2019
DOI: 10.1109/access.2019.2898838
|View full text |Cite
|
Sign up to set email alerts
|

The Pixogram: Addressing High Payload Demands for Video Steganography

Abstract: This paper introduces the concept of a pixogram which makes possible a fresh approach to high payload video steganography. The pixogram allows for a new perspective by investigating the temporal changes that take place at the individual pixel level across frames of a video segment. Simply put, a pixogram has the property of converting highly uncorrelated spatial areas of individual frames of a video scene into highly correlated temporal segments by making use of the temporal correlation between the frames of t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 28 publications
(8 citation statements)
references
References 36 publications
0
8
0
Order By: Relevance
“…(3) Just as an example if we consider that 1 character takes n sec audio and cover video is of length l and video is of m frames then the stego video can be represented as Where V(l) represents video in ith frame and A(l) represents audio in ith frame the merging function which is used to overlap audio with video. If we want to extract any character in middle that is if we want to get the ith character in kth frame, then it can be got by the equation The total number of characters that can be embedded in a video of length l is given by (6)…”
Section: Algorithm To Embed Audio To Videomentioning
confidence: 99%
“…(3) Just as an example if we consider that 1 character takes n sec audio and cover video is of length l and video is of m frames then the stego video can be represented as Where V(l) represents video in ith frame and A(l) represents audio in ith frame the merging function which is used to overlap audio with video. If we want to extract any character in middle that is if we want to get the ith character in kth frame, then it can be got by the equation The total number of characters that can be embedded in a video of length l is given by (6)…”
Section: Algorithm To Embed Audio To Videomentioning
confidence: 99%
“…spatial domain methods directly hide the confidential message into the cover carrier. Least Significant Bit (LSB) techniques are the most popular techniques of spatial domain methods due to their low computational complexity and simplicity [8], [22]- [24]. LSB techniques operate by substituting the confidential message bits with some LSBs of pixels from the video carrier frames.…”
Section: Introductionmentioning
confidence: 99%
“…These techniques attempt to take advantage of the 3D nature of videos and exploit the third dimension, which is the time dimension in embedding. This extra dimension provides some additional features, such as motion components and motion vectors [26] [24]. This paper proposes a new approach for hiding information within digital videos, which is based mainly on two well-known algorithms, namely Shi-Tomasi corner detector algorithm and Four Least Significant Bits (4-LSBs) algorithm.…”
Section: Introductionmentioning
confidence: 99%
“…Steganography is a technique of covert communication by hiding information into digital media (such as image [1], video [2], audio [3] and text [4]) without causing any…”
Section: Introductionmentioning
confidence: 99%