60
Views
11
CrossRef citations to date
0
Altmetric
Original Article

A blind steganography method based on histograms on video files

, , , &
Pages 75-82 | Accepted 24 Feb 2011, Published online: 12 Nov 2013

REFERENCES

  • Alattar AM, Lin ET, Celik MU. Digital watermarking of low bit-rate advanced simple profile MPEG-4 compressed video. IEEE Trans. Circuits Syst. Video Technol., 2003, 13, 787–800.
  • Cetin O. ‘ A data embedding algorithm design for video applications using a new steganography approach’, PhD thesis, Sakarya University, Sakarya, Turkey, 2008.
  • Cetin O, Ozcerit AT. A novel video-stego method based on HVS (İIGS Tabanlı Yeni Bir Video–Sırörtme Yöntemi), Proc. 3rd Information Security & Cryptology Conf. with International Participation, Ankara, Turkey, December 2008, Information Security Association, pp. 84–88.
  • Koz A, Alatan A. Oblivious video watermarking using temporal sensitivity of HVS, Proc. 2005 IEEE Int. Conf. on Image processing: ICIP 2005, Genoa, Italy, September 2005, IEEE, pp. 961–964.
  • Petitcolas FAP, Anderson RJ, Kuhn MG. Information hiding a survey. Proc. IEEE, 1999, 87, 1062–1078.
  • Potdar VM, Han S, Chang E. Fingerprinted secret sharing steganography for robustness against image cropping attacks, Proc. 3rd IEEE Int. Conf. on Industrial informatics: INDIN ’05, Perth, WA, Australia, August 2005, IEEE, pp. 717–724.
  • Cetin O, Ozcerit AT. A new steganography algorithm based on color histograms for data embedding into raw video streams. Comput. Secur., 2009, 28, 670–682.
  • Cheddad A, Condell J, Curran K, McKevitt P. Digital image steganography: survey and analysis of current methods. Signal Process., 2010, 90, 727–752.
  • Swanson MD, Zhu B, Tewfik AT. Multiresolution scenebased video watermarking using perceptual models. IEEE J. Select. Areas Commun., 1998, 16, 540–550.
  • Swanson MD, Zhu B, Tewfik AT. Data hiding for video-in-video, Proc. 1997 IEEE Int. Conf. on Image processing: ICIP’97, Santa Barbara, CA, USA, October 1997, IEEE, Vol. 2, pp. 676–679.
  • Wang H, Wang S. Cyber warfare: steganography vs. steganalysis. Commun. ACM, 2004, 47, 76–82.
  • Mıhçak MK. Watermarking via optimization algorithms for quantizing randomized image characteristics, Proc. IEEE 12th Conf. on Signal processing, communications and applications: SIU 2004, Kuşadasi, Turkey, April 2004, IEEE, pp. 17–20.
  • Kakumanu P, Makrogiannis S, Bourbakis N. A survey of skin-color modeling and detection methods. Patt. Recogn., 2007, 40, 1106–1122.
  • Cheddad A, Condella J, Currana K, McKevitta P. Digital image steganography: survey and analysis of current methods. Signal Process., 2010, 90, 727–752.
  • Mohamed S. ‘Automatic evaluation of real-time multimedia quality: a neural network approach’, PhD thesis, University of Rennes I, Rennes, France, 2003.
  • Su JK, Hartung F, Girod B. Digital watermarking of text, image, and video documents. Comput. Graph., 1999, 22, 687–695.
  • Netravali AN, Haskell BG. Digital Pictures: Representation, Compression, and Standards, 1995, 2nd edition (Plenum Press, New York).
  • Rabbani M, Jones PW. Digital Image Compression Techniques, 1991, Vol. TT7 (SPIE Optical Engineering Press, Bellvue, WA).

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.