uotechnology.edu.iq/dep-cs/mypdf/research/2011/r9.pdf.

Vinay DR, Ananda BJ. A Novel Secure Data Hiding Technique into Video Sequences Using RVIHS. Int J Commun Netw Inf Secur. 2021 Apr 1; 13(2): 53-65. https://doi.org/10.5815/ijcnis.2021.02.05.

Mstafa RJ, Elleithy KM, Abdelfattah E. A robust and secure video steganography method in DWT-DCT domains based on multiple object tracking and ECC. IEEE access. 2017 Apr 6; 5: 5354-5365. https://doi.org/10.1109/ACCESS.2017.2691581.

Paramesh G, Pavithra KV, Ranjitha N, Swetha S, Anushalalitha T. Video Steganography using MATLAB. EAI Endorsed Trans. cloud syst. 2017 Dec 20; 3(10): 1-7. https://doi.org/10.4108/eai.20-12-2017.153493.

Rajkumar GP, Malemath VS. Video Steganography: Secure Data Hiding Technique. Int J Comput Net Info Sec. 2017 Sep 1; 9(9). https://doi.org/10.5815/ijcnis.2017.09.05.

Hemalatha M, Manisha G, Mounika P, Saleema SK, Prasanna KL. Matlab Code for Video Steganography. J Info Comput Sci. 2020; 10(6): 87-92. https://doi.org/10.12733.JICS.2020.V10I6.535569.12510.

Nilizadeh A, Nilizadeh S, Mazurczyk W, Zou C, Leavens GT. Adaptive matrix pattern steganography on RGB images. J. Cyber Secur. Mobil. 2021; 11(1): 1-28. https://doi.org/10.13052/jcsm2245-1439.1111.

Mirah SR, Jawad MJ. Secure Video Steganography Method Using LSB and MSB with Triple XOR Operation. J Univ Babylon pure appl Sci. 2021 Dec 1; 29(3): 243-56. https://www.journalofbabylon.com/index.php/JUBPAS/article/view/3981/2998.

Paul M, Haque SM, Chakraborty S. Human detection in surveillance videos and its applications-a review. Eurasip J Adv Signal Process. 2013 Dec; 2013(1): 1-6. https://doi.org/10.1186/1687-6180-2013-176.

Similar Articles

You may also start an advanced similarity search for this article.