Skip to main content
Log in

Efficient and secure data hiding in video sequence with three layer security: an approach using chaos

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The fast development of communication and technology has created new challenges to transfer data securely. The techniques widely used to secure the data are cryptography and steganography. This paper presents a video steganography method to secure the information to be transmitted. Information transmitted can be an image, audio, text or video. This article presents a new technique that embeds data in the spatial domain of the cover video frame. The method employs chaotic maps to generate Random Positions (RP) to hide the information bits, random numbers for selecting the frames at which the information to be hidden and confusion order to encrypt the cover frame. The video frame is first selected based on Frame Selection (FS) is encrypted by applying Confusion Order (CO) and then embedding is carried out on the random positions generated. After embedding, the decrypted cover frame is replaced in a video sequence for transmission. This method provides three-level security in extracting the hidden secret information and also 25% of embedding capacity. Experimental outcomes (PSNR and payload) confirm that the method is competent.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Abdulla AA (2015) Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography. PhD dissertation, Dept. of Applied Computing, Buckingham Univ., Buckingham, UK. http://bear.buckingham.ac.uk/149/

  2. Abdulla AA, Sellahewa H, Jassim SA (2014) Steganography based on pixel intensity value decomposition. Proceedings of SPIE 9120, Mobile Multimedia/Image Processing, Security, and Applications, 912005. https://doi.org/10.1117/12.2050518

  3. Abdulla AA, Sellahewa H, Jassim SA (2019) Improving embedding efficiency for digital steganography by exploiting similarities between secret and cover images. Multimed Tools Appl 78:17799–17823. https://doi.org/10.1007/s11042-019-7166-7

    Article  Google Scholar 

  4. Alavianmehr MA, Rezaei M, Helfroush MS, Tashk A (2012) A lossless data hiding scheme on video raw data robust against H.264/AVC compression. In: 2nd International eConference on Computer and Knowledge Engineering (ICCKE), Mashhad, pp 194–198. https://doi.org/10.1109/ICCKE.2012.6395377

  5. Aroukatos N, Manes K, Zimeras S, Georgiakodis F (2012) Data hiding techniques in steganography using fibonacci and catalan numbers. Ninth International Conference on Information Technology - New Generations, Las Vegas, pp 392–396. https://doi.org/10.1109/ITNG.2012.96

  6. Battisti F, Carli M, Neri A, Egiaziarian K (2006) A generalized Fibonacci LSB data hiding technique. Proc.CODEC

    Google Scholar 

  7. Cao Y, Zhang H, Zhao X, Yu H (2015) Video steganography based on optimized motion estimation perturbation. In: Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, ACM, pp. 25–31

  8. Chang C, Kieu TD, Chou Y (2008) A high payload steganographic scheme based on (7, 4) hamming code for digital images " 2008 International symposium on electronic commerce and security, Guangzhou City, pp.16–21. https://doi.org/10.1109/ISECS.2008.222.

  9. Cheddad J, Condell KC, Mc Kevitt P (2009) A secure and improved self-embedding algorithm to combat digital document forgery. Signal Process 89(12):2324–2332

    Article  Google Scholar 

  10. Cheddad A, Condell J, Curran K, Kevitt PM (2010) Digital image steganography: survey and analysis of current methods. Signalling Processing 90:727–752. https://doi.org/10.1016/j.sigpro.2009.08.010

    Article  MATH  Google Scholar 

  11. Dataset: https://media.xiph.org/video/derf/y4m/

  12. Dey S, Abraham A, Sanyal S (2007) An LSB data hiding technique using prime numbers. Proc. Information Assurance and Security (IAS) IEEE:101–108

  13. Dey S, Abraham A, Sanyal S (2007) An LSB data hiding technique using natural number decomposition. Proc. IIHMSP, IEEE, pp 473–476

    Google Scholar 

  14. Eltahir ME, Kiah LM, Zaidan BB, Zaidan AA (2009) High rate video streaming steganography, in:International Conference on Information Management and Engineering. ICIME'09., IEEE, 2009, pp. 550–553.

  15. Hore A, Ziou D (2010) Image quality metrics: PSNR vs. SSIM" 2010 20th international conference on pattern recognition, Istanbul, pp. 2366–2369. https://doi.org/10.1109/ICPR.2010.579.

  16. Islam S, Modi MR, Gupta P (2014) Edge-based image steganography. EURASIP J Inf Secur 2014:8. https://doi.org/10.1186/1687-417X-2014-8

    Article  Google Scholar 

  17. Kar N, Mandal K, Bhattacharya B (2018) Improved chaos-based video steganography using DNA alphabets. ICT Express 4:6–13. https://doi.org/10.1016/j.icte.2018.01.003

    Article  Google Scholar 

  18. Ke N, Weidong Z (2013) A video steganography scheme based on H.264 bitstreams replaced. IEEE 4th International Conference on Software Engineering and Service Science, Beijing, pp 447–450. https://doi.org/10.1109/ICSESS.2013.6615345

  19. Kelash HM, Wahab OFA, Elshakankiry OA, El-Sayed HS (2013) Hiding data in video sequences using steganography algorithms. International Conference on ICT Convergence (ICTC), Jeju, pp 353–358. https://doi.org/10.1109/ICTC.2013.6675372

  20. Ranjith kumar R, Ganeshkumar D, Suresh A, Manigandan K (2019) A new one round video encryption scheme based on 1D chaotic maps. In: 5th International Conference on Advanced Computing & Communication Systems (ICACCS), Coimbatore, pp 439–444. https://doi.org/10.1109/ICACCS.2019.8728443

  21. Lin Y-T, Wang C-M, Chen W-S, Lin F-P, Lin W (2017) A novel data hiding algorithm for high dynamic range images. IEEE Transactions on Multimedia 19:196–211

    Article  Google Scholar 

  22. Li-Yi Z, Wei-Dong Z et al. (2011) A novel steganography algorithm based on motion vector and matrix encoding, In: IEEE 3rd International Conference on Communication Software and Networks (ICCSN), IEEE, pp. 406–409.

  23. Morkel K, Eloff JHP, Oliver MS (2005) An overview of image steganography. In: Proceedings of the 5th annual information security South Africa conference (ISSA2005). South Africa, Sandton

    Google Scholar 

  24. Mstafa RJ, Elleithy KM, Abdelfattah E (2017) A robust and secure video steganography method in DWT-DCT domains based on multiple object tracking and ECC. IEEE Access 5:5354–5365. https://doi.org/10.1109/ACCESS.2017.2691581

    Article  Google Scholar 

  25. Parah SA, Sheikh JA, Bhat GM (2012) Data hiding in intermediate significant bit planes: A high capacity blind steganographic technique. International Conference on Emerging Trends in Science, Engineering and Technology (INCOSET), Tiruchirappalli, pp 192–197. https://doi.org/10.1109/INCOSET.2012.6513904

  26. Parah SA, Sheikh JA, Hafiz AM, Bhat GM (2014) Data hiding in scrambled images: a new double layer security data hiding technique. Comput Electr Eng 40(1):70–82. https://doi.org/10.1016/j.compeleceng.2013.11.006

    Article  Google Scholar 

  27. Picione DDL, Battisti F, Carli M, Astola J, Egiazarian K (2006) A Fibonacci LSB data hiding technique. Proc. EUSIPCO

  28. Ramalingam M (2011) Stego machine-video steganography using modified lsb algorithm. World Acad Sci Eng Technol 74:502–505

    Google Scholar 

  29. Ranjith Kumar R, Bala Kumar M (2014) A new chaotic image encryption using parametric switching based permutation and diffusion. ICTACT Journal on Image and Video Processing 4(4):795–804. https://doi.org/10.21917/ijivp.2014.0114

    Article  Google Scholar 

  30. Ranjith Kumar R, Jayasudha S, Pradeep S (2016) Efficient and secure data hiding in encrypted images, A new approach using chaos. Inf Secur J 25(4–6):235–246

    Google Scholar 

  31. Singh AK, Kumar B, Singh SK, Ghrera SP, Mohan A (2016) Multiple watermarking technique for securing online social network contents using Back Propagation Neural Network. Future Generat Comput Syst, to be published. https://doi.org/10.1016/j.future.2016.11.023

  32. Subhedar MS, Mankar VH (2014) Current status and key issues in image steganography: a survey. Comput Sci Rev 13–14:95–113

    Article  Google Scholar 

  33. Zeki AM, Manaf AA, Mohammad SS (2011) High watermarking capacity based on spatial domain technique. Inf Technol J 10:1367–1373. https://doi.org/10.3923/itj.2011.1367.1373

    Article  Google Scholar 

  34. Zhang Y, Zhang M, Yang X, Guo D, Liu L (April 2017) Novel video steganography algorithm based on secret sharing and error-correcting code for H.264/AVC. in Tsinghua Science and Technology 22(2):198–209. https://doi.org/10.23919/TST.2017.7889641

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ranjithkumar R.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

R, R., D, G. & S, S. Efficient and secure data hiding in video sequence with three layer security: an approach using chaos. Multimed Tools Appl 80, 13865–13878 (2021). https://doi.org/10.1007/s11042-020-10324-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-10324-7

Keywords

Navigation