dc.contributor.author |
Ntalianis, KS |
en |
dc.contributor.author |
Doulamis, ND |
en |
dc.contributor.author |
Doulamis, AD |
en |
dc.contributor.author |
Kollias, SD |
en |
dc.date.accessioned |
2014-03-01T02:42:04Z |
|
dc.date.available |
2014-03-01T02:42:04Z |
|
dc.date.issued |
2002 |
en |
dc.identifier.issn |
08843627 |
en |
dc.identifier.uri |
https://dspace.lib.ntua.gr/xmlui/handle/123456789/30759 |
|
dc.subject |
QSWTs |
en |
dc.subject |
Steganographic System |
en |
dc.subject |
Video Object |
en |
dc.subject.other |
Algorithms |
en |
dc.subject.other |
Computer architecture |
en |
dc.subject.other |
Cryptography |
en |
dc.subject.other |
Semantics |
en |
dc.subject.other |
Wavelet transforms |
en |
dc.subject.other |
Steganographic system |
en |
dc.subject.other |
Video signal processing |
en |
dc.title |
An automatic video-object based steganographic system for multi-use message hiding using wavelet transform |
en |
heal.type |
conferenceItem |
en |
heal.identifier.primary |
10.1109/ICSMC.2002.1176068 |
en |
heal.identifier.secondary |
http://dx.doi.org/10.1109/ICSMC.2002.1176068 |
en |
heal.publicationDate |
2002 |
en |
heal.abstract |
An automatic video-object based steganographic system is proposed in this paper for multiuse message hiding. Initially video objects from different images are selected and for each video object a message is embedded into its most significant wavelet coefficients to provide invisibility and resistance against lossy transmission or other distortion. The architecture consists of three modules. In the first module initial messages are enciphered using one or more encryption algorithms. The enciphered messages are imprinted onto white-background images to construct the message-images to be hidden. In the second module each of the cover video objects is decomposed into two levels with seven subbands, using the DWT. Next Qualified Significant Wavelet Trees (QSWTs), which are paths of significant wavelet coefficients, are estimated for the highest energy pair of subbands of each video object. During the third module each message-image is redundantly embedded to the coefficients of the best QSWTs of a video object and the IDWT is applied to provide the stego-object. In the last stage stego-objects are combined to provide the final content to be transmitted. Experimental results under various loss rates indicate the robustness and efficiency of the proposed steganographk system. |
en |
heal.journalName |
Proceedings of the IEEE International Conference on Systems, Man and Cybernetics |
en |
dc.identifier.doi |
10.1109/ICSMC.2002.1176068 |
en |
dc.identifier.volume |
3 |
en |
dc.identifier.spage |
361 |
en |
dc.identifier.epage |
366 |
en |