Abstract

Abstract The paper focuses on the comparison of video steganography methods for the purpose of digital watermarking in the context of copyright protection. Four embedding methods that use Discrete Cosine and Discrete Wavelet Transforms have been researched and compared based on their embedding efficiency and fidelity. A video steganography program has been developed in the Java programming language with all of the researched methods implemented for experiments. The experiments used 3 video containers with different amounts of movement. The impact of the movement has been addressed in the paper as well as the ways of potential improvement of embedding efficiency using adaptive embedding based on the movement amount. Results of the research have been verified using a survey with 17 participants.

Highlights

  • The word “steganography” comes from the Greek language and means “covered writing”

  • The paper focuses on the comparison of video steganography methods for the purpose of digital watermarking in the context of copyright protection

  • 2016/19 showed some resistance to a small degree of rotation – less than 0.2 degrees). This is a usual problem for both image steganography and video steganography methods [5], [17]

Read more

Summary

Introduction

The word “steganography” comes from the Greek language and means “covered writing”. Steganography as a science studies the exchange of information in a way that the fact of the exchange remains unseen [1]. The goal of steganography is to protect information, but unlike cryptography, where the existence of information is not hidden, steganography aims at concealing it behind a cover – a stegocontainer. Modern digital steganography embeds the message (a sequence of bits) into a container (another sequence of bits), receiving a stegocontainer as a result – a sequence of bits, similar to the original container, but containing the hidden message. Videos, text documents and other digital files can be used as a container.

Objectives
Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call