Abstract
The fast development of communication and technology has created new challenges to transfer data securely. The techniques widely used to secure the data are cryptography and steganography. This paper presents a video steganography method to secure the information to be transmitted. Information transmitted can be an image, audio, text or video. This article presents a new technique that embeds data in the spatial domain of the cover video frame. The method employs chaotic maps to generate Random Positions (RP) to hide the information bits, random numbers for selecting the frames at which the information to be hidden and confusion order to encrypt the cover frame. The video frame is first selected based on Frame Selection (FS) is encrypted by applying Confusion Order (CO) and then embedding is carried out on the random positions generated. After embedding, the decrypted cover frame is replaced in a video sequence for transmission. This method provides three-level security in extracting the hidden secret information and also 25% of embedding capacity. Experimental outcomes (PSNR and payload) confirm that the method is competent.
Similar content being viewed by others
References
Abdulla AA (2015) Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography. PhD dissertation, Dept. of Applied Computing, Buckingham Univ., Buckingham, UK. http://bear.buckingham.ac.uk/149/
Abdulla AA, Sellahewa H, Jassim SA (2014) Steganography based on pixel intensity value decomposition. Proceedings of SPIE 9120, Mobile Multimedia/Image Processing, Security, and Applications, 912005. https://doi.org/10.1117/12.2050518
Abdulla AA, Sellahewa H, Jassim SA (2019) Improving embedding efficiency for digital steganography by exploiting similarities between secret and cover images. Multimed Tools Appl 78:17799–17823. https://doi.org/10.1007/s11042-019-7166-7
Alavianmehr MA, Rezaei M, Helfroush MS, Tashk A (2012) A lossless data hiding scheme on video raw data robust against H.264/AVC compression. In: 2nd International eConference on Computer and Knowledge Engineering (ICCKE), Mashhad, pp 194–198. https://doi.org/10.1109/ICCKE.2012.6395377
Aroukatos N, Manes K, Zimeras S, Georgiakodis F (2012) Data hiding techniques in steganography using fibonacci and catalan numbers. Ninth International Conference on Information Technology - New Generations, Las Vegas, pp 392–396. https://doi.org/10.1109/ITNG.2012.96
Battisti F, Carli M, Neri A, Egiaziarian K (2006) A generalized Fibonacci LSB data hiding technique. Proc.CODEC
Cao Y, Zhang H, Zhao X, Yu H (2015) Video steganography based on optimized motion estimation perturbation. In: Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, ACM, pp. 25–31
Chang C, Kieu TD, Chou Y (2008) A high payload steganographic scheme based on (7, 4) hamming code for digital images " 2008 International symposium on electronic commerce and security, Guangzhou City, pp.16–21. https://doi.org/10.1109/ISECS.2008.222.
Cheddad J, Condell KC, Mc Kevitt P (2009) A secure and improved self-embedding algorithm to combat digital document forgery. Signal Process 89(12):2324–2332
Cheddad A, Condell J, Curran K, Kevitt PM (2010) Digital image steganography: survey and analysis of current methods. Signalling Processing 90:727–752. https://doi.org/10.1016/j.sigpro.2009.08.010
Dey S, Abraham A, Sanyal S (2007) An LSB data hiding technique using prime numbers. Proc. Information Assurance and Security (IAS) IEEE:101–108
Dey S, Abraham A, Sanyal S (2007) An LSB data hiding technique using natural number decomposition. Proc. IIHMSP, IEEE, pp 473–476
Eltahir ME, Kiah LM, Zaidan BB, Zaidan AA (2009) High rate video streaming steganography, in:International Conference on Information Management and Engineering. ICIME'09., IEEE, 2009, pp. 550–553.
Hore A, Ziou D (2010) Image quality metrics: PSNR vs. SSIM" 2010 20th international conference on pattern recognition, Istanbul, pp. 2366–2369. https://doi.org/10.1109/ICPR.2010.579.
Islam S, Modi MR, Gupta P (2014) Edge-based image steganography. EURASIP J Inf Secur 2014:8. https://doi.org/10.1186/1687-417X-2014-8
Kar N, Mandal K, Bhattacharya B (2018) Improved chaos-based video steganography using DNA alphabets. ICT Express 4:6–13. https://doi.org/10.1016/j.icte.2018.01.003
Ke N, Weidong Z (2013) A video steganography scheme based on H.264 bitstreams replaced. IEEE 4th International Conference on Software Engineering and Service Science, Beijing, pp 447–450. https://doi.org/10.1109/ICSESS.2013.6615345
Kelash HM, Wahab OFA, Elshakankiry OA, El-Sayed HS (2013) Hiding data in video sequences using steganography algorithms. International Conference on ICT Convergence (ICTC), Jeju, pp 353–358. https://doi.org/10.1109/ICTC.2013.6675372
Ranjith kumar R, Ganeshkumar D, Suresh A, Manigandan K (2019) A new one round video encryption scheme based on 1D chaotic maps. In: 5th International Conference on Advanced Computing & Communication Systems (ICACCS), Coimbatore, pp 439–444. https://doi.org/10.1109/ICACCS.2019.8728443
Lin Y-T, Wang C-M, Chen W-S, Lin F-P, Lin W (2017) A novel data hiding algorithm for high dynamic range images. IEEE Transactions on Multimedia 19:196–211
Li-Yi Z, Wei-Dong Z et al. (2011) A novel steganography algorithm based on motion vector and matrix encoding, In: IEEE 3rd International Conference on Communication Software and Networks (ICCSN), IEEE, pp. 406–409.
Morkel K, Eloff JHP, Oliver MS (2005) An overview of image steganography. In: Proceedings of the 5th annual information security South Africa conference (ISSA2005). South Africa, Sandton
Mstafa RJ, Elleithy KM, Abdelfattah E (2017) A robust and secure video steganography method in DWT-DCT domains based on multiple object tracking and ECC. IEEE Access 5:5354–5365. https://doi.org/10.1109/ACCESS.2017.2691581
Parah SA, Sheikh JA, Bhat GM (2012) Data hiding in intermediate significant bit planes: A high capacity blind steganographic technique. International Conference on Emerging Trends in Science, Engineering and Technology (INCOSET), Tiruchirappalli, pp 192–197. https://doi.org/10.1109/INCOSET.2012.6513904
Parah SA, Sheikh JA, Hafiz AM, Bhat GM (2014) Data hiding in scrambled images: a new double layer security data hiding technique. Comput Electr Eng 40(1):70–82. https://doi.org/10.1016/j.compeleceng.2013.11.006
Picione DDL, Battisti F, Carli M, Astola J, Egiazarian K (2006) A Fibonacci LSB data hiding technique. Proc. EUSIPCO
Ramalingam M (2011) Stego machine-video steganography using modified lsb algorithm. World Acad Sci Eng Technol 74:502–505
Ranjith Kumar R, Bala Kumar M (2014) A new chaotic image encryption using parametric switching based permutation and diffusion. ICTACT Journal on Image and Video Processing 4(4):795–804. https://doi.org/10.21917/ijivp.2014.0114
Ranjith Kumar R, Jayasudha S, Pradeep S (2016) Efficient and secure data hiding in encrypted images, A new approach using chaos. Inf Secur J 25(4–6):235–246
Singh AK, Kumar B, Singh SK, Ghrera SP, Mohan A (2016) Multiple watermarking technique for securing online social network contents using Back Propagation Neural Network. Future Generat Comput Syst, to be published. https://doi.org/10.1016/j.future.2016.11.023
Subhedar MS, Mankar VH (2014) Current status and key issues in image steganography: a survey. Comput Sci Rev 13–14:95–113
Zeki AM, Manaf AA, Mohammad SS (2011) High watermarking capacity based on spatial domain technique. Inf Technol J 10:1367–1373. https://doi.org/10.3923/itj.2011.1367.1373
Zhang Y, Zhang M, Yang X, Guo D, Liu L (April 2017) Novel video steganography algorithm based on secret sharing and error-correcting code for H.264/AVC. in Tsinghua Science and Technology 22(2):198–209. https://doi.org/10.23919/TST.2017.7889641
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
R, R., D, G. & S, S. Efficient and secure data hiding in video sequence with three layer security: an approach using chaos. Multimed Tools Appl 80, 13865–13878 (2021). https://doi.org/10.1007/s11042-020-10324-7
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-020-10324-7