Skip to main content
Log in

Secure video steganographic model using framelet transform and elliptic curve cryptography

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Information security holds a quintessential role in the era of digital communication. Nowadays, social media has become the new platform to share a massive length of digitally transmitted multimedia files without being suspected. Hence, it can hide data, enabling the security providers to add an extra layer to the existing traditional framework. Videos are the most shared digital content and carry the maximum payload, which is best suitable for steganography. This paper suggests a secured stego key-based video steganographic method that uses Framelet Transform to embed secret data in the cover media. Here the main focus is to reduce the computational cost by introducing the stego key, which reserves the information regarding the location of the secret data. For an additional layer of security, the stego key is encrypted using Elliptic Curve Cryptography (ECC) based encryption scheme. The robustness of the scheme is enhanced by introducing a large prime number for the stego key sharing using the Elliptic Curve Diffie Hellman Key Exchange Protocol. Performance measures, including PSNR, MSE, SSIM, and BER, are compared with the traditional state-of-the-art methods, which produce significant results without tampering with the visual quality and perceptual characteristics of the stego video.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

References

  1. AbdelRaouf A (2021) A new data hiding approach for image steganography based on visual color sensitivity. Multimed Tools Appl, pp 1–25

  2. Balu S, Babu CNK, Amudha K (2019) Secure and efficient data transmission by video steganography in medical imaging system. Clust Comput, 22(2):4057–4063

    Article  Google Scholar 

  3. Bhatnagar G, Wu QJ (2012) An image fusion framework based on human visual system in framelet domain. Int J Wavelets, Multiresolution Inf Proc, 10(01):1250002

    Article  MathSciNet  Google Scholar 

  4. Borra S, Thanki R, Dey N, Borisagar K (2019) Secure transmission and integrity verification of color radiological images using fast discrete curvelet transform and compressive sensing. Smart Health 12:35–48

    Article  Google Scholar 

  5. Cao M, Tian L, Li C (2020) A secure video steganography based on the intra-prediction mode (ipm) for h264. Sensors 20(18):5242

    Article  ADS  PubMed  PubMed Central  Google Scholar 

  6. Chang CC, Chan CS, Fan YH (2006) Image hiding scheme with modulus function and dynamic programming strategy on partitioned pixels. Patt Recognit, 39(6):1155–1167

    Article  ADS  Google Scholar 

  7. Chen Y, Wang H, Choo KKR, He P, Salcic Z, Kaafar MA, Zhang X (2021) Ddca: A distortion drift-based cost assignment method for adaptive video steganography in the transform domain. IEEE Transactions on Dependable and Secure Computing

  8. Dalal M, Juneja M (2020) Evaluation of orthogonal and biorthogonal wavelets for video steganography. Inf Sec J A Global Perspective, 29(1):40–50

    Article  Google Scholar 

  9. Eltahir ME, Kiah LM, Zaidan BB, Zaidan AA (2009) High rate video streaming steganography. In: 2009 International Conference on Information Management and Engineering, IEEE, pp 550–553

  10. Evsutin O, Kultaev P (2021) An algorithm for embedding information in digital images based on discrete wavelet transform and learning automata. Multimedia Tools and Applications pp 1–23

  11. Fakhredanesh M, Rahmati M, Safabakhsh R (2019) Steganography in discrete wavelet transform based on human visual system and cover model. Multimedia Tools and Applications 78(13):18475–18502

  12. Fateh M, Rezvani M, Irani Y (2021) A new method of coding for steganography based on lsb matching revisited. Security and Communication Networks 2021

  13. Forouzan BA (2007) Cryptography & network security. McGraw-Hill, Inc

  14. Gayoso Martínez V, Hernández Encinas L, Sánchez Ávila C (2010) A survey of the elliptic curve integrated encryption scheme. Journal of Computer Science and Engineering 2

  15. Ghamsarian N, Khademi M (2020) Undetectable video steganography by considering spatio-temporal steganalytic features in the embedding cost function. Multimedia Tools and Applications pp 1–31

  16. Huang Z, Huang L, Li Q, Zhang T, Sang N (2018) Framelet regularization for uneven intensity correction of color images with illumination and reflectance estimation. Neurocomputing 314:154–168

    Article  Google Scholar 

  17. Huynh-Thu Q, Ghanbari M (2012) The accuracy of psnr in predicting video quality for different video scenes and frame rates. Telecommun Syst, 49(1):35–48

    Article  Google Scholar 

  18. Jalali A, Farsi H (2020) A new steganography algorithm based on video sparse representation. Multimed Tools Appl, 79(3):1821–1846

    Article  Google Scholar 

  19. Jangid S, Sharma S (2017) High psnr based video steganography by mlc (multi-level clustering) algorithm. In: 2017 International Conference on Intelligent Computing and Control Systems (ICICCS), IEEE, pp 589–594

  20. Jiao R, Ma S, Li B (2015) Framelet image watermarking considering dynamic visual masking. Optik 126(21):3197–3202

    Article  ADS  Google Scholar 

  21. Kessler GC (2016) An overview of cryptography

  22. Khedmati Y, Parvaz R, Behroo Y (2020) 2d hybrid chaos map for image security transform based on framelet and cellular automata. Information Sciences 512:855–879

  23. Kolakalur A, Kagalidis I, Vuksanovic B (2016) Wavelet based color video steganography. Int J Eng Technol, 8(3):165

    Article  Google Scholar 

  24. Liao X, Yin J, Chen M, Qin Z (2020) Adaptive payload distribution in multiple images steganography based on image texture features. IEEE Transactions on Dependable and Secure Computing

  25. Liu Y, Liu S, Wang Y, Zhao H, Liu S (2019) Video steganography: A review. Neurocomputing 335:238–250

    Article  Google Scholar 

  26. Luo W, Huang F, Huang J (2010) Edge adaptive image steganography based on lsb matching revisited. IEEE Trans Inf Forensics Sec, 5(2):201–214

    Article  Google Scholar 

  27. Mielikainen J (2006) Lsb matching revisited. IEEE Signal Proc lett, 13(5):285–287

    Article  ADS  Google Scholar 

  28. Miller VS (1986) Use of elliptic curves in cryptography. In: Williams HC (ed) Advances in Cryptology – CRYPTO ’85 Proceedings. Springer, Berlin Heidelberg, pp 417–426

    Chapter  Google Scholar 

  29. Mittal M, Kaushik R, Verma A, Kaur I, Goyal LM, Roy S, Kim Th (2020) Image watermarking in curvelet domain using edge surface blocks. Symmetry 12(5):822

    Article  ADS  Google Scholar 

  30. Mstafa RJ, Elleithy KM (2017) Compressed and raw video steganography techniques: A comprehensive survey and analysis. Multimed Tools Appl, 76(20):21749–21786

    Article  Google Scholar 

  31. Muhuri PK, Ashraf Z, Goel S (2020) A novel image steganographic method based on integer wavelet transformation and particle swarm optimization. Applied Soft Computing p 106257

  32. Mukhopadhyay S, Hossain S, Ghosal SK, Sarkar R (2021) Secured image steganography based on catalan transform. Multimedia Tools and Applications pp 1–26

  33. Pak C, Kim J, An K, Kim C, Kim K, Pak C (2020) A novel color image lsb steganography using improved 1d chaotic map. Multimedia Tools and Applications 79(1):1409–1425

  34. Pan N, Qin J, Tan Y, Xiang X, Hou G (2020) A video coverless information hiding algorithm based on semantic segmentation. EURASIP Journal on Image and Video Processing 2020(1):1–18

  35. Rana S, Kamra R, Sur A (2020) Motion vector based video steganography using homogeneous block selection. Multimedia Tools and Applications 79(9):5881–5896

  36. Sadek MM, Khalifa AS, Mostafa MG (2015) Video steganography: a comprehensive review. Multimedia tools and applications 74(17):7063–7094

  37. Sadek MM, Khalifa AS, Mostafa MG (2017) Robust video steganography algorithm using adaptive skin-tone detection. Multimedia Tools and Applications 76(2):3065–3085

  38. Selesnick IW, Abdelnour AF (2004) Symmetric wavelet tight frames with two generators. Applied and Computational Harmonic Analysis 17(2):211–225

  39. Su W, Ni J, Hu X, Fridrich J (2020) Image steganography with symmetric embedding using gaussian markov random field model. IEEE Transactions on Circuits and Systems for Video Technology pp 1–1

  40. Subhedar MS, Mankar VH (2020) Secure image steganography using framelet transform and bidiagonal svd. Multimedia Tools and Applications 79(3):1865–1886

  41. Suresh M, Sam IS (2020) Optimal wavelet transform using oppositional grey wolf optimization for video steganography. Multimedia Tools and Applications pp 1–15

  42. Suresh M, Sam IS (2020) Optimized interesting region identification for video steganography using fractional grey wolf optimization along with multi-objective cost function. Journal of King Saud University-Computer and Information Sciences

  43. Tancik M, Mildenhall B, Ng R (2020) Stegastamp: Invisible hyperlinks in physical photographs. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp 2117–2126

  44. Thakur A, Singh H, Sharda S (2015) Secure video steganography based on discrete wavelet transform and arnold transform. International Journal of Computer Applications 123(11)

  45. Wang K, Zhao H, Wang H (2014) Video steganalysis against motion vector-based steganography by adding or subtracting one motion vector value. IEEE Transactions on Information Forensics and Security 9(5):741–751

  46. Wang Y, Jodoin PM, Porikli F, Konrad J, Benezeth Y, Ishwar P (2014) Cdnet: An expanded change detection benchmark dataset. In: Proceedings of the IEEE conference on computer vision and pattern recognition workshops, pp 387–394

  47. Weber AG (1997) The usc-sipi image database version 5. USC-SIPI Report 315(1)

  48. Xiao M, He Z (2015) High capacity image steganography method based on framelet and compressive sensing. In: MIPPR 2015: Multispectral Image Acquisition, Processing, and Analysis, International Society for Optics and Photonics, 9811:98110Y

  49. Yadav P, Mishra N, Sharma S (2013) A secure video steganography with encryption based on lsb technique. In: IEEE International Conference on Computational Intelligence and Computing Research, IEEE, pp 1–5

  50. Yadav SK, Bhogal RK (2018) A video steganography in spatial, discrete wavelet transform and integer wavelet domain. In: 2018 International Conference on Intelligent Circuits and Systems (ICICS), IEEE, pp 258–264

  51. Yao Y, Yu N (2021) Motion vector modification distortion analysis-based payload allocation for video steganography. Journal of Visual Communication and Image Representation 74:102986

  52. Zhang C, Cheng LL, Qiu Z, Cheng LM (2008) Multipurpose watermarking based on multiscale curvelet transform. IEEE Transactions on Information Forensics and Security 3(4):611–619

Download references

Acknowledgements

This work has been accomplished under the project “Information Security Education Awareness (ISEA)” Phase-II funded by the Ministry of Electronics and Information Technology (MeitY), Government of India

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sonali Rout.

Ethics declarations

Conflicts of interest

The authors declare that they have no conflict of interest

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Rout, S., Mohapatra, R.K. Secure video steganographic model using framelet transform and elliptic curve cryptography. Multimed Tools Appl 83, 25191–25212 (2024). https://doi.org/10.1007/s11042-023-16531-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-16531-2

Keywords

Navigation