Nothing Special   »   [go: up one dir, main page]

Skip to main content

Advertisement

Log in

A survey on information hiding using video steganography

  • Published:
Artificial Intelligence Review Aims and scope Submit manuscript

Abstract

In the last few decades, information security has gained huge importance owing to the massive growth in digital communication; hence, driving steganography to the forefront for secure communication. Steganography is a practice of concealing information or message in covert communication which involves hiding the information in any multimedia file such as text, image, or video. Many contributions have been made in the domain of image steganography; however, due to the low embedding capacity and robustness of images; videos are gaining more attention of academic researchers. This paper aims to provide a qualitative as well as quantitative analysis of various video steganography techniques by highlighting their properties, challenges, pros, and cons. Moreover, different quality metrics for the evaluation of distinct steganography techniques have also been discussed. The paper also provides an overview of steganalysis attacks which are commonly employed to test the security of the steganography techniques. The experimental analysis of some of the prominent techniques using different quality metrics has also been done. This paper also presented a critical analysis driven from the literature and the experimental results. The primary objective of this paper is to help the beginners to understand the basic concepts of this research domain to initiate their research in this field. Further, the paper highlighted the real-life applications of video steganography and also suggested some future directions which require the attention of the research community.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig.17
Fig. 18
Fig. 19
Fig. 20

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

References

  • Abbass AS, Soleit EA, Ghoniemy SA (2007) Blind video data hiding using integer wavelet transforms. Ubiquitous Comput Commun J 2(1):11–25

    Google Scholar 

  • Abdolmohammadi M, Toroghi RM, Bastanfard A (2019) Video steganography using 3D convolutional neural networks. Paper presented at Mediterranean conference on pattern recognition and artificial intelligence. pp. 149–161

  • Abu-El-Haija S, Kothari N, Lee J, Natsev P, Toderici G, Varadarajan B, Vijayanarasimhan S (2016) Youtube-8m: a large-scale video classification benchmark. arXiv Prepr. arXiv1609.08675

  • Ahmed EAE, Soliman HH, Mostafa HE (2014) Information hiding in video files using frequency domain. Int J Sci Res 3(6):2431–2437

    Google Scholar 

  • Al-Frajat AK, Jalab HA, Kasirun ZM, Zaidan AA, Zaidan BB (2010) Hiding data in video file: an overview. J Appl Sci 10:1644–1649

    Article  Google Scholar 

  • Aljahdali H, Townend P, Xu J (2013) Enhancing multi-tenancy security in the cloud IaaS model over public deployment. Paper presented at IEEE 7th International Symposium on in Service Oriented System Engineering (SOSE), 385–390

  • Aly HA (2011) Data hiding in motion vectors of compressed video based on their associated prediction error. IEEE Trans Inf Forensics Secur 6(1):14–18

    Article  Google Scholar 

  • Amirtharajan R, Rayappan JBB (2013) Steganography-time to time: a review. Res J Inform Technol 5:53–66

    Article  Google Scholar 

  • Asikuzzaman M, Pickering MR (2018) An overview of digital video watermarking. IEEE Trans Circuits Syst Video Technol 28(9):2131–2153

    Article  Google Scholar 

  • Babaguchi N, Cavallaro A, Chellappa R, Dufaux F, Wang L (2013) Guest editorial: special issue on intelligent video surveillance for public security and personal privacy. IEEE Trans Inf Forensics Secur 8(10):1559–1561

    Article  Google Scholar 

  • Balaji R, Naveen G (2011) Secure data transmission using video Steganography. Paper presented at IEEE International Conference in Electro/Information Technology (EIT). pp. 1–5

  • Balu S, Babu CNK, Amudha K (2018) Secure and efficient data transmission by video steganography in medical imaging system. Cluster Comput. 22(2):1–7

    Google Scholar 

  • Bancroft FC, Clelland C (2001) DNA-based steganography. Google Patents, 2001

  • Bandyopadhyay SK, Bhattacharyya D, Ganguly D, Mukherjee S, Das P (2008) A tutorial review on steganography. Int Conf Contemp Comput 101:105–114

    Google Scholar 

  • Bhattacharyya D, Bhaumik AK, Choi M, Kim TH (2010) Directed graph pattern synthesis in LSB technique on video steganography. Lect Notes Comput Sci 6059(1996):61–69

    Article  Google Scholar 

  • Bhautmage P, Jeyakumar A, Dahatonde A (2013) Advanced video steganography algorithm. Int J Eng Res Appl 3:1641–1644

    Google Scholar 

  • Bo P, Jie Y (2018) A Reversible information hiding method based on HEVC. IFAC-PapersOnLine 51(17):238–243

    Article  Google Scholar 

  • Braun H, Lamothe E, Letort D (2018) Introduction: Les cultures ado, consommation et production. Publije, no. 1

  • Cao Y, Zhao X, Feng D, Sheng R (2011) Video steganography with perturbed motion estimation. In International workshop on information hiding. Springer, Berlin, Heidelberg, pp. 193–207

  • Cao Y, Zhao X, Feng D (2012) Video steganalysis exploiting motion vector reversion-based features. IEEE Signal Process Lett 19(1):35–38

    Article  Google Scholar 

  • Cao Y, Zhang H, Zhao X, Yu H (2015) Covert communication by compressed videos exploiting the uncertainty of motion estimation. IEEE Commun Lett 19(2):203–206

    Article  Google Scholar 

  • Cetin O, Ozcerit AT (2009) A new steganography algorithm based on color histograms for data embedding into raw video streams. Comput Secur 28(7):670–682

    Article  Google Scholar 

  • Chae JJ, Manjunath BS (1999) Data hiding in video. In: Proceedings of the 1999 International Conference on image processing. Vol. 1, pp. 311–315

  • Chandramouli R (2003) Steganography capacity: a steganalysis perspective. Proc SPIE. pp. 173–177

  • Chantrapornchai C, Churin K, Preechasuk J, Adulkasem S (2014) Video Steganography For Hiding Image With Wavelet Coefficients. Int J Multimed Ubiquitous Eng 9(6):385–396

    Article  Google Scholar 

  • Cheddad A, Condell J, Curran K, Mc Kevitt P (2010) Digital image steganography: survey and analysis of current methods. Signal Process 90(3):727–752

    Article  MATH  Google Scholar 

  • Chen S, Qu Z (2018) Novel quantum video steganography and authentication protocol with large payload. Int J Theor Phys 57(12):3689–3701

    Article  MATH  Google Scholar 

  • Choubey S, Bansal A (2014) Video steganography using neural network methods. Int J Res Advent Technol 2(2)

  • Cimpanu C (2016) Steganography is very popular with exploit kits all of a sudden [Online]. https://www.bleepingcomputer.com/news/security/steganography-is-very-popular-with-exploit-kits-all-of-a-sudden/. Accessed 13 Dec 2017

  • Dalal M, Juneja M (2016) Overview of video steganography in compressed domain. Int J Comput Technol Appl 9(10):1–11

    Google Scholar 

  • Dalal M, Juneja M (2018) Video steganalysis to obstruct criminal activities for digital forensics: a survey. Int J Electron Secur Digit Forensics 10(4):338–355

    Article  Google Scholar 

  • Dalal M, Juneja M (2018) Video steganography techniques in spatial domain-a survey. In: Proceedings of the international conference on computing and communication systems, Springer, Singapore. pp. 705–711

  • Dalal M, Juneja M (2019) A robust and imperceptible steganography technique for SD and HD videos. Multimed Tools Appl 78(5):5769–5789

    Article  Google Scholar 

  • Dalal M, Juneja M (2020) Evaluation of orthogonal and biorthogonal wavelets for video steganography. Inf Secur J A Glob Perspect 29(1):1–11

    Google Scholar 

  • Darmstaedter V, Delaigle J-F, Quisquater J-J, Macq B (1998) Low cost spatial watermarking. Comput Graph 22(4):417–424

    Article  Google Scholar 

  • Dasgupta K, Mandal JK, Dutta P (2012) Hash based least significant bit technique for video steganography (HLSB). Int J Secur Priv Trust Manag 1(2):1–11

    Google Scholar 

  • Dasgupta K, Mondal JK, Dutta P (2013) Optimized video steganography using Genetic Algorithm (GA). Procedia Technol 10:131–137

    Article  Google Scholar 

  • Easttom C (2017) System forensics, investigation, and response. Jones & Bartlett Learning, Burlington

    Google Scholar 

  • Engineer arrested for attempted theft of trade secrets, Dark Reading (2017) [Online]. https://www.darkreading.com/vulnerabilities---threats/engineer-arrested-for-attempted-theft-of-trade-secrets/d/d-id/1328635. Accessed 03 Feb 2019

  • Esen E, Alatan AA (2011) Robust video data hiding using forbidden zone data hiding and selective embedding. IEEE Trans Circuits Syst Video Technol 21(8):1130–1138

    Article  Google Scholar 

  • Fan M, Liu P, Wang H, Sun X (2016) Cross correlation feature mining for steganalysis of hash based least significant bit substitution video steganography. Telecommun Syst. 63:1–7

    Article  Google Scholar 

  • Faragallah OS (2013) Efficient video watermarking based on singular value decomposition in the discrete wavelet transform domain. AEU Int J Electron Commun 67(3):189–196

    Article  Google Scholar 

  • Ferreira AM (2015) An overview on hiding and detecting stego-data in video streams. [Online]. https://homepages.staff.os3.nl/~delaat/rp/2014-2015/p66/report.pdf. Accessed 12 Sep 2016

  • Firmansyah DM and, Ahmad T (2016) An improved neighbouring similarity method for video steganography. Paper presented at 4th international conference on cyber and IT service management, pp. 1–5

  • Forczmański P, Wekegrzyn M (2008) Virtual steganographic laboratory for digital images. Inf Syst Archit Technol Inf Syst Comput Commun Networks Wrocław Pol. pp. 163–174

  • Fridrich J, Goljan M (2002) Practical steganalysis of digital images: state of the art. Electronic Imaging 2002:1–13

    Google Scholar 

  • Fridrich J, Goljan M, Soukal D (2003) Higher-order statistical steganalysis of palette images. Proc SPIE 5020:178–190

    Article  Google Scholar 

  • Fu P-W, Wu C-C, Cho Y-J (2017) What makes users share content on facebook? Compatibility among psychological incentive, social capital focus, and content type. Comput Human Behav 67:23–32

    Article  Google Scholar 

  • Furuta T, Noda H, Niimi M, Kawaguchi E (2003) Bit-plane decomposition steganography using wavelet compressed video. In: proceedings of the 2003 joint conference of the fourth international conference on information, communications and signal processing, 2003 and fourth pacific Rim conference on multimedia. Vol. 2. pp. 970–974

  • Galiano DR, Del Barrio AA, Botella G, Cuesta D (2020) Efficient embedding and retrieval of information for high-resolution videos coded with HEVC. Comput Electr Eng 81:106541

    Article  Google Scholar 

  • Gallagher S (2012) Steganography: how al-Qaeda hid secret documents in a porn video. [Online]. https://arstechnica.com/business/2012/05/steganography-how-al-qaeda-hid-secret-documents-in-a-porn-video/. Accessed 01 Jul 2016

  • Gross MJ (2011) Exclusive: operation shady RAT: unprecedented cyber-espionage campaign and intellectual-property bonanza. Vanity Fair, vol. 2

  • Gujjunoori S, Amberker BB (2013) DCT based reversible data embedding for MPEG-4 video using HVS characteristics. J Inf Secur Appl 18(4):157–166

    Google Scholar 

  • Gupta H, Chaturvedi DS (2013) Video data hiding through LSB substitution technique. Res Inven Int J Eng Sci 2(10):32–39

    Google Scholar 

  • Gupta H, Chaturvedi S (2014) Video steganography through LSB based hybrid approach. Int J Comput Sci Netw Secur 14(3):99–106

    Google Scholar 

  • H.264/AVC. [Online]. https://en.wikipedia.org/wiki/H.264/MPEG-4_AVC. Accessed 21 Nov 2016

  • Hanafy AA, Salama GI, Mohasseb YZ (2005) A secure covert communication model based on video steganography. In: Proceedings of the IEEE MILCOM Military Communication Conference. pp. 1–6, 2008

  • Hashemzadeh M (2018) Hiding information in videos using motion clues of feature points. Comput Electr Eng 68:14–25

    Article  Google Scholar 

  • He Y, Yang G, Zhu N (2012) A real-time dual watermarking algorithm of H. 264/AVC video stream for video-on-demand service. AEU International J Electron Commun 66(4):305–312

    Article  Google Scholar 

  • Holmes B (2015) Steganography: how Antonopoulos hid a US$100m transaction in a picture of kittens. [Online]. https://bravenewcoin.com/news/steganography-how-antonopoulos-hid-a-us12m-transaction-in-a-picture-of-kittens/. Accessed 13 Dec 2017

  • Hu, SD KTU, “A novel video steganography based on non-uniform rectangular partition,” Proc. - 14th IEEE Int. Conf. Comput. Sci. Eng. CSE 2011 11th Int. Symp. Pervasive Syst. Algorithms, Networks, I-SPA 2011 10th IEEE Int. Conf. IUCC 2011, pp. 57–61, 2011.

  • Hussain M, Wahab AWA, Bin Idris YI, Ho ATS, Jung K-H (2018) Image steganography in spatial domain: a survey. Signal Process Image Commun 65:46–66

  • Idbeaa T, Samad SA, Husain H (2016) A secure and robust compressed domain video steganography for intra-and inter-frames using embedding-based byte differencing (EBBD) scheme. PLoS ONE 11(3):e0150732

    Article  Google Scholar 

  • Jiang B, Yang G, Chen W (2015) A CABAC based HEVC video steganography algorithm without bitrate increase. J Comput Inf Syst 11(6):2121–2130

    Google Scholar 

  • Johnson NF, Jajodia S (1998) Exploring steganography: seeing the unseen. IEEE Comput 31(2):26–34

    Article  Google Scholar 

  • Johnson NF, Duric Z, Jajodia S (2001) Information hiding: steganography and watermarking-attacks and countermeasures: steganography and watermarking: attacks and countermeasures. Springer, Berlin

    Book  Google Scholar 

  • Jue W, Min-qing Z, S. Juan-li S (2011) Video steganography using motion vector components. In: proceedings of the IEEE 3rd international conference on communication software and networks (ICCSN), pp. 500–503

  • Kamil S, Ayob M, Abdullah SNHS, Ahmad Z (2018) Optimized data hiding in complemented or non-complemented form in video steganography. Cyber Resilience Conf 2018:1–4

    Google Scholar 

  • Kapoor V, Mirza A (2015) An enhanced LSB based video steganographic system for secure and efficient data transmission. Int J Comput Appl 121(10):38–42

    Google Scholar 

  • Kaur R (2016) Kaur S (2016) XOR-EDGE based video steganography and testing against Chi-square steganalysis. Int J Image Graph Signal Process 8(9):31–39

    Article  Google Scholar 

  • Kaur M, Kaur A (2014) Improved security mechanism of text in video using steganographic technique. Int J Adv Res Comput Sci Softw Eng. vol. 2, no. 10

  • Kaur K, Kaur B (2018) DWT-LSB approach for video steganography using artificial neural network. Int. Adv. Res. J. Sci. Eng. Technol, IARJSET

    Google Scholar 

  • Kelash HM, Wahab OFA, Elshakankiry OA, El-sayed HS (2014) Utilization of steganographic techniques in video sequences. Int J Comput Netw Technol 24(1):17–24

    Article  Google Scholar 

  • Kelley J (2001) Terrorist instructions hidden online, [Online]. http://usatoday30.usatoday.com/tech/news/2001-02-05-binladen-side.htm. Accessed 05 Jul 2016

  • Ker T, Andrew D, Bas, Bohme P, Cogranne R, Craver R, Filler S, Fridrich T, Pevny J (2013) Moving steganography and steganalysis from the laboratory into the real world. Proceedings of the first ACM workshop on Information hiding and multimedia security. pp. 45–58

  • Kessler GC (2004) Steganography: implications for the prosecutor and computer forensics examiner. American Prosecution Reasearch Institute

  • Khare R, Mishra R, Arya I (2014) Video steganography using LSB technique by neural network. Int Conf Comput Intell Commun Netw 2014:898–902

    Google Scholar 

  • Khosla S, Kaur P (2014) Secure data hiding technique using video steganography and watermarking. Int J Comput Appl 95(20):7–12

    Google Scholar 

  • Kolakalur A, Kagalidis I, Vuksanovic B, Iacsit M (2016) Wavelet based color video steganography. Int J Eng Technol 8(3):165

    Article  Google Scholar 

  • Konyar MZ, Akbulut O, Öztürk S (2020) Matrix encoding-based high-capacity and high-fidelity reversible data hiding in HEVC. Signal Image Video Process 14:1–9

    Article  Google Scholar 

  • Kopeytsev V (2020) Steganography in attacks on industrial enterprises, Kaspersky ICS CERT, [Online]. https://ics-cert.kaspersky.com/reports/2020/06/17/steganography-in-attacks-on-industrial-enterprises/. Accessed 07 Jul 2020

  • Krenn R (2004) Steganography and steganalysis. Retrieved Sept 8:1–9

    Google Scholar 

  • Kulkarni A, Goldman J, Nabholz B, Eyre W (2009) Detection of steganography-producing software artifacts on crime-related seized computers. J Digit Forensics Secur Law 4(2):5–26

    Google Scholar 

  • Kumar P, Singh K (2018) An improved data-hiding approach using skin-tone detection for video steganography. Multimed Tools Appl 77(18):24247–24268

    Article  Google Scholar 

  • Le Gall D (1991) MPEG: a video compression standard for multimedia applications. Commun ACM 34(4):46–58

    Article  Google Scholar 

  • Lie W-N, Lin T-I, Lin C-W (2006) Enhancing video error resilience by using data-embedding techniques. IEEE Trans Circuits Syst Video Technol 16(2):300–308

    Article  Google Scholar 

  • Lin TJ, Chung KL, Chang PC, Huang YH, Liao HYM, Fang CY (2013) An improved DCT-based perturbation scheme for high capacity data hiding in H.264/AVC intra frames. J Syst Softw 86(3):604–614

    Article  Google Scholar 

  • Liu S, Xu D (2020) A robust steganography method for HEVC based on secret sharing. Cogn Syst Res 59:207–220

    Article  Google Scholar 

  • Liu B, Liu F, Lu B, Luo X (2006) Real-time steganography in compressed video. Paper presented at international workshop on multimedia content representation, classification and security, pp. 43–48

  • Liu B, Liu F, Ni D (2006) Adaptive compressed video steganography in the VLC-domain. Paper presented at 2006 IET international conference on wireless, mobile and multimedia networks. pp. 1–4

  • Liu B, Liu F, Yang C, Sun Y (2008) Secure steganography in compressed video bitstreams. Paper presented at 3rd international conference on ARES Availability, Reliability and Security. pp. 1382–1387

  • Liu Y, Hu M, Ma X, Zhao H (2015) A new robust data hiding method for H. 264/AVC without intra-frame distortion drift. Neurocomputing 151:1076–1085

    Article  Google Scholar 

  • Liu Y, Ju L, Hu M, Zhao H, Jia S, Jia Z (2016) A new data hiding method for H.264 based on secret sharing. Neurocomputing 188:113–119

    Article  Google Scholar 

  • Liu Y, Liu S, Zhao H, Liu S (2019) A new data hiding method for H. 265/HEVC video streams without intra-frame distortion drift. Multimed Tools Appl 78(6):6459–6486

  • Lu Y, Lu C, Qi M (2010) An effective video steganography method for biometric identification. Lect Notes Comput Sci 6059:469–479

    Article  Google Scholar 

  • Luo W, Huang F, Huang J (2010) Edge adaptive image steganography based on LSB matching revisited. IEEE Trans Inf forensics Secur 5(2):201–214

    Article  Google Scholar 

  • Luo T, Jiang G, Yu M, Xu H (2016) Asymmetric self-recovery oriented stereo image watermarking method for three dimensional video system. Multimed Syst 22(5):641–655

    Article  Google Scholar 

  • Luo T, Jiang G, Yu M, Xu H, Gao W (2017) Sparse recovery based reversible data hiding method using the human visual system. Multimed Tools Appl 77(15):1–24

    Google Scholar 

  • Luo T, Zuo L, Jiang G, Gao W, Xu H, Jiang Q (2020) Security of MVD-based 3D video in 3D-HEVC using data hiding and encryption. J Real-Time Image Process 17(4):773–785

  • Ma X, Li Z, Tu H, Zhang B (2010) A data hiding algorithm for h.264/AVC video streams without intra-frame distortion drift. IEEE Trans Circuits Syst Video Technol 20(10):1320–1330

    Article  Google Scholar 

  • Mandal JK (2016) Handbook of research on natural computing for optimization problems. IGI Global, Pennsylvania

    Book  Google Scholar 

  • Manikandan G, Bala Krishnan R, Rajesh Kumar N, Sairam N, Raajan NR (2017) A steganographic approach for realizing medical data privacy in a distributed environment. Biomed Res 28(3)

  • Manisha S, Sharmila TS (2019) A two-level secure data hiding algorithm for video steganography. Multidimens Syst Signal Process 30(2):529–542

    Article  MATH  Google Scholar 

  • Mazurczyk W, Caviglione L (2015) Information hiding as a challenge for malware detection. arXiv Prepr. arXiv1504.04867

  • Mazurczyk W, Wendzel S, Zander S, Houmansadr A, Szczypiorski K (2016) Information hiding in communication networks: fundamentals, mechanisms, applications, and countermeasures, vol 7. Wiley, New Jersey

    Google Scholar 

  • Mielikainen J (2006) LSB matching revisited. IEEE Signal Process Lett 13(5):285–287

    Article  Google Scholar 

  • Mollin RA (2000) An introduction to cryptography. CRC Press, Florida

    MATH  Google Scholar 

  • Moon SK, Raut RD (2013) “Analysis of secured video steganography using computer forensics technique for enhance data security”, 2013 IEEE 2nd Int. Conf Image Inf Process IEEE ICIIP 2013:660–665

    Google Scholar 

  • Mstafa RJ, Elleithy KM (2014) A highly secure video steganography using Hamming code (7, 4). IEEE Long Isl Syst Appl Technol Conf LISAT 2014:2014

    Google Scholar 

  • Mstafa RJ, Elleithy KM (2015a) “A high payload video steganography algorithm in DWT domain based on BCH codes (15, 11)”, in. Wireless Telecommun Symp 2015:1–8

    Google Scholar 

  • Mstafa RJ, Elleithy KM (2015) A new video steganography algorithm based on the multiple object tracking and Hamming codes. Paper presented at IEEE 14th International Conference on Machine Learning and Applications (ICMLA), pp. 335–340

  • Mstafa RJ, Elleithy KM (2016) A video steganography algorithm based on Kanade-Lucas-Tomasi tracking algorithm and error correcting codes. Multimed Tools Appl 75(17):10311–10333

    Article  Google Scholar 

  • Mstafa RJ, Elleithy KM (2016a) An ECC/DCT-based robust video steganography algorithm for secure data communication. J Cyber Secur Mobil 5(3):167–194

    Article  Google Scholar 

  • Mstafa RJ, Elleithy KM (2017) Compressed and raw video steganography techniques: a comprehensive survey and analysis. Multimed Tools Appl 76(20):21749–21786

    Article  Google Scholar 

  • Mstafa RJ, K. M. Elleithy KM (2016) A DCT-based robust video steganographic method using BCH error correcting codes. Paper presented at 2016 IEEE Long Island Systems, Applications and Technology Conference (LISAT), pp. 1–6

  • Mstafa RJ, Elleithy KM, Abdelfattah E (2017a) A robust and secure video steganography method in DWT-DCT domains based on multiple object tracking and ECC. IEEE Access 5:5354–5365

    Google Scholar 

  • Mstafa RJ, Elleithy KM, Abdelfattah E (2017) Video steganography techniques: taxonomy, challenges, and future directions. Paper presented at systems, applications and technology conference (LISAT) IEEE Long Island. pp. 1–6

  • Mumthas S, Lijiya A (2017) Transform domain video steganography using RSA, random DNA encryption and Huffman encoding. Procedia Comput Sci 115:660–666

    Article  Google Scholar 

  • Mstafa RJ, Ellleithy KM (2015) An efficient video steganography algorithm based on BCH codes. Paper presented at Northeast Sect Conf Am Soc Eng Educ, no. May 2015

  • Narayanan KL, Prabakaran G, Bhavani R (2012) A high capacity video steganography based on integer wavelet transform. J Comput Appl 5(EICA2012-4):358–365

    Google Scholar 

  • Neuner S, Voyiatzis AG, Schmiedecker M, Brunthaler S, Katzenbeisser S, Weippl ER (2016) Time is on my side: steganography in filesystem metadata. Digit Investig 18:S76–S86

    Article  Google Scholar 

  • Newman LH (2018) Mysterious ‘MuslimCrypt’ app helps jihadists send covert messages, Wired, [Online]. https://www.wired.com/story/muslimcrypt-steganography/. Accessed 03 Feb 2019

  • News B (2016) FBI allegations against ‘Russian spies’ in US. [Online]. http://www.bbc.com/news/10442869. Accessed 16 Aug 2016

  • Nichols S (2019) A picture tells a 1,000 words. Pixels pwn up to 5 million nerds: Crims use steganography to stash bad code in ads, The Register [Online]. https://www.theregister.co.uk/2019/01/24/mac_steganography_malware/. Accessed 03 May 2020

  • Nie Q, Weng J, Xu X, Feng B (2018) Defining embedding distortion for intra prediction mode-based video steganography. Comput Mater Contin 55:59–70

    Google Scholar 

  • Noda H, Furuta T, Niimi M, Kawaguchi E (2004) Application of BPCS steganography to wavelet compressed video. In proceedings of the International conference on image processing. ICIP. Vol. 4, no. 1, pp. 2147–2150

  • Ohm J-R, Sullivan GJ, Schwarz H, Tan TK, Wiegand T (2012) Comparison of the coding efficiency of video coding standards-including high efficiency video coding (HEVC). IEEE Trans circuits Syst video Technol 22(12):1669–1684

    Article  Google Scholar 

  • Ostermann J, Bormans J, List P, Marpe D, Narroschke M, Pereira F, Stockhammer T, Wedi T (2004) Video coding with H. 264/AVC: tools, performance, and complexity. IEEE Circuits Syst Mag 4(1):7–28

    Article  Google Scholar 

  • Pan F, Xiang L, Yang X, Guo Y (2010) Video steganography using motion vector and linear block codes. Paper presented at IEEE international conference on software engineering and service sciences. No. 60842006, pp. 592–595

  • Papadopoulos NA, Psannis KE (2018) Sequential Multiple LSB methods and real-time data hiding: variations for Visual Cryptography ciphers. J Real-Time Image Process 14(1):75–86

    Article  Google Scholar 

  • Patel K, Rora KK, Singh K, Verma S (2013) Lazy wavelet transform based steganography in video. In: Proceedings of 2013 International Conference on Communication Systems and Network Technologies (CSNT). pp. 497–500

  • Paul R, Acharya AK, Yadav VK, Batham S (2013) Hiding large amount of data using a new approach of video steganography,” in Confluence 2013: The Next Generation Information Technology Summit (4th International Conference), 2013, pp. 337–343.

  • Perumal K, Muthusamy S, Gengavel G (2018) Sparse data encoder and decoder to improve security in video steganography. Concurr Comput Pract Exp 31:1–7

    Google Scholar 

  • Petitcolas FAP, Anderson RJ, Kuhn MG (1999) Information hiding-a survey. Proc IEEE 87(7):1062–1078

  • Pevny T, Fridrich J (2008) Benchmarking for steganography. Paper presented at international workshop on information hiding. pp. 251–267

  • Pfitzmann B (1996) Information hiding terminology-results of an informal plenary meeting and additional proposals. In: Proceedings of the first international workshop on information hiding. pp. 347–350

  • Pilania U, Gupta P (2020) “Analysis and implementation of IWT-SVD scheme for video steganography”, in micro-electronics and telecommunication engineering. Springer, Singapore

    Google Scholar 

  • Pinson MH, Wolf S (2004) A new standardized method for objectively measuring video quality. IEEE Trans Broadcast 50(3):312–322

    Article  Google Scholar 

  • Qu Z, Chen S, Ji S (2017) A novel quantum video steganography protocol with large payload based on MCQI quantum video. Int J Theor Phys 56(11):3543–3561

    Article  MATH  Google Scholar 

  • Rabie T, Baziyad M (2019) The Pixogram: addressing high payload demands for video steganography. IEEE Access 7:21948–21962

    Article  Google Scholar 

  • Raggo MT, Hosmer C (2012) Data hiding: exposing concealed data in multimedia, operating systems, mobile devices and network protocols. Newnes, Oxford

    Google Scholar 

  • Rajalakshmi K, Mahesh K (2018) ZLBM: zero level binary mapping technique for video security. Multimed Tools Appl 77(11):13225–13247

    Article  Google Scholar 

  • Ramalingam M (2011) Stego machine–video steganography using modified LSB algorithm. World Acad Sci Eng Technol 74:502–505

    Google Scholar 

  • Ramalingam M, Isa NAM (2014) Video steganography based on integer Haar wavelet transforms for secured data transfer. Indian J Sci Technol 7(7):897–904

    Article  Google Scholar 

  • Ramalingam M, Isa NAM (2015) A steganography approach over video images to improve security. Indian J Sci Technol 8(1):79–86

    Article  Google Scholar 

  • Ramalingam M, Isa NAM (2016) A data-hiding technique using scene-change detection for video steganography. Comput Electr Eng 54:423–434

    Article  Google Scholar 

  • Ramalingam M, Ashidi N, Isa M (2015) Fast retrieval of hidden data using enhanced hidden Markov model in video steganography. Appl Soft Comput J 34:744–757

    Article  Google Scholar 

  • Rashmi N, Jyothi K (2018) An improved method for reversible data hiding steganography combined with cryptography. In: Proceedings of the 2nd international conference on inventive systems and control (ICISC), pp. 81–84

  • Reisslein M (2012) Video trace library. Arizona State University. http//trace. eas. asu. edu. Accessed 2012

  • Ren Y, Zhai L, Wang L, Zhu T (2014) Video steganalysis based on subtractive probability of optimal matching feature. In: Proceedings of the 2nd ACM workshop on Information hiding and multimedia security. pp. 83–90

  • Rezagholipour K, Eshghi M (2016) Video steganography algorithm based on motion vector of moving object. Paper presented at eighth international conference on information and knowledge technology (IKT), pp. 183–187

  • Richardson IE (2004) H.264 and MPEG-4 video compression: video coding for next-generation multimedia. John Wiley & Sons, New Jersey

    Google Scholar 

  • Robie DL, Mersereau RM (2001) Video error correction using steganography. In: Proceedings of the International Conference on Image Processing (Cat. No.01CH37205), vol. 1, pp. 164–173

  • Roque JJ, Minguet JM (2009) SLSB: improving the Steganographic Algorithm LSB. In WOSIS, 2009, pp. 57–66

  • Rowland CH (1997) Covert channels in the TCP/IP protocol suite. First Monday, vol. 2, no. 5

  • “S-tools.” [Online]. Available: http://www.jjtc.com/stegdoc/sec316.html. Accessed: 26 Aug 2016

  • Sabeti V, Samavi S, Mahdavi M, Shirani S (2007) Steganalysis of pixel-value differencing steganographic method. Paper presented at IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, pp. 292–295

  • Sadat ES, Faez K, Saffari Pour M (2018) Entropy-based video steganalysis of motion vectors. Entropy 20(4):244–257

    Article  Google Scholar 

  • Sadek MM, Khalifa AS, Mostafa MGM (2015) Video steganography: a comprehensive review. Multimed Tools Appl 74(17):7063–7094

    Article  Google Scholar 

  • Sadek MM, Khalifa AS, Mostafa MGM (2017) Robust video steganography algorithm using adaptive skin-tone detection. Multimed Tools Appl 76(2):3065–3085

    Article  Google Scholar 

  • Santhosh B, Meghana NM (2016) A robust, privacy preserving secret data concealing embedding technique into encrypted video stream. Information systems design and intelligent application, Springer, pp. 645–655

  • Shanableh T (2012) Matrix encoding for data hiding using multilayer video coding and transcoding solutions. Signal Process Image Commun 27(9):1025–1034

    Article  Google Scholar 

  • Shanableh T (2012) Data hiding in MPEG video files using multivariate regression and flexible macroblock ordering. IEEE Trans Inf Forensics Secur 7(2):455–464

    Article  Google Scholar 

  • Shannon CE (2001) A mathematical theory of communication. ACM SIGMOBILE Mob Comput Commun Rev 5(1):3–55

    Article  MathSciNet  Google Scholar 

  • Sheri S, Traoudas B (2017) Video brand storytelling, the rise of content marketing: a qualitative study exploring the antecedents of brand perceptions

  • Sherley AP, Amritha PP (2010) A compressed video steganography using TPVD. Int J Database Manag Syst 2(3):67–80

    Article  Google Scholar 

  • Shimanovsky B, Feng J, M. Potkonjak M (2002) Hiding data in DNA. Paper presented at International Workshop on Information Hiding, pp. 373–386

  • Shou-dao W, Chuang-bai X, Yu L (2009) A High Bitrate Information Hiding Algorithm for Video in Video. World Acad Sci Eng Technol 35:413–418

    Google Scholar 

  • Sikora T (1997) MPEG digital video-coding standards. IEEE Signal Process Mag 14(5):82–100

    Article  Google Scholar 

  • Solutions N (2005) Invisible secrets 4. Invis, Secrets

    Google Scholar 

  • Song G, Li Z, Zhao J, Tu H, Cheng J (2014) A video steganography algorithm for MVC without distortion drift. Paper presented at international conference on audio, language and image processing (ICALIP), pp. 738–742

  • Song G, Li Z, Zhao J, Hu J, Tu H (2015) A reversible video steganography algorithm for MVC based on motion vector. Multimed Tools Appl 74(11):3759–3782

    Article  Google Scholar 

  • Stanescu D, Stratulat M, Ciubotaru B, Chiciudean D, Cioarga R, Micea M (2007) Embedding data in video stream using steganography. Paper presented at 4th international symposium on applied computational intelligence and informatics. pp. 241–244

  • Steganography — the new intelligence threat EWS 2004 subject area intelligence marine corps war college , Marine Corps University , Marine Corps, 2004

  • Stütz T, Autrusseau F, Uhl A (2013) Inter-frame H. 264/CAVLC structure-preserving substitution watermarking. University of Salzburg

  • Su PC, Lu MT, Wu CY (2013) A practical design of high-volume steganography in digital video files. Multimed Tools Appl 66(2):247–266

    Article  Google Scholar 

  • Sudeepa KB, Raju K, R. K. HS, Aithal G, (2016) A new approach for video steganography based on randomization and parallelization. Procedia Comput Sci 78:483–490

    Article  Google Scholar 

  • Sullivan GJ, Ohm J-R, Han W-J, Wiegand T et al (2012) Overview of the high efficiency video coding (HEVC) standard. IEEE Trans circuits Syst video Technol 22(12):1649–1668

    Article  Google Scholar 

  • Sur A, Krishna SVM, Sahu N, Rana S (2015) Detection of motion vector based video steganography. Multimed Tools Appl 74(23):10479–10494

    Article  Google Scholar 

  • Suresh M, Sam IS (2020) Optimized interesting region identification for video steganography using Fractional Grey Wolf Optimization along with multi-objective cost function. J King Saud Univ Inf Sci

  • Suttichaiya A, Sombatkiripaiboon Y, Imtongkhua P, Poonriboon C, So-In C, Horkaew P (2017) Video steganography with LSB color detection. J Telecommun Electron Comput Eng 9(2–2):23–28

    Google Scholar 

  • Swain G (2019) Two new steganography techniques based on quotient value differencing with addition-subtraction logic and PVD with modulus function. Optik (Stuttg) 180:807–823

    Article  Google Scholar 

  • Swanson MD, Zhu B, Tewfik AH (1997) Data hiding for video-in-video. Proceedings of the International Conference on Image Processing. Vol. 2, pp. 676–679

  • Tasdemir K, Kurugollu F, Sezer S (2013) Video steganalysis of LSB based motion vector steganography. Paper presented at 4th European workshop on visual information processing (EUVIP). pp. 260–264

  • Tasdemir K, Kurugollu F, Sezer S (2016) Spatio-temporal rich model-based video steganalysis on cross sections of motion vector planes. IEEE Trans Image Process 25(7):3316–3328

    Article  MathSciNet  MATH  Google Scholar 

  • Thomas TL (2003) Al Qaeda and the internet: the danger of" cyberplanning". Parameters 33(1):112–123

    Google Scholar 

  • Torkaman MRN, Nikfard P, Kazazi NS, Abbasy MR, Tabatabaiee SF (2011) Improving hybrid cryptosystems with DNA steganography, Paper presented at international conference on digital enterprise and information systems. pp. 42–52

  • Tudor PN (1995) MPEG-2 video compression. Electron Commun Eng J 7(6):257–264

    Article  Google Scholar 

  • Video HAVCC, Tew Y, Wong K (2014) An overview of information hiding in H. 264/AVC compressed video. Circuits Syst Video Technol IEEE Trans 24(2):305–319

    Article  Google Scholar 

  • Wahab OFA, Badawy MB, Elshakankiry OA, El-sayed HS (2015) Utilizations of reversible lossless data hiding techniques in video sequences. Int J Comput Netw Technol 3(1)

  • Wang Z, Lu L, Bovik AC (2004) Video quality assessment based on structural distortion measurement. Signal Process Image Commun 19(2):121–132

    Article  Google Scholar 

  • Wang K, Zhao H, Wang H (2014) Video steganalysis against motion vector-based steganography by adding or subtracting one motion vector value. IEEE Trans Inf Forensics Secur 9(5):741–751

    Article  Google Scholar 

  • Wang K, Han J, Wang H (2014) Digital video steganalysis by subtractive prediction error adjacency matrix. Multimed Tools Appl 72(1):313–330

    Article  Google Scholar 

  • Wang P, Cao Y, Zhao X (2017) Segmentation based video steganalysis to detect motion vector modification. Secur Commun Netw 2017:1–12

    Google Scholar 

  • Wang Y, Cao Y, Zhao X, Xu Z, Zhu M (2018) Maintaining rate-distortion optimization for IPM-based video steganography by constructing isolated channels in HEVC. In: Proceedings of the 6th ACM workshop on information hiding and multimedia security. pp. 97–107

  • Wang J, Jia X, Kang X, Shi Y-Q (2019) A cover selection HEVC video steganography based on intra prediction mode. IEEE Access 7:119393–119402

    Article  Google Scholar 

  • Warfare C, Wang H, Wang S (2004) Cyber warfare: steganography vs. steganalysis. Commun ACM 47(10):76–82

    Article  Google Scholar 

  • Westfeld A, Pfitzmann A (2000) Attacks on steganographic Systems. Inf Hiding 1768:1–16

    Google Scholar 

  • Wiegand T, Sullivan GJ, Bjontegaard G, Luthra A (2003) Overview of the H. 264/AVC video coding standard. IEEE Trans circuits Syst video Technol 13(7):560–576

    Article  Google Scholar 

  • Wong K, Tanaka K, Takagi K, Nakajima Y (2009) Complete video quality-preserving data hiding. IEEE Trans Circuits Syst Video Technol 19(10):1499–1512

    Article  Google Scholar 

  • Xu C, Ping X (2007) A steganographic algorithm in uncompressed video sequence based on difference between adjacent frames. In Proceedings of the 4th International Conference on Image Graph ICIG 2007. pp. 297–302

  • Xu C, Ping X, Zhang T (2006) Steganography in compressed video stream. Paper presented at First International Conference on innovative computing, information and control, ICICIC. vol. 1, pp. 269–272

  • Xu X, Dong J, Tan T (2012) Universal spatial feature set for video steganalysis. In: Proceedings of the 19th IEEE international conference on image processing. pp. 245–248

  • Xu D, Wang R, Shi YQ (2014) Data hiding in encrypted H.264/AVC video streams by codeword substitution. IEEE Trans Inf Forensics Secur 9(4):596–606

    Article  Google Scholar 

  • Xu D, Wang R, Shi YQ (2016) An improved scheme for data hiding in encrypted H.264/AVC videos. J Vis Commun Image Represent 36:229–242

    Article  Google Scholar 

  • Xue Y, Zhou J, Zeng H, Zhong P, Wen J (2019) An adaptive steganographic scheme for H. 264/AVC video with distortion optimization. Signal Process Image Commun 76:22–30

    Article  Google Scholar 

  • Yadav P, Mishra N, Sharma S (2013) A secure video steganography with encryption based on LSB technique. Paper presented at IEEE International Conference on Computational Intelligence and Computing Research (ICCIC) pp. 1–5

  • Yang M, Bourbakis N (2005) A high bitrate information hiding algorithm for digital video content under H.264/AVC compression. Midwest Symp Circuits Syst 2005:935–938

    Google Scholar 

  • Yang Y, Li Z, Xie W, Zhang Z (2019) High capacity and multilevel information hiding algorithm based on pu partition modes for HEVC videos. Multimed Tools Appl 78(7):8423–8446

    Article  Google Scholar 

  • Yao Y, Zhang W, Yu N, Zhao X (2015) Defining embedding distortion for motion vector-based video steganography. Multimed Tools Appl 74(24):11163–11186

    Article  Google Scholar 

  • Yao Y, Zhang W, Yu N (2016) Inter-frame distortion drift analysis for reversible data hiding in encrypted H.264/AVC video bitstreams. Signal Processing 128:531–545

    Article  Google Scholar 

  • Ye H, Zhang W, Yao Y, Kong C, Huang H, Yu N, “Motion vector-based video steganalysis using spatial-temporal correlation. In: Proceedings of the 6th international congress on image and signal processing (CISP). Vol. 1. pp. 148–153

  • Yeh H-L, Gue S-T, Tsai P, Shih W-K (2014) Reversible video data hiding using neighbouring similarity. IET Signal Process 8(6):579–587

    Article  Google Scholar 

  • Zhai L, Wang L, Ren Y (2017) Combined and calibrated features for steganalysis of motion vector-based steganography in H. 264/AVC. In: proceedings of the 5th ACM workshop on information hiding and multimedia security. pp. 135–146

  • Zhang W, Cheung S.-CS, Chen M (2005) Hiding privacy information in video surveillance system. Paper presented at IEEE international conference on image processing. Vol. 3. p II–868

  • Zhang H, Cao Y, Zhao X (2015) Motion vector-based video steganography with preserved local optimality. Multimed Tools Appl 89:1–17

    Google Scholar 

  • Zhang Y, Zhang M, Niu K, Liu J (2015) Video steganography algorithm based on trailing coefficients. Paper presented at international conference on intelligent networking and collaborative systems (INCOS), pp. 360–364

  • Zhao Y, Zhang H, Cao Y, Wang P, Zhao X (2015) Video steganalysis based on intra prediction mode calibration. International Workshop on Digital Watermarking. pp. 119–133

Download references

Acknowledgements

This research work is supported by Technical Education Quality Improvement Project III (TEQIP III) of MHRD, Government of India assisted by World Bank under Grant Number P154523 and sanctioned to UIET, Panjab University, Chandigarh (India).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mamta Juneja.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Dalal, M., Juneja, M. A survey on information hiding using video steganography. Artif Intell Rev 54, 5831–5895 (2021). https://doi.org/10.1007/s10462-021-09968-0

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10462-021-09968-0

Keywords

Navigation