259
Views
2
CrossRef citations to date
0
Altmetric
Research Article

A secure video steganography scheme using DWT based on object tracking

&
 

ABSTRACT

Videos are nowadays the most frequent and easy mode of communication over the internet; the reason behind the growth is the accessibility to video processing software available on the internet. Video steganography is a field where the data is embedded in video keeping the visual quality of the video intact. This study presents a new video steganography scheme with a stable trade-off between robustness and imperceptibility using 2D-DWT (Discrete Wavelet Transform) based on object detection and tracking. The main contribution of this paper includes embedding of secret data in the moving objects after applying object detection for the video frames where the secret bits are embedded in middle frequency sub-bands after applying 2D-DWT. To highlight the effectiveness of the proposed scheme, experimental results are carried out both quantitatively and qualitatively where quantitative analysis is done using different metrics such as PSNR, SSIM, BER and qualitative analysis is done using visual results of the frames. The experimental results illustrated that the proposed approach outperforms existing techniques in terms of qualitative and quantitative evaluation with high imperceptibility and robustness against noise attack. Eventually, the scheme has also been tested against existing steganalysis techniques to ensure the security of the proposed scheme.

Acknowledgments

This research work is supported by Technical Education Quality Improvement Project III (TEQIP III) of MHRD, Government of India assisted by World Bank under Grant Number P154523 and sanctioned to UIET, Panjab University, Chandigarh (India).

Additional information

Funding

This work was supported by the Technical Education Quality Improvement Project III (TEQIP III) of MHRD, Government of India assisted by World Bank [P154523].

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.