Log in

Novel DCT and DST based video steganography algorithms over non-dynamic region in compressed domain: a comparative analysis

  • Original Research
  • Published:
International Journal of Information Technology Aims and scope Submit manuscript

Abstract

The proposed research work presents a comparative analysis of Discrete Cosine Transform (DCT) and Discrete Sine Transform (DST) based video steganography in compressed domain. In this method, the random numbered secret frames are selected from the sequence of RGB cover video. This method increases the complexity level of video steganography by considering the specific host to conceal secret data. It extracts the specific non-dynamic region from secret frame, transforms the pixel value of non-dynamic region into frequency domain using transform coefficient DCT or DST. The random Least Significant Bit (LSB) of integer component of DCT and DST is used as a carrier object that leads to good video quality and secret data-carrying capacity. Furthermore, the secure compressed stego video is reconstructed by using H.264 video compression technique facilitates communication over the network channel between sender and receiver. The proposed method has been experimented on some well-known video datasets by considering RGB images with different resolutions as a secret message. The efficiency of proposed video steganography method is evaluated by performance evaluation parameters; imperceptibility, robustness, and embedding capacity and the improved results of proposed method have been compared with reported methodologies.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (United Kingdom)

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

References

  1. Mstafa RJ, Elleithy KM (2017) Compressed and raw video steganography techniques: a comprehensive survey and analysis. Multimed Tools Appl 76(20):21749–21786

    Article  Google Scholar 

  2. Mstafa RJ, Elleithy KM, Abdelfattah E (2017) Video steganography techniques: taxonomy, challenges, and future directions. In: IEEE Long Island Systems, Applications and Technology Conference (LISAT) 2017, p 1–6

  3. Yilmaz A, Alatan AA (2003) Error concealment of video sequences by data hiding. In: Proceedings 2003 International Conference on image processing, p 679–682

  4. Shukur WA, Abdullah WN, Qurban LK (2018) Information hiding in digital video using DCT, DWT and CvT. J Phys Conf Ser 1003:012035

    Article  Google Scholar 

  5. Mstafa RJ, Elleithy KM (2016) A DCT-based robust video steganographic method using BCH error correcting codes. In: Long island systems, applications and technology conference (LISAT), p 1–6

  6. Mstafa RJ, Elleithy KM (2016) A novel video steganography algorithm in DCT domain based on hamming and BCH codes. IEEE Sarnoff Symp. https://doi.org/10.1109/SARNOF.2016.7846757

    Article  Google Scholar 

  7. Mstafa RJ, Elleithy KM, Abdelfattah E (2017) A robust and secure video steganography method in DWT-DCT domains based on multiple object tracking and ECC. IEEE Access 5:5354–5365. https://doi.org/10.1109/ACCESS.2017.2691581

    Article  Google Scholar 

  8. Idbeaa T, Abdul Samad S, Husain H (2016) A secure and robust compressed domain video steganography for intra-and inter-frames using embedding-based byte differencing (EBBD) scheme. PLOS ONE. https://doi.org/10.1371/journal.pone.0150732,March

    Article  Google Scholar 

  9. Liu S, Degang Xu (2020) A robust steganography method for HEVC based on secret sharing. Cogn Syst Res. https://doi.org/10.1016/j.cogsys.2019.09.008

    Article  Google Scholar 

  10. Yang J, Li S (2017) An efficient information hiding method based on motion vector space encoding for HEVC. Multimed Tools Appl 77:11979–12001

    Article  Google Scholar 

  11. Britanak V, Rao KR (2000) Two-dimensional DCT/DST universal computational structure for 2m×2n block sizes. IEEE Trans Signal Process. https://doi.org/10.1109/78.875483

    Article  Google Scholar 

  12. Richardson IE (2010) The H.264 advanced video compression standard. Wiley, New York

    Book  Google Scholar 

  13. https://github.com/remega/video_database/tree/master/videos, remega video database. Accessed 8 Nov 2017

  14. https://www.elecard.com/videos, video compression Guru, Elecard video. Accessed Jun 2019

  15. http://www.cvg.reading.ac.uk/PETS2009/a.html, PETS 2009 Benchmark Data, Miami, Florida. Accessed 25 Jun 2009

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rachna Patel.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Patel, R., Lad, K. & Patel, M. Novel DCT and DST based video steganography algorithms over non-dynamic region in compressed domain: a comparative analysis. Int. j. inf. tecnol. 14, 1649–1657 (2022). https://doi.org/10.1007/s41870-021-00788-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s41870-021-00788-7

Keywords

Navigation