Nothing Special   »   [go: up one dir, main page]

Skip to main content
Log in

RI-CDVS: Robust and Imperceptible Compressed Domain Video Steganography Using H.265 Codec

  • Original Research
  • Published:
SN Computer Science Aims and scope Submit manuscript

Abstract

The development of steganography methods has raised growing worries about steganography abuse. As the significant demand for digital video processing is on the rise from last decade, data security becomes a crucial issue. Motion vector manipulation (MVM)-based video steganography has caught attention since it can result in indirect and arbitrary alterations in video data. The moderate payload capacity and complexity are issues faced by MV-based methods. A hybrid motion estimation and transform coefficients strategy applied on video steganography using the H.265 compression method is proposed. The robust imperceptible compressed domain video steganography (RI-CDVS) model is presented to increase imperceptibility with improved security. The two phases of the RI-CDVS model are embedding and extraction. The embedding stage generates the compressed stego video from the inputs of compressed cover video and secret image. Using dynamic threshold from the cover video, the motion estimation technique is used to select the group of key frames. The key frames are chosen to hide the secret image without sacrificing quality and lower error rate. The Discrete Cosine Transform (DCT) is used to transform keyframes into the frequency domain. The Least Significant Bit (LSB) of the integer coefficients of the DCT components is used to embed the secret information. The H.265 codec is used to create the compressed stego video. At extraction phase reverse operations are performed to get secret image. The experiments are conducted using a publicly accessible video collection and compared the results of RICDVS with the techniques at the cutting edge of video steganography.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Data availability

The datasets used during and/or analyzed during the current study are available from the corresponding author on reasonable request.

References

  1. Weng X, Yongzhi L, Chi L, Yadong M. Convolutional video steganography with temporal residual modeling. Comput Sci Multimedia Retrieval 2018.

  2. Mastafa R, Khaled. Video steganography techniques: Taxonomy, challenges and future directions. IEEE LISAT 2017;1–6.

  3. Dasgupta K, Mondal JK, Dutta P. Optimized video steganography using genetic algorithm (ga). Procedia Technol. 2013;10:131–7.

    Article  Google Scholar 

  4. Mstafa R, Elleithy K. Compressed and raw video steganography techniques: a comprehensive survey and analysis. Multimed Tools Appl. 2017;20:21749–86.

    Article  Google Scholar 

  5. Chiu M, Siu Y. Computationally-scalable motion estimation algorithm for h.264/avc video coding. IEEE Trans Consumer Electron. 2010;56:895–903.

    Article  Google Scholar 

  6. Zhang H, Cao Y, Zhao X. Motion vector-based video steganography with preserved local optimality. Multimedia Tools Appl. 2015;75:13503–19.

    Article  Google Scholar 

  7. Mstafa R, Elleithy K, Abdelfattah E. A robust and secure video steganography method in dwt-dct domains based on multiple object tracking and ecc. IEEE Access. 2017;5:5354–65.

    Google Scholar 

  8. Rana S, Kamra R, Sur A. Motion vector based video steganography using homogeneous block selection. Multimed Tools Appl. 2020;79:5881–96.

    Article  Google Scholar 

  9. Salunkhe S, Bhosale S. Nature inspired algorithm for pixel location optimization in video steganography using deep rnn. Int J Eng Sci Technol. 2021;3(2):146–54.

    Article  Google Scholar 

  10. Suresh M, Shatheesh S. Optimized interesting region identification for video steganography using fractional grey wolf optimization along with multi-objective cost function. Multimed Tools Appl. 2021;80(9):13253–70.

    Article  Google Scholar 

  11. Patel R, Lad K, Patel M, Desai M. A hybrid dst-sbpnrm approach for compressed video steganography. Multimedia Syst. 2021;27:417–28.

    Article  Google Scholar 

  12. Suganthi K, Rajkumar S. A multi-image hiding technique in dilated video regions based on cooperative game-theoretic approach. J King Saud Univ Comput Inf Sci. 2021;34:5841–55.

    Google Scholar 

  13. Zhao H, Liu Y, Wang Y, Liu S, Feng C. A video steganography method based on transform block decision for h.265/hevc. IEEE Access. 2021;9:55506–21.

    Article  Google Scholar 

  14. Zhang Z, Li Z, Liu J, Yan H, Yu L. Steganography algorithm based on modified emd-coded pu partition modes for hevc videos. EURASIP J Image Video Proc 2021;7.

  15. Ghamsarian N, Schoeffmann K, Khademi M. Blind mv-based video steganalysis based on joint inter-frame and intra-frame statistics. Multimed Tools Appl. 2021;80:9137–59.

    Article  Google Scholar 

Download references

Funding

No funding sources.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shamal Salunkhe.

Ethics declarations

Conflict of Interest

The authors declare that there is no conflict of interest.

Ethical Approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article is part of the topical collection “Enabling Innovative Computational Intelligence Technologies for IOT” guest edited by Omer Rana, Rajiv Misra, Alexander Pfeiffer, Luigi Troiano and Nishtha Kesswani.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Salunkhe, S., Bhosale, S. RI-CDVS: Robust and Imperceptible Compressed Domain Video Steganography Using H.265 Codec. SN COMPUT. SCI. 4, 357 (2023). https://doi.org/10.1007/s42979-023-01681-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s42979-023-01681-9

Keywords

Navigation