Abstract
High-Efficiency Video Coding (HEVC) is the most recent video codec standard. It is substantial to analyze the HEVC steganography process due to its practical and academic significance. Thus, a secure HEVC steganography approach is introduced in this paper to study the possibility of hiding an encrypted secret audio message within a cover compressed video frame in a secure and complicated manner. In the preliminary stage, the secret audio message is compressed utilizing the Discrete Cosine Transform (DCT) to achieve a high capacity performance for the HEVC steganography process. After that, the suggested approach implies two-cascaded encryption layers to encrypt the compressed secret message before embedding it within a cover HEVC frame. In the first encryption layer, a novel encryption technique based on random projection and Legendre sequence in the Discrete Wavelet Transform (DWT) domain is introduced to cipher the compressed secret audio message. In the second encryption layer, the yielded encrypted audio message is represented in a form of quaternion numbers using the Quaternion Fast Fourier Transform (QFFT) technique. Each cover HEVC frame is also represented in a quaternion form. In the suggested approach, some straightforward quaternion mathematical operations are employed on the encrypted secret message and the cover HEVC frames to represent them in a quaternion form in the frequency domain, then the encrypted secret audio message is hidden within the cover HEVC frame. At the receiver, the secret message can be retrieved and extracted from the cover HEVC frame utilizing the same methodology of the employed quaternion mathematical operations. The major contributions of the suggested HEVC steganography scheme are: (1) it allows hiding of massive amount of secret information within cover video frames, and (2) it has higher robustness against multimedia attacks and steganalysis contrasted to the conventional and literature schemes. Furthermore, the proposed approach is evaluated utilizing different assessment metrics like Feature Similarity Index Measure (FSIM), Peak Signal-to-Noise Ratio (PSNR), correlation coefficient, and Structural Similarity Index Measure (SSIM) to evaluate the efficiency of the stego HEVC frames compared to the original ones. The achieved outcomes demonstrate that the suggested steganography scheme is straightforward to implement, more secure, and robust in the presence of steganalysis multimedia attacks compared to the literature approaches.
Similar content being viewed by others
References
Alyousuf FQA, Din R, Qasim AJ (2020) Analysis review on spatial and transform domain technique in digital steganography. Bulletin of Electrical Engineering and Informatics 9(2):573–581
Bahrami Z, Tab FA (2018) A new robust video watermarking algorithm based on SURF features and block classification. Multimed Tools Appl 77(1):327–345
Balu S, Babu CNK, Amudha K (2019) Secure and efficient data transmission by video steganography in medical imaging system. Clust Comput 22(2):4057–4063
Dasgupta K, Mondal JK, Dutta P (2013) Optimized video steganography using genetic algorithm (GA). Procedia Technology 10:131–137
Dong, Y, Sun, T and Jiang, X (2018). A high capacity HEVC Steganographic algorithm using intra prediction modes in multi-sized prediction blocks. In international workshop on digital watermarking (pp. 233-247). Springer, Cham
EL-Latif AAA, Abd-El-Atty B, Venegas-Andraca SE (2019) A novel image steganography technique based on quantum substitution boxes. Opt Laser Technol 116:92–102
Galiano DR, Del Barrio AA, Botella G, Cuesta D (2020) Efficient embedding and retrieval of information for high-resolution videos coded with HEVC. Comput Electr Eng 81:106541
Golomb, SW (1967). Shift register sequences. Aegean Park Press
Hamilton, WR (1844). On a new species of imaginary quantities connected with a theory of quaternions. In proceedings of the Royal Irish Academy (Vol. 2, no. 424-234, pp. 4-1)
Hashemzadeh M (2018) Hiding information in videos using motion clues of feature points. Comput Electr Eng 68:14–25
HEVC Reference software (2014). http://hevc.kw.bbc.co.uk/trac/browser/jctvc-hm/tags
Hitzer E (2016) The quaternion domain Fourier transform and its properties. AACA 26(3):969–984
Hussain M, Wahab AWA, Idris YIB, Ho AT, Jung KH (2018) Image steganography in spatial domain: A survey. Signal Process Image Commun 65:46–66
Hussain, I, Zeng, J and Tan, S (2020). A survey on deep convolutional neural networks for image steganography and Steganalysis. KSII Trans Internet Inf Syst, 14(3)
Junjie, W, Qian, M, Dongxia, M and Jun, Y (2009). Research for synchronic audio information hiding approach based on DWT domain. In 2009 international conference on E-business and information system security (pp. 1-5). IEEE
Kadhim IJ, Premaratne P, Vial PJ, Halloran B (2019) Comprehensive survey of image steganography: techniques, evaluations, and trends in future research. Neurocomputing 335:299–326
Kaur H, Khanna P (2015) Gaussian random projection based non-invertible cancelable biometric templates. Procedia Computer Science 54:661–670
Khalil MI (2012) Applying quaternion Fourier transforms for enhancing color images. International Journal of Image, Graphics and Signal Processing 4(2):9
Khalil MI (2017) Quaternion-based encryption/decryption of audio signal using digital image as a variable key. International Journal of Communication Networks and Information Security 9(2):216
Khalil MI (2018) Using quaternion Fourier transform in steganography systems. International Journal of Communication Networks and Information Security 10(2):425–431
Khosravi MR, Samadi S (2019) Reliable data aggregation in internet of ViSAR vehicles using chained dual-phase adaptive interpolation and data embedding. IEEE Internet Things J 7(4):2603–2610
Konyar, MZ, Akbulut, O and Öztürk, S (2020). Matrix encoding-based high-capacity and high-fidelity reversible data hiding in HEVC. Signal, Image and Video Processing, 1–9
Kumar M, Yadav M (2014) Image steganography using frequency domain. Int J Sci Technol Res 3(9):226–230
Liu Z, Chen H, Sun S (2020) Research on covert communication security based on screen content coding. IEEE Access 8:22275–22280
Liu Y, Liu S, Wang Y, Zhao H, Liu S (2019) Video steganography: A review. Neurocomputing 335:238–250
Liu ZH, Luo D, Huang JW, Wang J, Qi CD (2017) Tamper recovery algorithm for digital speech signal based on DWT and DCT. Multimed Tools Appl 76(10):12481–12504
Liu S, Xu D (2020) A robust steganography method for HEVC based on secret sharing. Cogn Syst Res 59:207–220
Manisha S, Sharmila TS (2019) A two-level secure data hiding algorithm for video steganography. Multidim Syst Sign Process 30(2):529–542
Mansouri J, Khademi M (2009) An adaptive scheme for compressed video steganography using temporal and spatial features of the video signal. Int J Imaging Syst Technol 19(4):306–315
Mareen H, De Praeter J, Van Wallendael G, Lambert P (2018) A novel video watermarking approach based on implicit distortions. IEEE Trans Consum Electron 64(3):250–258
Matoušek J (2008) On variants of the Johnson–Lindenstrauss lemma. Random Struct Algoritm 33(2):142–156
Mihara T (2015) Quantum steganography using prior entanglement. Phys Lett A 379(12–13):952–955
Mstafa RJ, Elleithy KM, Abdelfattah E (2017) A robust and secure video steganography method in DWT-DCT domains based on multiple object tracking and ECC. IEEE Access 5:5354–5365
Müller K, Vetro A (2014) Common test conditions of 3DV core experiments. ITU-T SG 16:1–7
Nabil, M (2017). Random projection and its applications. arXiv preprint arXiv:1710.03163
Noda, H, Furuta, T, Niimi, M and Kawaguchi, E (2004). Application of BPCS steganography to wavelet compressed video. In 2004 international conference on image processing, 2004. ICIP’04. (Vol. 4, pp. 2147-2150). IEEE
Patel VM, Ratha NK, Chellappa R (2015) Cancelable biometrics: A review. IEEE Signal Process Mag 32(5):54–65
Pillai JK, Patel VM, Chellappa R, Ratha NK (2011) Secure and robust iris recognition using random projections and sparse representations. IEEE Trans Pattern Anal Mach Intell 33(9):1877–1893
Qu Z, Cheng Z, Liu W, Wang X (2019) A novel quantum image steganography algorithm based on exploiting modification direction. Multimed Tools Appl 78(7):7981–8001
Rakhmawati L, Wirawan W, Suwadi S (2019) A recent survey of self-embedding fragile watermarking scheme for image authentication with recovery capability. EURASIP Journal on Image and Video Processing 2019(1):61
Ramalingam M, Isa NAM (2015) Fast retrieval of hidden data using enhanced hidden Markov model in video steganography. Appl Soft Comput 34:744–757
Rawat C, Meher S (2013) A hybrid image compression scheme using DCT and fractal image compression. Int Arab J Inf Technol 10(6):553–562
Sadat ES, Faez K, Saffari Pour M (2018) Entropy-based video steganalysis of motion vectors. Entropy 20(4):244
Sathiyamurthi, P and Ramakrishnan, S (2020). Speech encryption algorithm using FFT and 3D-Lorenz–logistic chaotic map. Multimed Tools Appl, 1–19
Sheela SJ, Suresh KV, Tandur D (2017) A novel audio cryptosystem using chaotic maps and DNA encoding. Journal of Computer Networks and Communications 2017:1–12
Soliman NF, Mostfa Z, El-Samie FEA, Abdalla MI (2017) Performance enhancement of speaker identification systems using speech encryption and cancelable features. International Journal of Speech Technology 20(4):977–1004
Soria-Lorente, A and Berres, S (2017). A secure steganographic algorithm based on frequency domain for the transmission of hidden information Security and Communication Networks, 2017
Sushmitha, MC, Suresh, HN and Manikandan, J (2017). An approach towards novel video steganography for consumer electronics. In 2017 IEEE international conference on consumer electronics-Asia (ICCE-Asia) (pp. 72-76). IEEE
Suterio, V, Scalassara, PR, Agulhari, CM and Durand, FR (2019). Minimization of percent root-Mean-Square difference in the generation of wavelets using genetic algorithm. In XXVI Brazilian congress on biomedical engineering (pp. 319–325). Springer, Singapore
Tan, D, Lu, Y, Yan, X and Wang, X (2019). A simple review of audio steganography. In 2019 IEEE 3rd information technology, networking, electronic and automation control conference (ITNEC) (pp. 1409-1413). IEEE
Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612
Wang J, Jia X, Kang X, Shi YQ (2019) A cover selection HEVC video steganography based on intra prediction mode. IEEE Access 7:119393–119402
Wang Q, Lin D, Guang X (2014) On the linear complexity of Legendre sequences over F q. IEICE Trans Fundam Electron Commun Comput Sci 97(7):1627–1630
Xia Z, Wang X, Sun X, Wang B (2014) Steganalysis of least significant bit matching using multi-order differences. Security and Communication Networks 7(8):1283–1291
Acknowledgements
This research was funded by the Dean of Scientific Research at princess Nourah bint Abdulrahman University. Grant No. (39/S/250). And the authors would like to thank this support.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Soliman, N.F., Khalil, M.I., Algarni, A.D. et al. Efficient HEVC steganography approach based on audio compression and encryption in QFFT domain for secure multimedia communication. Multimed Tools Appl 80, 4789–4823 (2021). https://doi.org/10.1007/s11042-020-09881-8
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-020-09881-8