Skip to main content
Log in

Efficient HEVC steganography approach based on audio compression and encryption in QFFT domain for secure multimedia communication

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

High-Efficiency Video Coding (HEVC) is the most recent video codec standard. It is substantial to analyze the HEVC steganography process due to its practical and academic significance. Thus, a secure HEVC steganography approach is introduced in this paper to study the possibility of hiding an encrypted secret audio message within a cover compressed video frame in a secure and complicated manner. In the preliminary stage, the secret audio message is compressed utilizing the Discrete Cosine Transform (DCT) to achieve a high capacity performance for the HEVC steganography process. After that, the suggested approach implies two-cascaded encryption layers to encrypt the compressed secret message before embedding it within a cover HEVC frame. In the first encryption layer, a novel encryption technique based on random projection and Legendre sequence in the Discrete Wavelet Transform (DWT) domain is introduced to cipher the compressed secret audio message. In the second encryption layer, the yielded encrypted audio message is represented in a form of quaternion numbers using the Quaternion Fast Fourier Transform (QFFT) technique. Each cover HEVC frame is also represented in a quaternion form. In the suggested approach, some straightforward quaternion mathematical operations are employed on the encrypted secret message and the cover HEVC frames to represent them in a quaternion form in the frequency domain, then the encrypted secret audio message is hidden within the cover HEVC frame. At the receiver, the secret message can be retrieved and extracted from the cover HEVC frame utilizing the same methodology of the employed quaternion mathematical operations. The major contributions of the suggested HEVC steganography scheme are: (1) it allows hiding of massive amount of secret information within cover video frames, and (2) it has higher robustness against multimedia attacks and steganalysis contrasted to the conventional and literature schemes. Furthermore, the proposed approach is evaluated utilizing different assessment metrics like Feature Similarity Index Measure (FSIM), Peak Signal-to-Noise Ratio (PSNR), correlation coefficient, and Structural Similarity Index Measure (SSIM) to evaluate the efficiency of the stego HEVC frames compared to the original ones. The achieved outcomes demonstrate that the suggested steganography scheme is straightforward to implement, more secure, and robust in the presence of steganalysis multimedia attacks compared to the literature approaches.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18

Similar content being viewed by others

References

  1. Alyousuf FQA, Din R, Qasim AJ (2020) Analysis review on spatial and transform domain technique in digital steganography. Bulletin of Electrical Engineering and Informatics 9(2):573–581

    Google Scholar 

  2. Bahrami Z, Tab FA (2018) A new robust video watermarking algorithm based on SURF features and block classification. Multimed Tools Appl 77(1):327–345

    Article  Google Scholar 

  3. Balu S, Babu CNK, Amudha K (2019) Secure and efficient data transmission by video steganography in medical imaging system. Clust Comput 22(2):4057–4063

    Article  Google Scholar 

  4. Dasgupta K, Mondal JK, Dutta P (2013) Optimized video steganography using genetic algorithm (GA). Procedia Technology 10:131–137

    Article  Google Scholar 

  5. Dong, Y, Sun, T and Jiang, X (2018). A high capacity HEVC Steganographic algorithm using intra prediction modes in multi-sized prediction blocks. In international workshop on digital watermarking (pp. 233-247). Springer, Cham

  6. EL-Latif AAA, Abd-El-Atty B, Venegas-Andraca SE (2019) A novel image steganography technique based on quantum substitution boxes. Opt Laser Technol 116:92–102

    Article  Google Scholar 

  7. Galiano DR, Del Barrio AA, Botella G, Cuesta D (2020) Efficient embedding and retrieval of information for high-resolution videos coded with HEVC. Comput Electr Eng 81:106541

    Article  Google Scholar 

  8. Golomb, SW (1967). Shift register sequences. Aegean Park Press

  9. Hamilton, WR (1844). On a new species of imaginary quantities connected with a theory of quaternions. In proceedings of the Royal Irish Academy (Vol. 2, no. 424-234, pp. 4-1)

  10. Hashemzadeh M (2018) Hiding information in videos using motion clues of feature points. Comput Electr Eng 68:14–25

    Article  Google Scholar 

  11. HEVC Reference software (2014). http://hevc.kw.bbc.co.uk/trac/browser/jctvc-hm/tags

  12. Hitzer E (2016) The quaternion domain Fourier transform and its properties. AACA 26(3):969–984

    Article  MathSciNet  Google Scholar 

  13. Hussain M, Wahab AWA, Idris YIB, Ho AT, Jung KH (2018) Image steganography in spatial domain: A survey. Signal Process Image Commun 65:46–66

    Article  Google Scholar 

  14. Hussain, I, Zeng, J and Tan, S (2020). A survey on deep convolutional neural networks for image steganography and Steganalysis. KSII Trans Internet Inf Syst, 14(3)

  15. Junjie, W, Qian, M, Dongxia, M and Jun, Y (2009). Research for synchronic audio information hiding approach based on DWT domain. In 2009 international conference on E-business and information system security (pp. 1-5). IEEE

  16. Kadhim IJ, Premaratne P, Vial PJ, Halloran B (2019) Comprehensive survey of image steganography: techniques, evaluations, and trends in future research. Neurocomputing 335:299–326

    Article  Google Scholar 

  17. Kaur H, Khanna P (2015) Gaussian random projection based non-invertible cancelable biometric templates. Procedia Computer Science 54:661–670

    Article  Google Scholar 

  18. Khalil MI (2012) Applying quaternion Fourier transforms for enhancing color images. International Journal of Image, Graphics and Signal Processing 4(2):9

    Article  Google Scholar 

  19. Khalil MI (2017) Quaternion-based encryption/decryption of audio signal using digital image as a variable key. International Journal of Communication Networks and Information Security 9(2):216

    Google Scholar 

  20. Khalil MI (2018) Using quaternion Fourier transform in steganography systems. International Journal of Communication Networks and Information Security 10(2):425–431

    MathSciNet  Google Scholar 

  21. Khosravi MR, Samadi S (2019) Reliable data aggregation in internet of ViSAR vehicles using chained dual-phase adaptive interpolation and data embedding. IEEE Internet Things J 7(4):2603–2610

    Article  Google Scholar 

  22. Konyar, MZ, Akbulut, O and Öztürk, S (2020). Matrix encoding-based high-capacity and high-fidelity reversible data hiding in HEVC. Signal, Image and Video Processing, 1–9

  23. Kumar M, Yadav M (2014) Image steganography using frequency domain. Int J Sci Technol Res 3(9):226–230

    Google Scholar 

  24. Liu Z, Chen H, Sun S (2020) Research on covert communication security based on screen content coding. IEEE Access 8:22275–22280

    Article  Google Scholar 

  25. Liu Y, Liu S, Wang Y, Zhao H, Liu S (2019) Video steganography: A review. Neurocomputing 335:238–250

    Article  Google Scholar 

  26. Liu ZH, Luo D, Huang JW, Wang J, Qi CD (2017) Tamper recovery algorithm for digital speech signal based on DWT and DCT. Multimed Tools Appl 76(10):12481–12504

    Article  Google Scholar 

  27. Liu S, Xu D (2020) A robust steganography method for HEVC based on secret sharing. Cogn Syst Res 59:207–220

    Article  Google Scholar 

  28. Manisha S, Sharmila TS (2019) A two-level secure data hiding algorithm for video steganography. Multidim Syst Sign Process 30(2):529–542

    Article  Google Scholar 

  29. Mansouri J, Khademi M (2009) An adaptive scheme for compressed video steganography using temporal and spatial features of the video signal. Int J Imaging Syst Technol 19(4):306–315

    Article  Google Scholar 

  30. Mareen H, De Praeter J, Van Wallendael G, Lambert P (2018) A novel video watermarking approach based on implicit distortions. IEEE Trans Consum Electron 64(3):250–258

    Article  Google Scholar 

  31. Matoušek J (2008) On variants of the Johnson–Lindenstrauss lemma. Random Struct Algoritm 33(2):142–156

    Article  MathSciNet  Google Scholar 

  32. Mihara T (2015) Quantum steganography using prior entanglement. Phys Lett A 379(12–13):952–955

    Article  Google Scholar 

  33. Mstafa RJ, Elleithy KM, Abdelfattah E (2017) A robust and secure video steganography method in DWT-DCT domains based on multiple object tracking and ECC. IEEE Access 5:5354–5365

    Google Scholar 

  34. Müller K, Vetro A (2014) Common test conditions of 3DV core experiments. ITU-T SG 16:1–7

    Google Scholar 

  35. Nabil, M (2017). Random projection and its applications. arXiv preprint arXiv:1710.03163

  36. Noda, H, Furuta, T, Niimi, M and Kawaguchi, E (2004). Application of BPCS steganography to wavelet compressed video. In 2004 international conference on image processing, 2004. ICIP’04. (Vol. 4, pp. 2147-2150). IEEE

  37. Patel VM, Ratha NK, Chellappa R (2015) Cancelable biometrics: A review. IEEE Signal Process Mag 32(5):54–65

    Article  Google Scholar 

  38. Pillai JK, Patel VM, Chellappa R, Ratha NK (2011) Secure and robust iris recognition using random projections and sparse representations. IEEE Trans Pattern Anal Mach Intell 33(9):1877–1893

    Article  Google Scholar 

  39. Qu Z, Cheng Z, Liu W, Wang X (2019) A novel quantum image steganography algorithm based on exploiting modification direction. Multimed Tools Appl 78(7):7981–8001

    Article  Google Scholar 

  40. Rakhmawati L, Wirawan W, Suwadi S (2019) A recent survey of self-embedding fragile watermarking scheme for image authentication with recovery capability. EURASIP Journal on Image and Video Processing 2019(1):61

    Article  Google Scholar 

  41. Ramalingam M, Isa NAM (2015) Fast retrieval of hidden data using enhanced hidden Markov model in video steganography. Appl Soft Comput 34:744–757

    Article  Google Scholar 

  42. Rawat C, Meher S (2013) A hybrid image compression scheme using DCT and fractal image compression. Int Arab J Inf Technol 10(6):553–562

    Google Scholar 

  43. Sadat ES, Faez K, Saffari Pour M (2018) Entropy-based video steganalysis of motion vectors. Entropy 20(4):244

    Article  Google Scholar 

  44. Sathiyamurthi, P and Ramakrishnan, S (2020). Speech encryption algorithm using FFT and 3D-Lorenz–logistic chaotic map. Multimed Tools Appl, 1–19

  45. Sheela SJ, Suresh KV, Tandur D (2017) A novel audio cryptosystem using chaotic maps and DNA encoding. Journal of Computer Networks and Communications 2017:1–12

    Article  Google Scholar 

  46. Soliman NF, Mostfa Z, El-Samie FEA, Abdalla MI (2017) Performance enhancement of speaker identification systems using speech encryption and cancelable features. International Journal of Speech Technology 20(4):977–1004

    Article  Google Scholar 

  47. Soria-Lorente, A and Berres, S (2017). A secure steganographic algorithm based on frequency domain for the transmission of hidden information Security and Communication Networks, 2017

  48. Sushmitha, MC, Suresh, HN and Manikandan, J (2017). An approach towards novel video steganography for consumer electronics. In 2017 IEEE international conference on consumer electronics-Asia (ICCE-Asia) (pp. 72-76). IEEE

  49. Suterio, V, Scalassara, PR, Agulhari, CM and Durand, FR (2019). Minimization of percent root-Mean-Square difference in the generation of wavelets using genetic algorithm. In XXVI Brazilian congress on biomedical engineering (pp. 319–325). Springer, Singapore

  50. Tan, D, Lu, Y, Yan, X and Wang, X (2019). A simple review of audio steganography. In 2019 IEEE 3rd information technology, networking, electronic and automation control conference (ITNEC) (pp. 1409-1413). IEEE

  51. Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612

    Article  Google Scholar 

  52. Wang J, Jia X, Kang X, Shi YQ (2019) A cover selection HEVC video steganography based on intra prediction mode. IEEE Access 7:119393–119402

    Article  Google Scholar 

  53. Wang Q, Lin D, Guang X (2014) On the linear complexity of Legendre sequences over F q. IEICE Trans Fundam Electron Commun Comput Sci 97(7):1627–1630

    Article  Google Scholar 

  54. Xia Z, Wang X, Sun X, Wang B (2014) Steganalysis of least significant bit matching using multi-order differences. Security and Communication Networks 7(8):1283–1291

    Article  Google Scholar 

Download references

Acknowledgements

This research was funded by the Dean of Scientific Research at princess Nourah bint Abdulrahman University. Grant No. (39/S/250). And the authors would like to thank this support.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Walid El-Shafai.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Soliman, N.F., Khalil, M.I., Algarni, A.D. et al. Efficient HEVC steganography approach based on audio compression and encryption in QFFT domain for secure multimedia communication. Multimed Tools Appl 80, 4789–4823 (2021). https://doi.org/10.1007/s11042-020-09881-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-09881-8

Keywords

Navigation