Abstract
Information security holds a quintessential role in the era of digital communication. Nowadays, social media has become the new platform to share a massive length of digitally transmitted multimedia files without being suspected. Hence, it can hide data, enabling the security providers to add an extra layer to the existing traditional framework. Videos are the most shared digital content and carry the maximum payload, which is best suitable for steganography. This paper suggests a secured stego key-based video steganographic method that uses Framelet Transform to embed secret data in the cover media. Here the main focus is to reduce the computational cost by introducing the stego key, which reserves the information regarding the location of the secret data. For an additional layer of security, the stego key is encrypted using Elliptic Curve Cryptography (ECC) based encryption scheme. The robustness of the scheme is enhanced by introducing a large prime number for the stego key sharing using the Elliptic Curve Diffie Hellman Key Exchange Protocol. Performance measures, including PSNR, MSE, SSIM, and BER, are compared with the traditional state-of-the-art methods, which produce significant results without tampering with the visual quality and perceptual characteristics of the stego video.
Similar content being viewed by others
References
AbdelRaouf A (2021) A new data hiding approach for image steganography based on visual color sensitivity. Multimed Tools Appl, pp 1–25
Balu S, Babu CNK, Amudha K (2019) Secure and efficient data transmission by video steganography in medical imaging system. Clust Comput, 22(2):4057–4063
Bhatnagar G, Wu QJ (2012) An image fusion framework based on human visual system in framelet domain. Int J Wavelets, Multiresolution Inf Proc, 10(01):1250002
Borra S, Thanki R, Dey N, Borisagar K (2019) Secure transmission and integrity verification of color radiological images using fast discrete curvelet transform and compressive sensing. Smart Health 12:35–48
Cao M, Tian L, Li C (2020) A secure video steganography based on the intra-prediction mode (ipm) for h264. Sensors 20(18):5242
Chang CC, Chan CS, Fan YH (2006) Image hiding scheme with modulus function and dynamic programming strategy on partitioned pixels. Patt Recognit, 39(6):1155–1167
Chen Y, Wang H, Choo KKR, He P, Salcic Z, Kaafar MA, Zhang X (2021) Ddca: A distortion drift-based cost assignment method for adaptive video steganography in the transform domain. IEEE Transactions on Dependable and Secure Computing
Dalal M, Juneja M (2020) Evaluation of orthogonal and biorthogonal wavelets for video steganography. Inf Sec J A Global Perspective, 29(1):40–50
Eltahir ME, Kiah LM, Zaidan BB, Zaidan AA (2009) High rate video streaming steganography. In: 2009 International Conference on Information Management and Engineering, IEEE, pp 550–553
Evsutin O, Kultaev P (2021) An algorithm for embedding information in digital images based on discrete wavelet transform and learning automata. Multimedia Tools and Applications pp 1–23
Fakhredanesh M, Rahmati M, Safabakhsh R (2019) Steganography in discrete wavelet transform based on human visual system and cover model. Multimedia Tools and Applications 78(13):18475–18502
Fateh M, Rezvani M, Irani Y (2021) A new method of coding for steganography based on lsb matching revisited. Security and Communication Networks 2021
Forouzan BA (2007) Cryptography & network security. McGraw-Hill, Inc
Gayoso Martínez V, Hernández Encinas L, Sánchez Ávila C (2010) A survey of the elliptic curve integrated encryption scheme. Journal of Computer Science and Engineering 2
Ghamsarian N, Khademi M (2020) Undetectable video steganography by considering spatio-temporal steganalytic features in the embedding cost function. Multimedia Tools and Applications pp 1–31
Huang Z, Huang L, Li Q, Zhang T, Sang N (2018) Framelet regularization for uneven intensity correction of color images with illumination and reflectance estimation. Neurocomputing 314:154–168
Huynh-Thu Q, Ghanbari M (2012) The accuracy of psnr in predicting video quality for different video scenes and frame rates. Telecommun Syst, 49(1):35–48
Jalali A, Farsi H (2020) A new steganography algorithm based on video sparse representation. Multimed Tools Appl, 79(3):1821–1846
Jangid S, Sharma S (2017) High psnr based video steganography by mlc (multi-level clustering) algorithm. In: 2017 International Conference on Intelligent Computing and Control Systems (ICICCS), IEEE, pp 589–594
Jiao R, Ma S, Li B (2015) Framelet image watermarking considering dynamic visual masking. Optik 126(21):3197–3202
Kessler GC (2016) An overview of cryptography
Khedmati Y, Parvaz R, Behroo Y (2020) 2d hybrid chaos map for image security transform based on framelet and cellular automata. Information Sciences 512:855–879
Kolakalur A, Kagalidis I, Vuksanovic B (2016) Wavelet based color video steganography. Int J Eng Technol, 8(3):165
Liao X, Yin J, Chen M, Qin Z (2020) Adaptive payload distribution in multiple images steganography based on image texture features. IEEE Transactions on Dependable and Secure Computing
Liu Y, Liu S, Wang Y, Zhao H, Liu S (2019) Video steganography: A review. Neurocomputing 335:238–250
Luo W, Huang F, Huang J (2010) Edge adaptive image steganography based on lsb matching revisited. IEEE Trans Inf Forensics Sec, 5(2):201–214
Mielikainen J (2006) Lsb matching revisited. IEEE Signal Proc lett, 13(5):285–287
Miller VS (1986) Use of elliptic curves in cryptography. In: Williams HC (ed) Advances in Cryptology – CRYPTO ’85 Proceedings. Springer, Berlin Heidelberg, pp 417–426
Mittal M, Kaushik R, Verma A, Kaur I, Goyal LM, Roy S, Kim Th (2020) Image watermarking in curvelet domain using edge surface blocks. Symmetry 12(5):822
Mstafa RJ, Elleithy KM (2017) Compressed and raw video steganography techniques: A comprehensive survey and analysis. Multimed Tools Appl, 76(20):21749–21786
Muhuri PK, Ashraf Z, Goel S (2020) A novel image steganographic method based on integer wavelet transformation and particle swarm optimization. Applied Soft Computing p 106257
Mukhopadhyay S, Hossain S, Ghosal SK, Sarkar R (2021) Secured image steganography based on catalan transform. Multimedia Tools and Applications pp 1–26
Pak C, Kim J, An K, Kim C, Kim K, Pak C (2020) A novel color image lsb steganography using improved 1d chaotic map. Multimedia Tools and Applications 79(1):1409–1425
Pan N, Qin J, Tan Y, Xiang X, Hou G (2020) A video coverless information hiding algorithm based on semantic segmentation. EURASIP Journal on Image and Video Processing 2020(1):1–18
Rana S, Kamra R, Sur A (2020) Motion vector based video steganography using homogeneous block selection. Multimedia Tools and Applications 79(9):5881–5896
Sadek MM, Khalifa AS, Mostafa MG (2015) Video steganography: a comprehensive review. Multimedia tools and applications 74(17):7063–7094
Sadek MM, Khalifa AS, Mostafa MG (2017) Robust video steganography algorithm using adaptive skin-tone detection. Multimedia Tools and Applications 76(2):3065–3085
Selesnick IW, Abdelnour AF (2004) Symmetric wavelet tight frames with two generators. Applied and Computational Harmonic Analysis 17(2):211–225
Su W, Ni J, Hu X, Fridrich J (2020) Image steganography with symmetric embedding using gaussian markov random field model. IEEE Transactions on Circuits and Systems for Video Technology pp 1–1
Subhedar MS, Mankar VH (2020) Secure image steganography using framelet transform and bidiagonal svd. Multimedia Tools and Applications 79(3):1865–1886
Suresh M, Sam IS (2020) Optimal wavelet transform using oppositional grey wolf optimization for video steganography. Multimedia Tools and Applications pp 1–15
Suresh M, Sam IS (2020) Optimized interesting region identification for video steganography using fractional grey wolf optimization along with multi-objective cost function. Journal of King Saud University-Computer and Information Sciences
Tancik M, Mildenhall B, Ng R (2020) Stegastamp: Invisible hyperlinks in physical photographs. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp 2117–2126
Thakur A, Singh H, Sharda S (2015) Secure video steganography based on discrete wavelet transform and arnold transform. International Journal of Computer Applications 123(11)
Wang K, Zhao H, Wang H (2014) Video steganalysis against motion vector-based steganography by adding or subtracting one motion vector value. IEEE Transactions on Information Forensics and Security 9(5):741–751
Wang Y, Jodoin PM, Porikli F, Konrad J, Benezeth Y, Ishwar P (2014) Cdnet: An expanded change detection benchmark dataset. In: Proceedings of the IEEE conference on computer vision and pattern recognition workshops, pp 387–394
Weber AG (1997) The usc-sipi image database version 5. USC-SIPI Report 315(1)
Xiao M, He Z (2015) High capacity image steganography method based on framelet and compressive sensing. In: MIPPR 2015: Multispectral Image Acquisition, Processing, and Analysis, International Society for Optics and Photonics, 9811:98110Y
Yadav P, Mishra N, Sharma S (2013) A secure video steganography with encryption based on lsb technique. In: IEEE International Conference on Computational Intelligence and Computing Research, IEEE, pp 1–5
Yadav SK, Bhogal RK (2018) A video steganography in spatial, discrete wavelet transform and integer wavelet domain. In: 2018 International Conference on Intelligent Circuits and Systems (ICICS), IEEE, pp 258–264
Yao Y, Yu N (2021) Motion vector modification distortion analysis-based payload allocation for video steganography. Journal of Visual Communication and Image Representation 74:102986
Zhang C, Cheng LL, Qiu Z, Cheng LM (2008) Multipurpose watermarking based on multiscale curvelet transform. IEEE Transactions on Information Forensics and Security 3(4):611–619
Acknowledgements
This work has been accomplished under the project “Information Security Education Awareness (ISEA)” Phase-II funded by the Ministry of Electronics and Information Technology (MeitY), Government of India
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflicts of interest
The authors declare that they have no conflict of interest
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Rout, S., Mohapatra, R.K. Secure video steganographic model using framelet transform and elliptic curve cryptography. Multimed Tools Appl 83, 25191–25212 (2024). https://doi.org/10.1007/s11042-023-16531-2
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-023-16531-2