Video steganographic algorithm has the advantage of large hiding capacity, but we neglect the security when seek the capacity. In order to balance the two aspects, both to meet the high capacity of improving the load of video carrier and can safely protect the secret information. This paper presents the error-correcting code which can effectively correct burst errors and use it in video steganography. The secret information is hidden in error-correcting code first and then integrated the code with secret information with the video carrier’s DCT coefficients to insert the secret information in video carrier. The experiment results show that: this algorithm not only has great visual and statistical invisibility, also the safety of secret information is more significant. And achieve the objective of effective protect the secret information.
This paper proposes a algorithm for detecting manual blur on images, which is usually used to remove obvious traces when tamper images. The algorithm first blurs the test image and blocks the both test image and blurred image. Then extracts and compares the sharp edge points in contourlet domain of the two images, so as to detect the suspicious blurred blocks. Furthermore, differences between manual blur and defocus blur can be indicated by our proposed method, and we can find out whether the image has been manual blurred. We establish a rich set of experimental images, and test results show that the average accurate detection rate is high, and the tampered regions can be always located. Our next work is to improve the robustness of the algorithm.
In this paper, a simple video steganography algorithm based on the tree structured motion compensation of the H.264 video compression standard is proposed. In the proposed method, the head data of macroblock in P/B-frames was used as a cover, the 8x8 partition modes which represent the detailed areas are selected, and information hiding is implemented by modifying the partition modes of the sub-macroblock. Experiments are designed to prove the feasibility of the proposed scheme by using different kinds of test videos. Simulation results show that, in our scheme, a high data hiding rate is obtained with a little increase on bit rate, and it also has the characteristics of high computational efficiency and imperceptibility.
A robust watermarking scheme that used computer-generated holograms as the watermark is in NSCT (NonSampled Contourlet Transform) domain was proposed. To maintain imperceptibility and robustness, a repeated embedding algorithm is adopted to embed the mark hologram into the low-frequency subband of the NSCT host image. Compared with other watermark schemes using digital holograms, the proposed algorithm has the obvious advantage in robustness The experimental results demonstrated that the proposed method had good robustness to resist common attacks such as, rotation, scaling, translation, image flipping, combined attacks, filtering, occlusion, cropping, and JPEG compression.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.