Abstract
In the last few decades, information security has gained huge importance owing to the massive growth in digital communication; hence, driving steganography to the forefront for secure communication. Steganography is a practice of concealing information or message in covert communication which involves hiding the information in any multimedia file such as text, image, or video. Many contributions have been made in the domain of image steganography; however, due to the low embedding capacity and robustness of images; videos are gaining more attention of academic researchers. This paper aims to provide a qualitative as well as quantitative analysis of various video steganography techniques by highlighting their properties, challenges, pros, and cons. Moreover, different quality metrics for the evaluation of distinct steganography techniques have also been discussed. The paper also provides an overview of steganalysis attacks which are commonly employed to test the security of the steganography techniques. The experimental analysis of some of the prominent techniques using different quality metrics has also been done. This paper also presented a critical analysis driven from the literature and the experimental results. The primary objective of this paper is to help the beginners to understand the basic concepts of this research domain to initiate their research in this field. Further, the paper highlighted the real-life applications of video steganography and also suggested some future directions which require the attention of the research community.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Abbass AS, Soleit EA, Ghoniemy SA (2007) Blind video data hiding using integer wavelet transforms. Ubiquitous Comput Commun J 2(1):11–25
Abdolmohammadi M, Toroghi RM, Bastanfard A (2019) Video steganography using 3D convolutional neural networks. Paper presented at Mediterranean conference on pattern recognition and artificial intelligence. pp. 149–161
Abu-El-Haija S, Kothari N, Lee J, Natsev P, Toderici G, Varadarajan B, Vijayanarasimhan S (2016) Youtube-8m: a large-scale video classification benchmark. arXiv Prepr. arXiv1609.08675
Ahmed EAE, Soliman HH, Mostafa HE (2014) Information hiding in video files using frequency domain. Int J Sci Res 3(6):2431–2437
Al-Frajat AK, Jalab HA, Kasirun ZM, Zaidan AA, Zaidan BB (2010) Hiding data in video file: an overview. J Appl Sci 10:1644–1649
Aljahdali H, Townend P, Xu J (2013) Enhancing multi-tenancy security in the cloud IaaS model over public deployment. Paper presented at IEEE 7th International Symposium on in Service Oriented System Engineering (SOSE), 385–390
Aly HA (2011) Data hiding in motion vectors of compressed video based on their associated prediction error. IEEE Trans Inf Forensics Secur 6(1):14–18
Amirtharajan R, Rayappan JBB (2013) Steganography-time to time: a review. Res J Inform Technol 5:53–66
Asikuzzaman M, Pickering MR (2018) An overview of digital video watermarking. IEEE Trans Circuits Syst Video Technol 28(9):2131–2153
Babaguchi N, Cavallaro A, Chellappa R, Dufaux F, Wang L (2013) Guest editorial: special issue on intelligent video surveillance for public security and personal privacy. IEEE Trans Inf Forensics Secur 8(10):1559–1561
Balaji R, Naveen G (2011) Secure data transmission using video Steganography. Paper presented at IEEE International Conference in Electro/Information Technology (EIT). pp. 1–5
Balu S, Babu CNK, Amudha K (2018) Secure and efficient data transmission by video steganography in medical imaging system. Cluster Comput. 22(2):1–7
Bancroft FC, Clelland C (2001) DNA-based steganography. Google Patents, 2001
Bandyopadhyay SK, Bhattacharyya D, Ganguly D, Mukherjee S, Das P (2008) A tutorial review on steganography. Int Conf Contemp Comput 101:105–114
Bhattacharyya D, Bhaumik AK, Choi M, Kim TH (2010) Directed graph pattern synthesis in LSB technique on video steganography. Lect Notes Comput Sci 6059(1996):61–69
Bhautmage P, Jeyakumar A, Dahatonde A (2013) Advanced video steganography algorithm. Int J Eng Res Appl 3:1641–1644
Bo P, Jie Y (2018) A Reversible information hiding method based on HEVC. IFAC-PapersOnLine 51(17):238–243
Braun H, Lamothe E, Letort D (2018) Introduction: Les cultures ado, consommation et production. Publije, no. 1
Cao Y, Zhao X, Feng D, Sheng R (2011) Video steganography with perturbed motion estimation. In International workshop on information hiding. Springer, Berlin, Heidelberg, pp. 193–207
Cao Y, Zhao X, Feng D (2012) Video steganalysis exploiting motion vector reversion-based features. IEEE Signal Process Lett 19(1):35–38
Cao Y, Zhang H, Zhao X, Yu H (2015) Covert communication by compressed videos exploiting the uncertainty of motion estimation. IEEE Commun Lett 19(2):203–206
Cetin O, Ozcerit AT (2009) A new steganography algorithm based on color histograms for data embedding into raw video streams. Comput Secur 28(7):670–682
Chae JJ, Manjunath BS (1999) Data hiding in video. In: Proceedings of the 1999 International Conference on image processing. Vol. 1, pp. 311–315
Chandramouli R (2003) Steganography capacity: a steganalysis perspective. Proc SPIE. pp. 173–177
Chantrapornchai C, Churin K, Preechasuk J, Adulkasem S (2014) Video Steganography For Hiding Image With Wavelet Coefficients. Int J Multimed Ubiquitous Eng 9(6):385–396
Cheddad A, Condell J, Curran K, Mc Kevitt P (2010) Digital image steganography: survey and analysis of current methods. Signal Process 90(3):727–752
Chen S, Qu Z (2018) Novel quantum video steganography and authentication protocol with large payload. Int J Theor Phys 57(12):3689–3701
Choubey S, Bansal A (2014) Video steganography using neural network methods. Int J Res Advent Technol 2(2)
Cimpanu C (2016) Steganography is very popular with exploit kits all of a sudden [Online]. https://www.bleepingcomputer.com/news/security/steganography-is-very-popular-with-exploit-kits-all-of-a-sudden/. Accessed 13 Dec 2017
Dalal M, Juneja M (2016) Overview of video steganography in compressed domain. Int J Comput Technol Appl 9(10):1–11
Dalal M, Juneja M (2018) Video steganalysis to obstruct criminal activities for digital forensics: a survey. Int J Electron Secur Digit Forensics 10(4):338–355
Dalal M, Juneja M (2018) Video steganography techniques in spatial domain-a survey. In: Proceedings of the international conference on computing and communication systems, Springer, Singapore. pp. 705–711
Dalal M, Juneja M (2019) A robust and imperceptible steganography technique for SD and HD videos. Multimed Tools Appl 78(5):5769–5789
Dalal M, Juneja M (2020) Evaluation of orthogonal and biorthogonal wavelets for video steganography. Inf Secur J A Glob Perspect 29(1):1–11
Darmstaedter V, Delaigle J-F, Quisquater J-J, Macq B (1998) Low cost spatial watermarking. Comput Graph 22(4):417–424
Dasgupta K, Mandal JK, Dutta P (2012) Hash based least significant bit technique for video steganography (HLSB). Int J Secur Priv Trust Manag 1(2):1–11
Dasgupta K, Mondal JK, Dutta P (2013) Optimized video steganography using Genetic Algorithm (GA). Procedia Technol 10:131–137
Easttom C (2017) System forensics, investigation, and response. Jones & Bartlett Learning, Burlington
Engineer arrested for attempted theft of trade secrets, Dark Reading (2017) [Online]. https://www.darkreading.com/vulnerabilities---threats/engineer-arrested-for-attempted-theft-of-trade-secrets/d/d-id/1328635. Accessed 03 Feb 2019
Esen E, Alatan AA (2011) Robust video data hiding using forbidden zone data hiding and selective embedding. IEEE Trans Circuits Syst Video Technol 21(8):1130–1138
Fan M, Liu P, Wang H, Sun X (2016) Cross correlation feature mining for steganalysis of hash based least significant bit substitution video steganography. Telecommun Syst. 63:1–7
Faragallah OS (2013) Efficient video watermarking based on singular value decomposition in the discrete wavelet transform domain. AEU Int J Electron Commun 67(3):189–196
Ferreira AM (2015) An overview on hiding and detecting stego-data in video streams. [Online]. https://homepages.staff.os3.nl/~delaat/rp/2014-2015/p66/report.pdf. Accessed 12 Sep 2016
Firmansyah DM and, Ahmad T (2016) An improved neighbouring similarity method for video steganography. Paper presented at 4th international conference on cyber and IT service management, pp. 1–5
Forczmański P, Wekegrzyn M (2008) Virtual steganographic laboratory for digital images. Inf Syst Archit Technol Inf Syst Comput Commun Networks Wrocław Pol. pp. 163–174
Fridrich J, Goljan M (2002) Practical steganalysis of digital images: state of the art. Electronic Imaging 2002:1–13
Fridrich J, Goljan M, Soukal D (2003) Higher-order statistical steganalysis of palette images. Proc SPIE 5020:178–190
Fu P-W, Wu C-C, Cho Y-J (2017) What makes users share content on facebook? Compatibility among psychological incentive, social capital focus, and content type. Comput Human Behav 67:23–32
Furuta T, Noda H, Niimi M, Kawaguchi E (2003) Bit-plane decomposition steganography using wavelet compressed video. In: proceedings of the 2003 joint conference of the fourth international conference on information, communications and signal processing, 2003 and fourth pacific Rim conference on multimedia. Vol. 2. pp. 970–974
Galiano DR, Del Barrio AA, Botella G, Cuesta D (2020) Efficient embedding and retrieval of information for high-resolution videos coded with HEVC. Comput Electr Eng 81:106541
Gallagher S (2012) Steganography: how al-Qaeda hid secret documents in a porn video. [Online]. https://arstechnica.com/business/2012/05/steganography-how-al-qaeda-hid-secret-documents-in-a-porn-video/. Accessed 01 Jul 2016
Gross MJ (2011) Exclusive: operation shady RAT: unprecedented cyber-espionage campaign and intellectual-property bonanza. Vanity Fair, vol. 2
Gujjunoori S, Amberker BB (2013) DCT based reversible data embedding for MPEG-4 video using HVS characteristics. J Inf Secur Appl 18(4):157–166
Gupta H, Chaturvedi DS (2013) Video data hiding through LSB substitution technique. Res Inven Int J Eng Sci 2(10):32–39
Gupta H, Chaturvedi S (2014) Video steganography through LSB based hybrid approach. Int J Comput Sci Netw Secur 14(3):99–106
H.264/AVC. [Online]. https://en.wikipedia.org/wiki/H.264/MPEG-4_AVC. Accessed 21 Nov 2016
Hanafy AA, Salama GI, Mohasseb YZ (2005) A secure covert communication model based on video steganography. In: Proceedings of the IEEE MILCOM Military Communication Conference. pp. 1–6, 2008
Hashemzadeh M (2018) Hiding information in videos using motion clues of feature points. Comput Electr Eng 68:14–25
He Y, Yang G, Zhu N (2012) A real-time dual watermarking algorithm of H. 264/AVC video stream for video-on-demand service. AEU International J Electron Commun 66(4):305–312
Holmes B (2015) Steganography: how Antonopoulos hid a US$100m transaction in a picture of kittens. [Online]. https://bravenewcoin.com/news/steganography-how-antonopoulos-hid-a-us12m-transaction-in-a-picture-of-kittens/. Accessed 13 Dec 2017
Hu, SD KTU, “A novel video steganography based on non-uniform rectangular partition,” Proc. - 14th IEEE Int. Conf. Comput. Sci. Eng. CSE 2011 11th Int. Symp. Pervasive Syst. Algorithms, Networks, I-SPA 2011 10th IEEE Int. Conf. IUCC 2011, pp. 57–61, 2011.
Hussain M, Wahab AWA, Bin Idris YI, Ho ATS, Jung K-H (2018) Image steganography in spatial domain: a survey. Signal Process Image Commun 65:46–66
Idbeaa T, Samad SA, Husain H (2016) A secure and robust compressed domain video steganography for intra-and inter-frames using embedding-based byte differencing (EBBD) scheme. PLoS ONE 11(3):e0150732
Jiang B, Yang G, Chen W (2015) A CABAC based HEVC video steganography algorithm without bitrate increase. J Comput Inf Syst 11(6):2121–2130
Johnson NF, Jajodia S (1998) Exploring steganography: seeing the unseen. IEEE Comput 31(2):26–34
Johnson NF, Duric Z, Jajodia S (2001) Information hiding: steganography and watermarking-attacks and countermeasures: steganography and watermarking: attacks and countermeasures. Springer, Berlin
Jue W, Min-qing Z, S. Juan-li S (2011) Video steganography using motion vector components. In: proceedings of the IEEE 3rd international conference on communication software and networks (ICCSN), pp. 500–503
Kamil S, Ayob M, Abdullah SNHS, Ahmad Z (2018) Optimized data hiding in complemented or non-complemented form in video steganography. Cyber Resilience Conf 2018:1–4
Kapoor V, Mirza A (2015) An enhanced LSB based video steganographic system for secure and efficient data transmission. Int J Comput Appl 121(10):38–42
Kaur R (2016) Kaur S (2016) XOR-EDGE based video steganography and testing against Chi-square steganalysis. Int J Image Graph Signal Process 8(9):31–39
Kaur M, Kaur A (2014) Improved security mechanism of text in video using steganographic technique. Int J Adv Res Comput Sci Softw Eng. vol. 2, no. 10
Kaur K, Kaur B (2018) DWT-LSB approach for video steganography using artificial neural network. Int. Adv. Res. J. Sci. Eng. Technol, IARJSET
Kelash HM, Wahab OFA, Elshakankiry OA, El-sayed HS (2014) Utilization of steganographic techniques in video sequences. Int J Comput Netw Technol 24(1):17–24
Kelley J (2001) Terrorist instructions hidden online, [Online]. http://usatoday30.usatoday.com/tech/news/2001-02-05-binladen-side.htm. Accessed 05 Jul 2016
Ker T, Andrew D, Bas, Bohme P, Cogranne R, Craver R, Filler S, Fridrich T, Pevny J (2013) Moving steganography and steganalysis from the laboratory into the real world. Proceedings of the first ACM workshop on Information hiding and multimedia security. pp. 45–58
Kessler GC (2004) Steganography: implications for the prosecutor and computer forensics examiner. American Prosecution Reasearch Institute
Khare R, Mishra R, Arya I (2014) Video steganography using LSB technique by neural network. Int Conf Comput Intell Commun Netw 2014:898–902
Khosla S, Kaur P (2014) Secure data hiding technique using video steganography and watermarking. Int J Comput Appl 95(20):7–12
Kolakalur A, Kagalidis I, Vuksanovic B, Iacsit M (2016) Wavelet based color video steganography. Int J Eng Technol 8(3):165
Konyar MZ, Akbulut O, Öztürk S (2020) Matrix encoding-based high-capacity and high-fidelity reversible data hiding in HEVC. Signal Image Video Process 14:1–9
Kopeytsev V (2020) Steganography in attacks on industrial enterprises, Kaspersky ICS CERT, [Online]. https://ics-cert.kaspersky.com/reports/2020/06/17/steganography-in-attacks-on-industrial-enterprises/. Accessed 07 Jul 2020
Krenn R (2004) Steganography and steganalysis. Retrieved Sept 8:1–9
Kulkarni A, Goldman J, Nabholz B, Eyre W (2009) Detection of steganography-producing software artifacts on crime-related seized computers. J Digit Forensics Secur Law 4(2):5–26
Kumar P, Singh K (2018) An improved data-hiding approach using skin-tone detection for video steganography. Multimed Tools Appl 77(18):24247–24268
Le Gall D (1991) MPEG: a video compression standard for multimedia applications. Commun ACM 34(4):46–58
Lie W-N, Lin T-I, Lin C-W (2006) Enhancing video error resilience by using data-embedding techniques. IEEE Trans Circuits Syst Video Technol 16(2):300–308
Lin TJ, Chung KL, Chang PC, Huang YH, Liao HYM, Fang CY (2013) An improved DCT-based perturbation scheme for high capacity data hiding in H.264/AVC intra frames. J Syst Softw 86(3):604–614
Liu S, Xu D (2020) A robust steganography method for HEVC based on secret sharing. Cogn Syst Res 59:207–220
Liu B, Liu F, Lu B, Luo X (2006) Real-time steganography in compressed video. Paper presented at international workshop on multimedia content representation, classification and security, pp. 43–48
Liu B, Liu F, Ni D (2006) Adaptive compressed video steganography in the VLC-domain. Paper presented at 2006 IET international conference on wireless, mobile and multimedia networks. pp. 1–4
Liu B, Liu F, Yang C, Sun Y (2008) Secure steganography in compressed video bitstreams. Paper presented at 3rd international conference on ARES Availability, Reliability and Security. pp. 1382–1387
Liu Y, Hu M, Ma X, Zhao H (2015) A new robust data hiding method for H. 264/AVC without intra-frame distortion drift. Neurocomputing 151:1076–1085
Liu Y, Ju L, Hu M, Zhao H, Jia S, Jia Z (2016) A new data hiding method for H.264 based on secret sharing. Neurocomputing 188:113–119
Liu Y, Liu S, Zhao H, Liu S (2019) A new data hiding method for H. 265/HEVC video streams without intra-frame distortion drift. Multimed Tools Appl 78(6):6459–6486
Lu Y, Lu C, Qi M (2010) An effective video steganography method for biometric identification. Lect Notes Comput Sci 6059:469–479
Luo W, Huang F, Huang J (2010) Edge adaptive image steganography based on LSB matching revisited. IEEE Trans Inf forensics Secur 5(2):201–214
Luo T, Jiang G, Yu M, Xu H (2016) Asymmetric self-recovery oriented stereo image watermarking method for three dimensional video system. Multimed Syst 22(5):641–655
Luo T, Jiang G, Yu M, Xu H, Gao W (2017) Sparse recovery based reversible data hiding method using the human visual system. Multimed Tools Appl 77(15):1–24
Luo T, Zuo L, Jiang G, Gao W, Xu H, Jiang Q (2020) Security of MVD-based 3D video in 3D-HEVC using data hiding and encryption. J Real-Time Image Process 17(4):773–785
Ma X, Li Z, Tu H, Zhang B (2010) A data hiding algorithm for h.264/AVC video streams without intra-frame distortion drift. IEEE Trans Circuits Syst Video Technol 20(10):1320–1330
Mandal JK (2016) Handbook of research on natural computing for optimization problems. IGI Global, Pennsylvania
Manikandan G, Bala Krishnan R, Rajesh Kumar N, Sairam N, Raajan NR (2017) A steganographic approach for realizing medical data privacy in a distributed environment. Biomed Res 28(3)
Manisha S, Sharmila TS (2019) A two-level secure data hiding algorithm for video steganography. Multidimens Syst Signal Process 30(2):529–542
Mazurczyk W, Caviglione L (2015) Information hiding as a challenge for malware detection. arXiv Prepr. arXiv1504.04867
Mazurczyk W, Wendzel S, Zander S, Houmansadr A, Szczypiorski K (2016) Information hiding in communication networks: fundamentals, mechanisms, applications, and countermeasures, vol 7. Wiley, New Jersey
Mielikainen J (2006) LSB matching revisited. IEEE Signal Process Lett 13(5):285–287
Mollin RA (2000) An introduction to cryptography. CRC Press, Florida
Moon SK, Raut RD (2013) “Analysis of secured video steganography using computer forensics technique for enhance data security”, 2013 IEEE 2nd Int. Conf Image Inf Process IEEE ICIIP 2013:660–665
Mstafa RJ, Elleithy KM (2014) A highly secure video steganography using Hamming code (7, 4). IEEE Long Isl Syst Appl Technol Conf LISAT 2014:2014
Mstafa RJ, Elleithy KM (2015a) “A high payload video steganography algorithm in DWT domain based on BCH codes (15, 11)”, in. Wireless Telecommun Symp 2015:1–8
Mstafa RJ, Elleithy KM (2015) A new video steganography algorithm based on the multiple object tracking and Hamming codes. Paper presented at IEEE 14th International Conference on Machine Learning and Applications (ICMLA), pp. 335–340
Mstafa RJ, Elleithy KM (2016) A video steganography algorithm based on Kanade-Lucas-Tomasi tracking algorithm and error correcting codes. Multimed Tools Appl 75(17):10311–10333
Mstafa RJ, Elleithy KM (2016a) An ECC/DCT-based robust video steganography algorithm for secure data communication. J Cyber Secur Mobil 5(3):167–194
Mstafa RJ, Elleithy KM (2017) Compressed and raw video steganography techniques: a comprehensive survey and analysis. Multimed Tools Appl 76(20):21749–21786
Mstafa RJ, K. M. Elleithy KM (2016) A DCT-based robust video steganographic method using BCH error correcting codes. Paper presented at 2016 IEEE Long Island Systems, Applications and Technology Conference (LISAT), pp. 1–6
Mstafa RJ, Elleithy KM, Abdelfattah E (2017a) A robust and secure video steganography method in DWT-DCT domains based on multiple object tracking and ECC. IEEE Access 5:5354–5365
Mstafa RJ, Elleithy KM, Abdelfattah E (2017) Video steganography techniques: taxonomy, challenges, and future directions. Paper presented at systems, applications and technology conference (LISAT) IEEE Long Island. pp. 1–6
Mumthas S, Lijiya A (2017) Transform domain video steganography using RSA, random DNA encryption and Huffman encoding. Procedia Comput Sci 115:660–666
Mstafa RJ, Ellleithy KM (2015) An efficient video steganography algorithm based on BCH codes. Paper presented at Northeast Sect Conf Am Soc Eng Educ, no. May 2015
Narayanan KL, Prabakaran G, Bhavani R (2012) A high capacity video steganography based on integer wavelet transform. J Comput Appl 5(EICA2012-4):358–365
Neuner S, Voyiatzis AG, Schmiedecker M, Brunthaler S, Katzenbeisser S, Weippl ER (2016) Time is on my side: steganography in filesystem metadata. Digit Investig 18:S76–S86
Newman LH (2018) Mysterious ‘MuslimCrypt’ app helps jihadists send covert messages, Wired, [Online]. https://www.wired.com/story/muslimcrypt-steganography/. Accessed 03 Feb 2019
News B (2016) FBI allegations against ‘Russian spies’ in US. [Online]. http://www.bbc.com/news/10442869. Accessed 16 Aug 2016
Nichols S (2019) A picture tells a 1,000 words. Pixels pwn up to 5 million nerds: Crims use steganography to stash bad code in ads, The Register [Online]. https://www.theregister.co.uk/2019/01/24/mac_steganography_malware/. Accessed 03 May 2020
Nie Q, Weng J, Xu X, Feng B (2018) Defining embedding distortion for intra prediction mode-based video steganography. Comput Mater Contin 55:59–70
Noda H, Furuta T, Niimi M, Kawaguchi E (2004) Application of BPCS steganography to wavelet compressed video. In proceedings of the International conference on image processing. ICIP. Vol. 4, no. 1, pp. 2147–2150
Ohm J-R, Sullivan GJ, Schwarz H, Tan TK, Wiegand T (2012) Comparison of the coding efficiency of video coding standards-including high efficiency video coding (HEVC). IEEE Trans circuits Syst video Technol 22(12):1669–1684
Ostermann J, Bormans J, List P, Marpe D, Narroschke M, Pereira F, Stockhammer T, Wedi T (2004) Video coding with H. 264/AVC: tools, performance, and complexity. IEEE Circuits Syst Mag 4(1):7–28
Pan F, Xiang L, Yang X, Guo Y (2010) Video steganography using motion vector and linear block codes. Paper presented at IEEE international conference on software engineering and service sciences. No. 60842006, pp. 592–595
Papadopoulos NA, Psannis KE (2018) Sequential Multiple LSB methods and real-time data hiding: variations for Visual Cryptography ciphers. J Real-Time Image Process 14(1):75–86
Patel K, Rora KK, Singh K, Verma S (2013) Lazy wavelet transform based steganography in video. In: Proceedings of 2013 International Conference on Communication Systems and Network Technologies (CSNT). pp. 497–500
Paul R, Acharya AK, Yadav VK, Batham S (2013) Hiding large amount of data using a new approach of video steganography,” in Confluence 2013: The Next Generation Information Technology Summit (4th International Conference), 2013, pp. 337–343.
Perumal K, Muthusamy S, Gengavel G (2018) Sparse data encoder and decoder to improve security in video steganography. Concurr Comput Pract Exp 31:1–7
Petitcolas FAP, Anderson RJ, Kuhn MG (1999) Information hiding-a survey. Proc IEEE 87(7):1062–1078
Pevny T, Fridrich J (2008) Benchmarking for steganography. Paper presented at international workshop on information hiding. pp. 251–267
Pfitzmann B (1996) Information hiding terminology-results of an informal plenary meeting and additional proposals. In: Proceedings of the first international workshop on information hiding. pp. 347–350
Pilania U, Gupta P (2020) “Analysis and implementation of IWT-SVD scheme for video steganography”, in micro-electronics and telecommunication engineering. Springer, Singapore
Pinson MH, Wolf S (2004) A new standardized method for objectively measuring video quality. IEEE Trans Broadcast 50(3):312–322
Qu Z, Chen S, Ji S (2017) A novel quantum video steganography protocol with large payload based on MCQI quantum video. Int J Theor Phys 56(11):3543–3561
Rabie T, Baziyad M (2019) The Pixogram: addressing high payload demands for video steganography. IEEE Access 7:21948–21962
Raggo MT, Hosmer C (2012) Data hiding: exposing concealed data in multimedia, operating systems, mobile devices and network protocols. Newnes, Oxford
Rajalakshmi K, Mahesh K (2018) ZLBM: zero level binary mapping technique for video security. Multimed Tools Appl 77(11):13225–13247
Ramalingam M (2011) Stego machine–video steganography using modified LSB algorithm. World Acad Sci Eng Technol 74:502–505
Ramalingam M, Isa NAM (2014) Video steganography based on integer Haar wavelet transforms for secured data transfer. Indian J Sci Technol 7(7):897–904
Ramalingam M, Isa NAM (2015) A steganography approach over video images to improve security. Indian J Sci Technol 8(1):79–86
Ramalingam M, Isa NAM (2016) A data-hiding technique using scene-change detection for video steganography. Comput Electr Eng 54:423–434
Ramalingam M, Ashidi N, Isa M (2015) Fast retrieval of hidden data using enhanced hidden Markov model in video steganography. Appl Soft Comput J 34:744–757
Rashmi N, Jyothi K (2018) An improved method for reversible data hiding steganography combined with cryptography. In: Proceedings of the 2nd international conference on inventive systems and control (ICISC), pp. 81–84
Reisslein M (2012) Video trace library. Arizona State University. http//trace. eas. asu. edu. Accessed 2012
Ren Y, Zhai L, Wang L, Zhu T (2014) Video steganalysis based on subtractive probability of optimal matching feature. In: Proceedings of the 2nd ACM workshop on Information hiding and multimedia security. pp. 83–90
Rezagholipour K, Eshghi M (2016) Video steganography algorithm based on motion vector of moving object. Paper presented at eighth international conference on information and knowledge technology (IKT), pp. 183–187
Richardson IE (2004) H.264 and MPEG-4 video compression: video coding for next-generation multimedia. John Wiley & Sons, New Jersey
Robie DL, Mersereau RM (2001) Video error correction using steganography. In: Proceedings of the International Conference on Image Processing (Cat. No.01CH37205), vol. 1, pp. 164–173
Roque JJ, Minguet JM (2009) SLSB: improving the Steganographic Algorithm LSB. In WOSIS, 2009, pp. 57–66
Rowland CH (1997) Covert channels in the TCP/IP protocol suite. First Monday, vol. 2, no. 5
“S-tools.” [Online]. Available: http://www.jjtc.com/stegdoc/sec316.html. Accessed: 26 Aug 2016
Sabeti V, Samavi S, Mahdavi M, Shirani S (2007) Steganalysis of pixel-value differencing steganographic method. Paper presented at IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, pp. 292–295
Sadat ES, Faez K, Saffari Pour M (2018) Entropy-based video steganalysis of motion vectors. Entropy 20(4):244–257
Sadek MM, Khalifa AS, Mostafa MGM (2015) Video steganography: a comprehensive review. Multimed Tools Appl 74(17):7063–7094
Sadek MM, Khalifa AS, Mostafa MGM (2017) Robust video steganography algorithm using adaptive skin-tone detection. Multimed Tools Appl 76(2):3065–3085
Santhosh B, Meghana NM (2016) A robust, privacy preserving secret data concealing embedding technique into encrypted video stream. Information systems design and intelligent application, Springer, pp. 645–655
Shanableh T (2012) Matrix encoding for data hiding using multilayer video coding and transcoding solutions. Signal Process Image Commun 27(9):1025–1034
Shanableh T (2012) Data hiding in MPEG video files using multivariate regression and flexible macroblock ordering. IEEE Trans Inf Forensics Secur 7(2):455–464
Shannon CE (2001) A mathematical theory of communication. ACM SIGMOBILE Mob Comput Commun Rev 5(1):3–55
Sheri S, Traoudas B (2017) Video brand storytelling, the rise of content marketing: a qualitative study exploring the antecedents of brand perceptions
Sherley AP, Amritha PP (2010) A compressed video steganography using TPVD. Int J Database Manag Syst 2(3):67–80
Shimanovsky B, Feng J, M. Potkonjak M (2002) Hiding data in DNA. Paper presented at International Workshop on Information Hiding, pp. 373–386
Shou-dao W, Chuang-bai X, Yu L (2009) A High Bitrate Information Hiding Algorithm for Video in Video. World Acad Sci Eng Technol 35:413–418
Sikora T (1997) MPEG digital video-coding standards. IEEE Signal Process Mag 14(5):82–100
Solutions N (2005) Invisible secrets 4. Invis, Secrets
Song G, Li Z, Zhao J, Tu H, Cheng J (2014) A video steganography algorithm for MVC without distortion drift. Paper presented at international conference on audio, language and image processing (ICALIP), pp. 738–742
Song G, Li Z, Zhao J, Hu J, Tu H (2015) A reversible video steganography algorithm for MVC based on motion vector. Multimed Tools Appl 74(11):3759–3782
Stanescu D, Stratulat M, Ciubotaru B, Chiciudean D, Cioarga R, Micea M (2007) Embedding data in video stream using steganography. Paper presented at 4th international symposium on applied computational intelligence and informatics. pp. 241–244
Steganography — the new intelligence threat EWS 2004 subject area intelligence marine corps war college , Marine Corps University , Marine Corps, 2004
Stütz T, Autrusseau F, Uhl A (2013) Inter-frame H. 264/CAVLC structure-preserving substitution watermarking. University of Salzburg
Su PC, Lu MT, Wu CY (2013) A practical design of high-volume steganography in digital video files. Multimed Tools Appl 66(2):247–266
Sudeepa KB, Raju K, R. K. HS, Aithal G, (2016) A new approach for video steganography based on randomization and parallelization. Procedia Comput Sci 78:483–490
Sullivan GJ, Ohm J-R, Han W-J, Wiegand T et al (2012) Overview of the high efficiency video coding (HEVC) standard. IEEE Trans circuits Syst video Technol 22(12):1649–1668
Sur A, Krishna SVM, Sahu N, Rana S (2015) Detection of motion vector based video steganography. Multimed Tools Appl 74(23):10479–10494
Suresh M, Sam IS (2020) Optimized interesting region identification for video steganography using Fractional Grey Wolf Optimization along with multi-objective cost function. J King Saud Univ Inf Sci
Suttichaiya A, Sombatkiripaiboon Y, Imtongkhua P, Poonriboon C, So-In C, Horkaew P (2017) Video steganography with LSB color detection. J Telecommun Electron Comput Eng 9(2–2):23–28
Swain G (2019) Two new steganography techniques based on quotient value differencing with addition-subtraction logic and PVD with modulus function. Optik (Stuttg) 180:807–823
Swanson MD, Zhu B, Tewfik AH (1997) Data hiding for video-in-video. Proceedings of the International Conference on Image Processing. Vol. 2, pp. 676–679
Tasdemir K, Kurugollu F, Sezer S (2013) Video steganalysis of LSB based motion vector steganography. Paper presented at 4th European workshop on visual information processing (EUVIP). pp. 260–264
Tasdemir K, Kurugollu F, Sezer S (2016) Spatio-temporal rich model-based video steganalysis on cross sections of motion vector planes. IEEE Trans Image Process 25(7):3316–3328
Thomas TL (2003) Al Qaeda and the internet: the danger of" cyberplanning". Parameters 33(1):112–123
Torkaman MRN, Nikfard P, Kazazi NS, Abbasy MR, Tabatabaiee SF (2011) Improving hybrid cryptosystems with DNA steganography, Paper presented at international conference on digital enterprise and information systems. pp. 42–52
Tudor PN (1995) MPEG-2 video compression. Electron Commun Eng J 7(6):257–264
Video HAVCC, Tew Y, Wong K (2014) An overview of information hiding in H. 264/AVC compressed video. Circuits Syst Video Technol IEEE Trans 24(2):305–319
Wahab OFA, Badawy MB, Elshakankiry OA, El-sayed HS (2015) Utilizations of reversible lossless data hiding techniques in video sequences. Int J Comput Netw Technol 3(1)
Wang Z, Lu L, Bovik AC (2004) Video quality assessment based on structural distortion measurement. Signal Process Image Commun 19(2):121–132
Wang K, Zhao H, Wang H (2014) Video steganalysis against motion vector-based steganography by adding or subtracting one motion vector value. IEEE Trans Inf Forensics Secur 9(5):741–751
Wang K, Han J, Wang H (2014) Digital video steganalysis by subtractive prediction error adjacency matrix. Multimed Tools Appl 72(1):313–330
Wang P, Cao Y, Zhao X (2017) Segmentation based video steganalysis to detect motion vector modification. Secur Commun Netw 2017:1–12
Wang Y, Cao Y, Zhao X, Xu Z, Zhu M (2018) Maintaining rate-distortion optimization for IPM-based video steganography by constructing isolated channels in HEVC. In: Proceedings of the 6th ACM workshop on information hiding and multimedia security. pp. 97–107
Wang J, Jia X, Kang X, Shi Y-Q (2019) A cover selection HEVC video steganography based on intra prediction mode. IEEE Access 7:119393–119402
Warfare C, Wang H, Wang S (2004) Cyber warfare: steganography vs. steganalysis. Commun ACM 47(10):76–82
Westfeld A, Pfitzmann A (2000) Attacks on steganographic Systems. Inf Hiding 1768:1–16
Wiegand T, Sullivan GJ, Bjontegaard G, Luthra A (2003) Overview of the H. 264/AVC video coding standard. IEEE Trans circuits Syst video Technol 13(7):560–576
Wong K, Tanaka K, Takagi K, Nakajima Y (2009) Complete video quality-preserving data hiding. IEEE Trans Circuits Syst Video Technol 19(10):1499–1512
Xu C, Ping X (2007) A steganographic algorithm in uncompressed video sequence based on difference between adjacent frames. In Proceedings of the 4th International Conference on Image Graph ICIG 2007. pp. 297–302
Xu C, Ping X, Zhang T (2006) Steganography in compressed video stream. Paper presented at First International Conference on innovative computing, information and control, ICICIC. vol. 1, pp. 269–272
Xu X, Dong J, Tan T (2012) Universal spatial feature set for video steganalysis. In: Proceedings of the 19th IEEE international conference on image processing. pp. 245–248
Xu D, Wang R, Shi YQ (2014) Data hiding in encrypted H.264/AVC video streams by codeword substitution. IEEE Trans Inf Forensics Secur 9(4):596–606
Xu D, Wang R, Shi YQ (2016) An improved scheme for data hiding in encrypted H.264/AVC videos. J Vis Commun Image Represent 36:229–242
Xue Y, Zhou J, Zeng H, Zhong P, Wen J (2019) An adaptive steganographic scheme for H. 264/AVC video with distortion optimization. Signal Process Image Commun 76:22–30
Yadav P, Mishra N, Sharma S (2013) A secure video steganography with encryption based on LSB technique. Paper presented at IEEE International Conference on Computational Intelligence and Computing Research (ICCIC) pp. 1–5
Yang M, Bourbakis N (2005) A high bitrate information hiding algorithm for digital video content under H.264/AVC compression. Midwest Symp Circuits Syst 2005:935–938
Yang Y, Li Z, Xie W, Zhang Z (2019) High capacity and multilevel information hiding algorithm based on pu partition modes for HEVC videos. Multimed Tools Appl 78(7):8423–8446
Yao Y, Zhang W, Yu N, Zhao X (2015) Defining embedding distortion for motion vector-based video steganography. Multimed Tools Appl 74(24):11163–11186
Yao Y, Zhang W, Yu N (2016) Inter-frame distortion drift analysis for reversible data hiding in encrypted H.264/AVC video bitstreams. Signal Processing 128:531–545
Ye H, Zhang W, Yao Y, Kong C, Huang H, Yu N, “Motion vector-based video steganalysis using spatial-temporal correlation. In: Proceedings of the 6th international congress on image and signal processing (CISP). Vol. 1. pp. 148–153
Yeh H-L, Gue S-T, Tsai P, Shih W-K (2014) Reversible video data hiding using neighbouring similarity. IET Signal Process 8(6):579–587
Zhai L, Wang L, Ren Y (2017) Combined and calibrated features for steganalysis of motion vector-based steganography in H. 264/AVC. In: proceedings of the 5th ACM workshop on information hiding and multimedia security. pp. 135–146
Zhang W, Cheung S.-CS, Chen M (2005) Hiding privacy information in video surveillance system. Paper presented at IEEE international conference on image processing. Vol. 3. p II–868
Zhang H, Cao Y, Zhao X (2015) Motion vector-based video steganography with preserved local optimality. Multimed Tools Appl 89:1–17
Zhang Y, Zhang M, Niu K, Liu J (2015) Video steganography algorithm based on trailing coefficients. Paper presented at international conference on intelligent networking and collaborative systems (INCOS), pp. 360–364
Zhao Y, Zhang H, Cao Y, Wang P, Zhao X (2015) Video steganalysis based on intra prediction mode calibration. International Workshop on Digital Watermarking. pp. 119–133
Acknowledgements
This research work is supported by Technical Education Quality Improvement Project III (TEQIP III) of MHRD, Government of India assisted by World Bank under Grant Number P154523 and sanctioned to UIET, Panjab University, Chandigarh (India).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Dalal, M., Juneja, M. A survey on information hiding using video steganography. Artif Intell Rev 54, 5831–5895 (2021). https://doi.org/10.1007/s10462-021-09968-0
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10462-021-09968-0