Identyfikatory
Warianty tytułu
Języki publikacji
Abstrakty
This paper presents a comprehensive computational system designed to evaluate the undetectability of video steganography from human perspective. The system assesses the perceptibility of steganographic modifications to the human eye while simultaneously determining the minimum encoding level required for successful automated decoding of hidden messages. The proposed architecture comprises four subsystems: steganogram database preparation, human evaluation, automated decoding, and comparative analysis. The system was tested using example steganographic techniques applied to a dataset of video files. Experimental results revealed the thresholds of human-level undetectability and automated decoding for each technique, enabling the identification of critical differences between human and algorithmic detection capabilities. This research contributes to the field of steganography by offering a novel framework for evaluating the trade-offs between human perception and automated decoding in video-based information hiding. The system serves as a tool for advancing the development of more secure and reliable video steganographic techniques.
Czasopismo
Rocznik
Tom
Strony
63--76
Opis fizyczny
Bibliogr. 20 poz., fig.
Twórcy
autor
- Military University of Technology, Faculty of Cybernetics, Institute of Computer and Information Systems, Poland, Warsaw
autor
- Military University of Technology, Faculty of Cybernetics, Institute of Computer and Information Systems, Poland, Warsaw
Bibliografia
- [1] Anderson, R., & Petitcolas, F. (1998). On the limits of steganography. IEEE Journal on Selected Areas in Communications, 16(4), 474-481. https://doi.org/10.1109/49.668971
- [2] Chan, C.-K., & Cheng, L. (2004). Hiding data in images by simple LSB substitution. Pattern Recognition, 37(3), 469-474. https://doi.org/10.1016/j.patcog.2003.08.007
- [3] Cox, I., Miller, M., Bloom, J., Fridrich, J., & Kalker, T. (2007). Digital watermarking and steganography. Morgan Kaufmann Publishers.
- [4] DensoWave. (2024). QR code. https://www.qrcode.com/
- [5] Fridrich, J. (2009). Steganography in digital media: Principles, algorithms, and applications. Cambridge University Press, 277-292. https://doi.org/10.1017/CBO9781139192903.014
- [6] Hossain, M. A., Noor, N. U., Ullah, A., Noman, S. H., Pranta, S. D., Bristy, L. M., & Bashar, M. (2024) Enhancing video steganography techniques, using hybrid algorithms. Open Access Library Journal, 11, e11489. https://doi.org/10.4236/oalib.1111489
- [7] Huynh-Thu, Q., & Ghanbari, M. (2008). Scope of validity of PSNR in image/video quality assessment. Electronics Letters, 44(13), 800-801. https://doi.org/10.1049/el:20080522
- [8] Jangid, S., & Sharma, S. (2017). High PSNR based video steganography by MLC(multi-level clustering) algorithm. 2017 International Conference on Intelligent Computing and Control Systems (ICICCS) (pp. 589-594). IEEE. https://doi.org/10.1109/ICCONS.2017.8250530
- [9] Johnson, N. F., & Jajodia, S. (1998). Exploring steganography, seeing the unseen. IEEE Computer, 31(2), 26-34. https://doi.org/10.1109/MC.1998.4655281
- [10] Kadhim, I. J., Premaratne, P., Vial, P. J., & Halloran, B. (2019). Comprehensive survey of image steganography: Techniques, evaluations, and trends in future research. Neurocomputing, 335, 299-326. https://doi.org/10.1016/j.neucom.2018.06.075
- [11] Kahn, D. (1967). The codebreakers: The story of secret writing. Macmillan.
- [12] Katzenbeisser, S. & Petitcolas, F. (2000). Information hiding techniques for steganography and digital watermarking. Artech House, 28(6), 1-2. https://doi.org/10.1201/1079/43263.28.6.20001201/30373.5
- [13] Kunhoth, J., Subramanian, N., Al-Maadeed, S., & Bouridane, A. (2023). Video steganography: Recent advances and challenges. Springer - Multimedia Tools and Applications, 82, 41943-41985. https://doi.org/10.1007/s11042-023-14844-w
- [14] Majeed, N. D., Al-Askery, A., & Hasan, F. S. (2024). Hybrid video steganography and cryptography techniques: Review paper. The Fifth Scientific Conference for Electrical Engineering Techniques Research (EETR2024) (020013). AIP Publishing. https://doi.org/10.1063/5.0236185
- [15] Petitcolas, F. A. P., Anderson, R. J., & Kuhn, M. G. (1999). Information hiding - a survey. Proceedings of the IEEE, 87(7), 1062-1078. https://doi.org/10.1109/5.771065
- [16] Pixabay.com. (2024). Pixabay License. https://pixabay.com/service/license-summary/
- [17] Sencar, H. T., Ramkumar, M., & Akansu, A. N. (2004). Data hiding fundamentals and applications. Elsevier Academic Press.
- [18] Shannon, C. E. (1948). A mathematical theory of communication. The Bell System Technical Journal, 27(3), 379-423. https://doi.org/10.1002/j.1538-7305.1948.tb01338.x
- [19] Stern, M. K., & Johnson, J. H. (2010). Just noticeable difference. In I. B. Weiner & W. E. Craighead (Eds.), The Corsini Encyclopedia of Psychology (1st ed., pp. 1-2). Wiley. https://doi.org/10.1002/9780470479216.corpsy0481
- [20] Wang, Z., Bovik, A. C., Sheikh, H. R., & Simoncelli, E. P. (2004). Image quality assessment: From error visibility to structural similarity. IEEE Transactions on Image Processing, 13(4), 600-612. https://doi.org/10.1109/TIP.2003.819861
Uwagi
Opracowanie rekordu ze środków MNiSW, umowa nr POPUL/SP/0154/2024/02 w ramach programu "Społeczna odpowiedzialność nauki II" - moduł: Popularyzacja nauki (2025).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-681e51a9-2c3a-426d-a7b3-9ad27968b05e
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.