Abstract
In this era of internet transfer of information is in digital form using multimedia files such as image, video, audio, etc. which relies on secure communication techniques to convey information safely. Due to the frequent transfer of videos over the internet nowadays they have become a good cover media for secure and covert communication in the form of video steganography. For efficient video steganography, it must fulfill its basic requirements such as capacity, imperceptibility, and robustness. In order to make a balance between imperceptibility and robustness, an efficient video steganography scheme is proposed for Standard Definition (SD) and High Definition (HD) videos. This scheme employs DWT (discrete wavelet transforms) for embedding the secret message inside the video frames utilizing only luminance (Y) component, and the security of the proposed scheme is strengthen by pre-processing the secret message with encryption before embedding. The embedding process is done by utilizing the middle-frequency sub-bands after applying second level 2-D DWT to the video frames to decompose it into 16 sub-bands. The performance of the proposed scheme is tested on different videos with quality metrics including peak signal to noise ratio (PSNR), structural similarity (SSIM) index, bit error rate (BER) and also by applying Gaussian and salt & pepper noise attacks. Moreover, the scheme is tested for the different level of compression on stego-video and also compared with U and V components used while embedding. Experimental results show that for both types of videos (HD and SD) the proposed scheme is able to achieve high imperceptibility. Further, it also provides robustness against different types of noise attacks and different compression levels which makes the proposed scheme evident for secure data transmission.
Similar content being viewed by others
References
Amirtharajan R, Rayappan JBB (2013) Steganography-time to time: a review. Res J Inf Technol 5:53–66. https://doi.org/10.3923/rjit.2013.53.66
Chantrapornchai C, Churin K, Preechasuk J, Adulkasem S (2014) Video steganography for hiding image with wavelet coefficients. International journal of multimedia and ubiquitous. Engineering 9(6):385–396
Dalal M, Juneja M (2018) Video steganography techniques in spatial domain—a survey. In: Proceedings of the International Conference on Computing and Communication Systems. Springer, Singapore pp 705–711. doi: 10.1007/978-981-10-6890-4_67
Das S, Sharma S, Bakshi S, Mukherjee I (2018) A framework for pixel intensity modulation based image steganography. In: Progress in advanced computing and intelligent engineering. Springer, Singapore, pp 3–14. https://doi.org/10.1007/978-981-10-6872-0_1
Dasgupta K, Mondal JK, Dutta P (2013) Optimized video steganography using genetic algorithm (GA). Procedia Technology 10:131–137. https://doi.org/10.1016/j.protcy.2013.12.345
Di Laura C, Pajuelo D, Kemper G (2016) A novel steganography technique for SDTV-H. 264/AVC encoded video. International Journal of Digital Multimedia Broadcasting 2016:1–9. https://doi.org/10.1155/2016/6950592
Ding W, Yan W, Qi D (2002) Digital image watermarking based on discrete wavelet transform. J Comput Sci Technol 17(2):129–139. https://doi.org/10.1007/BF02962205
Ebrahim M, Chong CW (2013) Secure force: a low-complexity cryptographic algorithm for wireless sensor network (WSN). In: IEEE International Conference on Control System, Computing and Engineering (ICCSCE), pp 557–562. doi: 10.1109/ICCSCE.2013.6720027
Frank E, Varadaraan S, Babu BS (2016) DWT and YUV based video steganography. International Journal of Innovative Technologies 4(5):0823–0828
He Y, Yang G, Zhu N (2012) A real-time dual watermarking algorithm of H. 264/AVC video stream for video-on-demand service. AEU-International Journal of Electronics and Communications 66(4):305–312. https://doi.org/10.1016/j.aeue.2011.08.007
Hussain M, Wahab AWA, Idris YIB, Ho AT, Jung KH (2018) Image steganography in spatial domain: a survey. Signal Process Image Commun 65:46–66. https://doi.org/10.1016/j.image.2018.03.012
Idbeaa T, Samad SA, Husain H (2016) A secure and robust compressed domain video steganography for intra-and inter-frames using embedding-based byte differencing (EBBD) scheme. PLoS One 11(3):e0150732. https://doi.org/10.1371/journal.pone.0150732
Johnson NF, Duric Z, Jajodia S (2001) Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking: Attacks and Countermeasures (Vol. 1). Springer Science & Business Media
Kakde Y, Gonnade P, Dahiwale P (2015) Audio-video steganography. In: IEEE International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), pp 1–6. doi: 10.1109/ICIIECS.2015.7192885
Khan S, Ibrahim MS, Ebrahim M, Amjad H (2015) FPGA implementation of secure force (64-bit) low complexity encryption algorithm. International Journal of Computer Network and Information Security 7(12):60–69. https://doi.org/10.5815/ijcnis.2015.12.07
Kumar GN, Bhavanam SN, Midasala V (2014) Image Hiding in a Video-based on DWT & LSB Algorithm. In: First International Conference on Photonics, VLSI and Signal Processing (ICPVS), pp 7–12
Li G, Ito Y, Yu X, Nitta N, Babaguchi N (2010) Recoverable privacy protection for video content distribution. EURASIP J Inf Secur 2009(1):293031–293011. https://doi.org/10.1155/2009/293031
Mstafa RJ, Elleithy KM (2015) A high payload video steganography algorithm in DWT domain based on BCH codes (15, 11). In: 2015 wireless telecommunications symposium (WTS), pp 1–8. doi: 10.1109/WTS.2015.7117257
Mstafa RJ, Elleithy KM (2016) A video steganography algorithm based on Kanade-Lucas-Tomasi tracking algorithm and error correcting codes. Multimedia Tools and Applications 75(17):10311–10333. https://doi.org/10.1007/s11042-015-3060-0
Mstafa RJ, Elleithy KM (2017) Compressed and raw video steganography techniques: a comprehensive survey and analysis. Multimedia Tools and Applications 76(20):21749–21786. https://doi.org/10.1007/s11042-016-4055-1
Mstafa RJ, Elleithy KM, Abdelfattah E (2017a) A robust and secure video steganography method in DWT-DCT domains based on multiple object tracking and ECC. IEEE Access 5:5354–5365. https://doi.org/10.1109/ACCESS.2017.2691581
Mstafa, R. J., Elleithy, KM, & Abdelfattah E (2017b) Video steganography techniques: taxonomy, challenges, and future directions. In: IEEE Long Island Systems, Applications and Technology Conference (LISAT), pp 1–6. doi: 10.1109/LISAT.2017.8001965
Muhammad K, Sajjad M, Mehmood I, Rho S, Baik SW (2016) A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image. Multimedia Tools and Applications 75(22):14867–14893. https://doi.org/10.1007/s11042-015-2671-9
Patel K, Rora KK, Singh K, Verma S (2013) Lazy wavelet transform based steganography in video. In: IEEE International Conference on Communication Systems and Network Technologies (CSNT), pp 497–500. doi: 10.1109/CSNT.2013.109
Rabie T, Baziyad M, Kamel I (2018) Enhanced high capacity image steganography using discrete wavelet transform and the Laplacian pyramid. Multimedia Tools and Applications, 1–26 doi: https://doi.org/10.1007/s11042-018-5713-2
Ramalingam M (2011) Stego machine–video steganography using modified LSB algorithm. World Acad Sci Eng Technol 5(2):170–173
Ramalingam M, Isa NAM (2014) Video steganography based on integer haar wavelet transforms for secured data transfer. Indian Journal of Science and Technology 7(7):897–904
Sadek MM, Khalifa AS, Mostafa MG (2015) Video steganography: a comprehensive review. Multimedia tools and applications 74(17):7063–7094. https://doi.org/10.1007/s11042-014-1952-z
Sadek MM, Khalifa AS, Mostafa MG (2017) Robust video steganography algorithm using adaptive skin-tone detection. Multimedia Tools and Applications 76(2):3065–3085. https://doi.org/10.1007/s11042-015-3170-8
Sharma VK, Srivastava DK, Mathur P (2018) Efficient image steganography using graph signal processing. IET Image Process. https://doi.org/10.1049/iet-ipr.2017.0965
Sikora T (1997) MPEG digital video-coding standards. IEEE Signal Process Mag 14(5):82–100. https://doi.org/10.1109/79.618010
Thomee B, Shamma DA, Friedland G, BNiK E, Poland D, Li LJ (2016) YFCC100M: the new data in multimedia research. Commun ACM 59(2):64–73. https://doi.org/10.1145/2812802
Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612. https://doi.org/10.1109/TIP.2003.819861
Zhu S, Setia S, Jajodia S (2003) LEAP: efficient security mechanisms for large-scale distributed sensor networks. In: 10th ACM conference on computer and communications security (CCS’03). ACM, Washington DC pp 62–72. doi: 10.1145/948109.948120
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Dalal, M., Juneja, M. A robust and imperceptible steganography technique for SD and HD videos. Multimed Tools Appl 78, 5769–5789 (2019). https://doi.org/10.1007/s11042-018-6093-3
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-018-6093-3