Skip to main content
Log in

A two-level secure data hiding algorithm for video steganography

  • Published:
Multidimensional Systems and Signal Processing Aims and scope Submit manuscript

Abstract

Sensitive data is exchanged frequently through wired or wireless communication that are vulnerable to unauthorized interception. Cryptography is a solution to overcome this issue, but once decrypted the information secrecy does not exist. Apart from hiding data in an image, it can be extended for digital media. In this work, data hiding and extraction is proposed for Audio Video Interleave videos, that embeds the image in Bitmap Image File, that has the secret information in a frame of the video by segmenting the bytes of the secret image and placing them in the video frame providing a higher level of encryption. This novel method provides a two level encryption, thus to decipher the data, the way in which the secret image is originally decomposed and the frame in which it is embedded should be known. The quality of the secret image embedded and the size of the video is not altered before and after encryption of the secret data. The secret image may contain any multimedia data that can be further extracted and recognized.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  • Bharadwaj, R., & Sharma, V. (2016). Image steganography based on complemented message and inverted bit LSB substitution. Proceedia Computer Science, 93, 832–838.

    Article  Google Scholar 

  • Ghaemmaghami, S., Ahani, S., & Wang, Z. J. (2015). Sparse representation based wavelet domain steganography method. IEEE/ACM Transactions on Audio, Speech and Language Processing, 23(1), 80–91.

    Google Scholar 

  • Li, B., Huang, J., Wang, M., & Tan, S. (2014). Investigation of cost assignment in spatial image steganography. IEEE Transactions on Information Forensics and Security, 9(8), 1264–1277.

    Article  Google Scholar 

  • Manisha, S., & Sharmila T. S. (2016). Text frame classification and recognition using segmentation technique. In 2016 2nd international conference on applied and theoretical computing and communication technology (iCATccT), IEEE, Bangalore (pp. 662–666).

  • Mazurczyk, W., & Caviglione, L. (2015a). Information hiding as a challenge for malware detection. IEEE Security and Privacy, 13(2), 89–93.

  • Mazurczyk, W., & Caviglione, L. (2015b). Steganography in modern smartphones and mitigation techniques. IEEE Communication Surveys Tutorials, 17(1), 334–357.

  • Ni, J., Guo, L., & QingShi, Y. (2014). Uniform embedding for efficient JPEG Steganography. IEEE Transactions on Information Forensics and Security, 9(5), 814–825.

    Article  Google Scholar 

  • Ntalianis, K., & Tsapatsoulis, N. (2016). Remote authentication via biometrics: A robust video object steganographic mechanism over wireless networks. IEEE Transactions on Emerging Topics in Computing, 4(1), 156–174.

    Article  Google Scholar 

  • Ozcan, C., & Kemal, T. (2017). Comparison of LSB image steganography technique in different color spaces. In 2017 international artificial intelligence and data processing symposium (IDAP) (pp. 1–6). IEEE.

  • Saikia, M., & Thakur, V. (2013). Hiding secret image in video. In International conference on intelligent systems and signal processing, ISSP (pp. 150–153).

  • Sarreshtedari, S., & Akhaee, M. (2013). One-third probability embedding: A new +1 histogram compensating image least significant bit steganography scheme. IET Image Processing, 8(2), 78–89.

    Article  Google Scholar 

  • Wang, C.-M., & Wu, K.-C. (2015). Steganography using reversible texture synthesis. IEEE Transactions on Imapge Processing, 24(1), 130–139.

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Manisha.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Manisha, S., Sharmila, T.S. A two-level secure data hiding algorithm for video steganography. Multidim Syst Sign Process 30, 529–542 (2019). https://doi.org/10.1007/s11045-018-0568-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11045-018-0568-2

Keywords

Navigation