Skip to main content
Log in

A robust and imperceptible steganography technique for SD and HD videos

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this era of internet transfer of information is in digital form using multimedia files such as image, video, audio, etc. which relies on secure communication techniques to convey information safely. Due to the frequent transfer of videos over the internet nowadays they have become a good cover media for secure and covert communication in the form of video steganography. For efficient video steganography, it must fulfill its basic requirements such as capacity, imperceptibility, and robustness. In order to make a balance between imperceptibility and robustness, an efficient video steganography scheme is proposed for Standard Definition (SD) and High Definition (HD) videos. This scheme employs DWT (discrete wavelet transforms) for embedding the secret message inside the video frames utilizing only luminance (Y) component, and the security of the proposed scheme is strengthen by pre-processing the secret message with encryption before embedding. The embedding process is done by utilizing the middle-frequency sub-bands after applying second level 2-D DWT to the video frames to decompose it into 16 sub-bands. The performance of the proposed scheme is tested on different videos with quality metrics including peak signal to noise ratio (PSNR), structural similarity (SSIM) index, bit error rate (BER) and also by applying Gaussian and salt & pepper noise attacks. Moreover, the scheme is tested for the different level of compression on stego-video and also compared with U and V components used while embedding. Experimental results show that for both types of videos (HD and SD) the proposed scheme is able to achieve high imperceptibility. Further, it also provides robustness against different types of noise attacks and different compression levels which makes the proposed scheme evident for secure data transmission.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Amirtharajan R, Rayappan JBB (2013) Steganography-time to time: a review. Res J Inf Technol 5:53–66. https://doi.org/10.3923/rjit.2013.53.66

    Article  Google Scholar 

  2. Chantrapornchai C, Churin K, Preechasuk J, Adulkasem S (2014) Video steganography for hiding image with wavelet coefficients. International journal of multimedia and ubiquitous. Engineering 9(6):385–396

    Google Scholar 

  3. Dalal M, Juneja M (2018) Video steganography techniques in spatial domain—a survey. In: Proceedings of the International Conference on Computing and Communication Systems. Springer, Singapore pp 705–711. doi: 10.1007/978-981-10-6890-4_67

    Chapter  Google Scholar 

  4. Das S, Sharma S, Bakshi S, Mukherjee I (2018) A framework for pixel intensity modulation based image steganography. In: Progress in advanced computing and intelligent engineering. Springer, Singapore, pp 3–14. https://doi.org/10.1007/978-981-10-6872-0_1

    Chapter  Google Scholar 

  5. Dasgupta K, Mondal JK, Dutta P (2013) Optimized video steganography using genetic algorithm (GA). Procedia Technology 10:131–137. https://doi.org/10.1016/j.protcy.2013.12.345

    Article  Google Scholar 

  6. Di Laura C, Pajuelo D, Kemper G (2016) A novel steganography technique for SDTV-H. 264/AVC encoded video. International Journal of Digital Multimedia Broadcasting 2016:1–9. https://doi.org/10.1155/2016/6950592

    Article  Google Scholar 

  7. Ding W, Yan W, Qi D (2002) Digital image watermarking based on discrete wavelet transform. J Comput Sci Technol 17(2):129–139. https://doi.org/10.1007/BF02962205

    Article  MathSciNet  MATH  Google Scholar 

  8. Ebrahim M, Chong CW (2013) Secure force: a low-complexity cryptographic algorithm for wireless sensor network (WSN). In: IEEE International Conference on Control System, Computing and Engineering (ICCSCE), pp 557–562. doi: 10.1109/ICCSCE.2013.6720027

  9. Frank E, Varadaraan S, Babu BS (2016) DWT and YUV based video steganography. International Journal of Innovative Technologies 4(5):0823–0828

    Google Scholar 

  10. He Y, Yang G, Zhu N (2012) A real-time dual watermarking algorithm of H. 264/AVC video stream for video-on-demand service. AEU-International Journal of Electronics and Communications 66(4):305–312. https://doi.org/10.1016/j.aeue.2011.08.007

    Article  Google Scholar 

  11. Hussain M, Wahab AWA, Idris YIB, Ho AT, Jung KH (2018) Image steganography in spatial domain: a survey. Signal Process Image Commun 65:46–66. https://doi.org/10.1016/j.image.2018.03.012

    Article  Google Scholar 

  12. Idbeaa T, Samad SA, Husain H (2016) A secure and robust compressed domain video steganography for intra-and inter-frames using embedding-based byte differencing (EBBD) scheme. PLoS One 11(3):e0150732. https://doi.org/10.1371/journal.pone.0150732

    Article  Google Scholar 

  13. Johnson NF, Duric Z, Jajodia S (2001) Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking: Attacks and Countermeasures (Vol. 1). Springer Science & Business Media

  14. Kakde Y, Gonnade P, Dahiwale P (2015) Audio-video steganography. In: IEEE International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), pp 1–6. doi: 10.1109/ICIIECS.2015.7192885

  15. Khan S, Ibrahim MS, Ebrahim M, Amjad H (2015) FPGA implementation of secure force (64-bit) low complexity encryption algorithm. International Journal of Computer Network and Information Security 7(12):60–69. https://doi.org/10.5815/ijcnis.2015.12.07

    Article  Google Scholar 

  16. Kumar GN, Bhavanam SN, Midasala V (2014) Image Hiding in a Video-based on DWT & LSB Algorithm. In: First International Conference on Photonics, VLSI and Signal Processing (ICPVS), pp 7–12

  17. Li G, Ito Y, Yu X, Nitta N, Babaguchi N (2010) Recoverable privacy protection for video content distribution. EURASIP J Inf Secur 2009(1):293031–293011. https://doi.org/10.1155/2009/293031

    Article  Google Scholar 

  18. Mstafa RJ, Elleithy KM (2015) A high payload video steganography algorithm in DWT domain based on BCH codes (15, 11). In: 2015 wireless telecommunications symposium (WTS), pp 1–8. doi: 10.1109/WTS.2015.7117257

  19. Mstafa RJ, Elleithy KM (2016) A video steganography algorithm based on Kanade-Lucas-Tomasi tracking algorithm and error correcting codes. Multimedia Tools and Applications 75(17):10311–10333. https://doi.org/10.1007/s11042-015-3060-0

    Article  Google Scholar 

  20. Mstafa RJ, Elleithy KM (2017) Compressed and raw video steganography techniques: a comprehensive survey and analysis. Multimedia Tools and Applications 76(20):21749–21786. https://doi.org/10.1007/s11042-016-4055-1

    Article  Google Scholar 

  21. Mstafa RJ, Elleithy KM, Abdelfattah E (2017a) A robust and secure video steganography method in DWT-DCT domains based on multiple object tracking and ECC. IEEE Access 5:5354–5365. https://doi.org/10.1109/ACCESS.2017.2691581

    Article  Google Scholar 

  22. Mstafa, R. J., Elleithy, KM, & Abdelfattah E (2017b) Video steganography techniques: taxonomy, challenges, and future directions. In: IEEE Long Island Systems, Applications and Technology Conference (LISAT), pp 1–6. doi: 10.1109/LISAT.2017.8001965

  23. Muhammad K, Sajjad M, Mehmood I, Rho S, Baik SW (2016) A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image. Multimedia Tools and Applications 75(22):14867–14893. https://doi.org/10.1007/s11042-015-2671-9

    Article  Google Scholar 

  24. Patel K, Rora KK, Singh K, Verma S (2013) Lazy wavelet transform based steganography in video. In: IEEE International Conference on Communication Systems and Network Technologies (CSNT), pp 497–500. doi: 10.1109/CSNT.2013.109

  25. Rabie T, Baziyad M, Kamel I (2018) Enhanced high capacity image steganography using discrete wavelet transform and the Laplacian pyramid. Multimedia Tools and Applications, 1–26 doi: https://doi.org/10.1007/s11042-018-5713-2

    Article  Google Scholar 

  26. Ramalingam M (2011) Stego machine–video steganography using modified LSB algorithm. World Acad Sci Eng Technol 5(2):170–173

    Google Scholar 

  27. Ramalingam M, Isa NAM (2014) Video steganography based on integer haar wavelet transforms for secured data transfer. Indian Journal of Science and Technology 7(7):897–904

    Google Scholar 

  28. Sadek MM, Khalifa AS, Mostafa MG (2015) Video steganography: a comprehensive review. Multimedia tools and applications 74(17):7063–7094. https://doi.org/10.1007/s11042-014-1952-z

    Article  Google Scholar 

  29. Sadek MM, Khalifa AS, Mostafa MG (2017) Robust video steganography algorithm using adaptive skin-tone detection. Multimedia Tools and Applications 76(2):3065–3085. https://doi.org/10.1007/s11042-015-3170-8

    Article  Google Scholar 

  30. Sharma VK, Srivastava DK, Mathur P (2018) Efficient image steganography using graph signal processing. IET Image Process. https://doi.org/10.1049/iet-ipr.2017.0965

    Article  Google Scholar 

  31. Sikora T (1997) MPEG digital video-coding standards. IEEE Signal Process Mag 14(5):82–100. https://doi.org/10.1109/79.618010

    Article  Google Scholar 

  32. Thomee B, Shamma DA, Friedland G, BNiK E, Poland D, Li LJ (2016) YFCC100M: the new data in multimedia research. Commun ACM 59(2):64–73. https://doi.org/10.1145/2812802

    Article  Google Scholar 

  33. Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612. https://doi.org/10.1109/TIP.2003.819861

    Article  Google Scholar 

  34. Zhu S, Setia S, Jajodia S (2003) LEAP: efficient security mechanisms for large-scale distributed sensor networks. In: 10th ACM conference on computer and communications security (CCS’03). ACM, Washington DC pp 62–72. doi: 10.1145/948109.948120

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mukesh Dalal.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Dalal, M., Juneja, M. A robust and imperceptible steganography technique for SD and HD videos. Multimed Tools Appl 78, 5769–5789 (2019). https://doi.org/10.1007/s11042-018-6093-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-6093-3

Keywords

Navigation