Advertisement

Multimedia Tools and Applications

, Volume 78, Issue 5, pp 5769–5789 | Cite as

A robust and imperceptible steganography technique for SD and HD videos

  • Mukesh DalalEmail author
  • Mamta Juneja
Article

Abstract

In this era of internet transfer of information is in digital form using multimedia files such as image, video, audio, etc. which relies on secure communication techniques to convey information safely. Due to the frequent transfer of videos over the internet nowadays they have become a good cover media for secure and covert communication in the form of video steganography. For efficient video steganography, it must fulfill its basic requirements such as capacity, imperceptibility, and robustness. In order to make a balance between imperceptibility and robustness, an efficient video steganography scheme is proposed for Standard Definition (SD) and High Definition (HD) videos. This scheme employs DWT (discrete wavelet transforms) for embedding the secret message inside the video frames utilizing only luminance (Y) component, and the security of the proposed scheme is strengthen by pre-processing the secret message with encryption before embedding. The embedding process is done by utilizing the middle-frequency sub-bands after applying second level 2-D DWT to the video frames to decompose it into 16 sub-bands. The performance of the proposed scheme is tested on different videos with quality metrics including peak signal to noise ratio (PSNR), structural similarity (SSIM) index, bit error rate (BER) and also by applying Gaussian and salt & pepper noise attacks. Moreover, the scheme is tested for the different level of compression on stego-video and also compared with U and V components used while embedding. Experimental results show that for both types of videos (HD and SD) the proposed scheme is able to achieve high imperceptibility. Further, it also provides robustness against different types of noise attacks and different compression levels which makes the proposed scheme evident for secure data transmission.

Keywords

Video steganography DWT High definition Standard definition Imperceptibility Robustness 

References

  1. 1.
    Amirtharajan R, Rayappan JBB (2013) Steganography-time to time: a review. Res J Inf Technol 5:53–66.  https://doi.org/10.3923/rjit.2013.53.66 CrossRefGoogle Scholar
  2. 2.
    Chantrapornchai C, Churin K, Preechasuk J, Adulkasem S (2014) Video steganography for hiding image with wavelet coefficients. International journal of multimedia and ubiquitous. Engineering 9(6):385–396Google Scholar
  3. 3.
    Dalal M, Juneja M (2018) Video steganography techniques in spatial domain—a survey. In: Proceedings of the International Conference on Computing and Communication Systems. Springer, Singapore pp 705–711. doi: 10.1007/978-981-10-6890-4_67CrossRefGoogle Scholar
  4. 4.
    Das S, Sharma S, Bakshi S, Mukherjee I (2018) A framework for pixel intensity modulation based image steganography. In: Progress in advanced computing and intelligent engineering. Springer, Singapore, pp 3–14.  https://doi.org/10.1007/978-981-10-6872-0_1 CrossRefGoogle Scholar
  5. 5.
    Dasgupta K, Mondal JK, Dutta P (2013) Optimized video steganography using genetic algorithm (GA). Procedia Technology 10:131–137.  https://doi.org/10.1016/j.protcy.2013.12.345 CrossRefGoogle Scholar
  6. 6.
    Di Laura C, Pajuelo D, Kemper G (2016) A novel steganography technique for SDTV-H. 264/AVC encoded video. International Journal of Digital Multimedia Broadcasting 2016:1–9.  https://doi.org/10.1155/2016/6950592 CrossRefGoogle Scholar
  7. 7.
    Ding W, Yan W, Qi D (2002) Digital image watermarking based on discrete wavelet transform. J Comput Sci Technol 17(2):129–139.  https://doi.org/10.1007/BF02962205 MathSciNetCrossRefzbMATHGoogle Scholar
  8. 8.
    Ebrahim M, Chong CW (2013) Secure force: a low-complexity cryptographic algorithm for wireless sensor network (WSN). In: IEEE International Conference on Control System, Computing and Engineering (ICCSCE), pp 557–562. doi: 10.1109/ICCSCE.2013.6720027Google Scholar
  9. 9.
    Frank E, Varadaraan S, Babu BS (2016) DWT and YUV based video steganography. International Journal of Innovative Technologies 4(5):0823–0828Google Scholar
  10. 10.
    He Y, Yang G, Zhu N (2012) A real-time dual watermarking algorithm of H. 264/AVC video stream for video-on-demand service. AEU-International Journal of Electronics and Communications 66(4):305–312.  https://doi.org/10.1016/j.aeue.2011.08.007 CrossRefGoogle Scholar
  11. 11.
    Hussain M, Wahab AWA, Idris YIB, Ho AT, Jung KH (2018) Image steganography in spatial domain: a survey. Signal Process Image Commun 65:46–66.  https://doi.org/10.1016/j.image.2018.03.012 CrossRefGoogle Scholar
  12. 12.
    Idbeaa T, Samad SA, Husain H (2016) A secure and robust compressed domain video steganography for intra-and inter-frames using embedding-based byte differencing (EBBD) scheme. PLoS One 11(3):e0150732.  https://doi.org/10.1371/journal.pone.0150732 CrossRefGoogle Scholar
  13. 13.
    Johnson NF, Duric Z, Jajodia S (2001) Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking: Attacks and Countermeasures (Vol. 1). Springer Science & Business MediaGoogle Scholar
  14. 14.
    Kakde Y, Gonnade P, Dahiwale P (2015) Audio-video steganography. In: IEEE International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), pp 1–6. doi: 10.1109/ICIIECS.2015.7192885Google Scholar
  15. 15.
    Khan S, Ibrahim MS, Ebrahim M, Amjad H (2015) FPGA implementation of secure force (64-bit) low complexity encryption algorithm. International Journal of Computer Network and Information Security 7(12):60–69.  https://doi.org/10.5815/ijcnis.2015.12.07 CrossRefGoogle Scholar
  16. 16.
    Kumar GN, Bhavanam SN, Midasala V (2014) Image Hiding in a Video-based on DWT & LSB Algorithm. In: First International Conference on Photonics, VLSI and Signal Processing (ICPVS), pp 7–12Google Scholar
  17. 17.
    Li G, Ito Y, Yu X, Nitta N, Babaguchi N (2010) Recoverable privacy protection for video content distribution. EURASIP J Inf Secur 2009(1):293031–293011.  https://doi.org/10.1155/2009/293031 CrossRefGoogle Scholar
  18. 18.
    Mstafa RJ, Elleithy KM (2015) A high payload video steganography algorithm in DWT domain based on BCH codes (15, 11). In: 2015 wireless telecommunications symposium (WTS), pp 1–8. doi: 10.1109/WTS.2015.7117257Google Scholar
  19. 19.
    Mstafa RJ, Elleithy KM (2016) A video steganography algorithm based on Kanade-Lucas-Tomasi tracking algorithm and error correcting codes. Multimedia Tools and Applications 75(17):10311–10333.  https://doi.org/10.1007/s11042-015-3060-0 CrossRefGoogle Scholar
  20. 20.
    Mstafa RJ, Elleithy KM (2017) Compressed and raw video steganography techniques: a comprehensive survey and analysis. Multimedia Tools and Applications 76(20):21749–21786.  https://doi.org/10.1007/s11042-016-4055-1 CrossRefGoogle Scholar
  21. 21.
    Mstafa RJ, Elleithy KM, Abdelfattah E (2017a) A robust and secure video steganography method in DWT-DCT domains based on multiple object tracking and ECC. IEEE Access 5:5354–5365.  https://doi.org/10.1109/ACCESS.2017.2691581 CrossRefGoogle Scholar
  22. 22.
    Mstafa, R. J., Elleithy, KM, & Abdelfattah E (2017b) Video steganography techniques: taxonomy, challenges, and future directions. In: IEEE Long Island Systems, Applications and Technology Conference (LISAT), pp 1–6. doi: 10.1109/LISAT.2017.8001965Google Scholar
  23. 23.
    Muhammad K, Sajjad M, Mehmood I, Rho S, Baik SW (2016) A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image. Multimedia Tools and Applications 75(22):14867–14893.  https://doi.org/10.1007/s11042-015-2671-9 CrossRefGoogle Scholar
  24. 24.
    Patel K, Rora KK, Singh K, Verma S (2013) Lazy wavelet transform based steganography in video. In: IEEE International Conference on Communication Systems and Network Technologies (CSNT), pp 497–500. doi: 10.1109/CSNT.2013.109Google Scholar
  25. 25.
    Rabie T, Baziyad M, Kamel I (2018) Enhanced high capacity image steganography using discrete wavelet transform and the Laplacian pyramid. Multimedia Tools and Applications, 1–26 doi:  https://doi.org/10.1007/s11042-018-5713-2 CrossRefGoogle Scholar
  26. 26.
    Ramalingam M (2011) Stego machine–video steganography using modified LSB algorithm. World Acad Sci Eng Technol 5(2):170–173Google Scholar
  27. 27.
    Ramalingam M, Isa NAM (2014) Video steganography based on integer haar wavelet transforms for secured data transfer. Indian Journal of Science and Technology 7(7):897–904Google Scholar
  28. 28.
    Sadek MM, Khalifa AS, Mostafa MG (2015) Video steganography: a comprehensive review. Multimedia tools and applications 74(17):7063–7094.  https://doi.org/10.1007/s11042-014-1952-z CrossRefGoogle Scholar
  29. 29.
    Sadek MM, Khalifa AS, Mostafa MG (2017) Robust video steganography algorithm using adaptive skin-tone detection. Multimedia Tools and Applications 76(2):3065–3085.  https://doi.org/10.1007/s11042-015-3170-8 CrossRefGoogle Scholar
  30. 30.
    Sharma VK, Srivastava DK, Mathur P (2018) Efficient image steganography using graph signal processing. IET Image Process.  https://doi.org/10.1049/iet-ipr.2017.0965 CrossRefGoogle Scholar
  31. 31.
    Sikora T (1997) MPEG digital video-coding standards. IEEE Signal Process Mag 14(5):82–100.  https://doi.org/10.1109/79.618010 CrossRefGoogle Scholar
  32. 32.
    Thomee B, Shamma DA, Friedland G, BNiK E, Poland D, Li LJ (2016) YFCC100M: the new data in multimedia research. Commun ACM 59(2):64–73.  https://doi.org/10.1145/2812802 CrossRefGoogle Scholar
  33. 33.
    Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612.  https://doi.org/10.1109/TIP.2003.819861 CrossRefGoogle Scholar
  34. 34.
    Zhu S, Setia S, Jajodia S (2003) LEAP: efficient security mechanisms for large-scale distributed sensor networks. In: 10th ACM conference on computer and communications security (CCS’03). ACM, Washington DC pp 62–72. doi: 10.1145/948109.948120Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.UIET, Panjab UniversityChandigarhIndia

Personalised recommendations