Skip to main content

2020 | OriginalPaper | Buchkapitel

A Review on Various Approaches in Video Steganography

verfasst von : S. Raja Ratna, J. B. Shajilin Loret, D. Merlin Gethsy, P. Ponnu Krishnan, P. Anand Prabu

Erschienen in: Intelligent Communication Technologies and Virtual Mobile Networks

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Steganography is the technique in which the secret messages are hidden within the data. It keeps both the data and their existence in a secure manner. It is used in various real time applications and also it enables a secure communication. Text files, images, audios, and videos are used in steganography to conceal the communication. The main objective of this paper is to provide a general analysis on various approaches in video steganography. It covers related works, the strength of steganography, types of steganography and different techniques of video steganography. The absolute study of various techniques of video steganography is also highlighted.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Abbass, A., Soleit, E., Ghoniemy, S.: Blind video data hiding using integer wavelet transforms. J. Ubiquitous Comput. Commun. 2, 11–25 (2007) Abbass, A., Soleit, E., Ghoniemy, S.: Blind video data hiding using integer wavelet transforms. J. Ubiquitous Comput. Commun. 2, 11–25 (2007)
2.
Zurück zum Zitat Bansod, S., Mane, V., Ragha, R.: Modified BPCS steganography using hybrid cryptography for improving data embedding capacity. In: IEEE International Conference on Communication, Information & Computing Technology, pp. 1–6 (2012) Bansod, S., Mane, V., Ragha, R.: Modified BPCS steganography using hybrid cryptography for improving data embedding capacity. In: IEEE International Conference on Communication, Information & Computing Technology, pp. 1–6 (2012)
3.
Zurück zum Zitat Bhattacharyya, S., Sanyal, G.: A novel approach of video steganography using PMM. In: International Conference on Information Processing, pp. 644–653. Springer (2012) Bhattacharyya, S., Sanyal, G.: A novel approach of video steganography using PMM. In: International Conference on Information Processing, pp. 644–653. Springer (2012)
4.
Zurück zum Zitat Bhattacharyya, S., Khan, A., Nandi, A., Dasmalakar, A., Roy, S., Sanyal, G.: Pixel mapping method based bit plane complexity segmentation steganography. In: IEEE World Congress on Information and Communication Technologies (WICT), pp. 36–41 (2011) Bhattacharyya, S., Khan, A., Nandi, A., Dasmalakar, A., Roy, S., Sanyal, G.: Pixel mapping method based bit plane complexity segmentation steganography. In: IEEE World Congress on Information and Communication Technologies (WICT), pp. 36–41 (2011)
5.
Zurück zum Zitat Chang, P., Chung, K., Chen, J., Lin, C.: A DCT/DST-based error propagation-free data hiding algorithm for HEV intra-coded frames. J. Vis. Commun. Image Represent. 25, 239–253 (2014)CrossRef Chang, P., Chung, K., Chen, J., Lin, C.: A DCT/DST-based error propagation-free data hiding algorithm for HEV intra-coded frames. J. Vis. Commun. Image Represent. 25, 239–253 (2014)CrossRef
6.
Zurück zum Zitat Dasgupta, K., Mondal, J.K., Dutta, P.: Optimized video steganography using genetic algorithm. Int. Conf. Comput. Intell.: Model. Tech. Appl. 10, 131–137 (2013) Dasgupta, K., Mondal, J.K., Dutta, P.: Optimized video steganography using genetic algorithm. Int. Conf. Comput. Intell.: Model. Tech. Appl. 10, 131–137 (2013)
7.
Zurück zum Zitat Hu, S.D., Tak, U.K.: A novel video steganography based on non-uniform rectangular partition. In: IEEE International Conference on Computational Science and Engineering, pp. 57–61 (2011) Hu, S.D., Tak, U.K.: A novel video steganography based on non-uniform rectangular partition. In: IEEE International Conference on Computational Science and Engineering, pp. 57–61 (2011)
8.
Zurück zum Zitat Idbeaa, T., Samad, S., Husain, H.: An adaptive compressed video steganography based on pixel-value differencing schemes. In: IEEE International Conference on Advanced Technologies for Communication, pp. 50–55 (2015) Idbeaa, T., Samad, S., Husain, H.: An adaptive compressed video steganography based on pixel-value differencing schemes. In: IEEE International Conference on Advanced Technologies for Communication, pp. 50–55 (2015)
9.
Zurück zum Zitat Jalab, H., Zaidan, A., Zaidan, B.: Frame selected approach for hiding data within MPEG video using bit plane complexity segmentation. J. Comput. 1, 108–113 (2009) Jalab, H., Zaidan, A., Zaidan, B.: Frame selected approach for hiding data within MPEG video using bit plane complexity segmentation. J. Comput. 1, 108–113 (2009)
10.
Zurück zum Zitat Kapotas, S., Skodras, A.: A new data hiding scheme for scene change detection in H.264 encoded video sequences. In: IEEE International Conference on Multimedia and Expo, pp. 277–280 (2008) Kapotas, S., Skodras, A.: A new data hiding scheme for scene change detection in H.264 encoded video sequences. In: IEEE International Conference on Multimedia and Expo, pp. 277–280 (2008)
11.
Zurück zum Zitat Khare, R., Mishra, R., Arya, I.: Video steganography using LSB technique by neural network. In: IEEE International Conference on Computational Intelligence and Communication Network, pp. 898–902 (2014) Khare, R., Mishra, R., Arya, I.: Video steganography using LSB technique by neural network. In: IEEE International Conference on Computational Intelligence and Communication Network, pp. 898–902 (2014)
12.
Zurück zum Zitat Kolakalur, A., Kagalidis, I., Vuksanovic, B.: Wavelet based color video steganography. IACSIT Int. J. Eng. Technol. 8, 165–169 (2016)CrossRef Kolakalur, A., Kagalidis, I., Vuksanovic, B.: Wavelet based color video steganography. IACSIT Int. J. Eng. Technol. 8, 165–169 (2016)CrossRef
13.
Zurück zum Zitat Kumar, S., Yadav, A.K., Gupta, A., Kumar, P.: RGB image steganography on multiple frame video using LSB technique. In: IEEE International Conference on Computer and Computational Sciences, pp. 226–231 (2015) Kumar, S., Yadav, A.K., Gupta, A., Kumar, P.: RGB image steganography on multiple frame video using LSB technique. In: IEEE International Conference on Computer and Computational Sciences, pp. 226–231 (2015)
14.
Zurück zum Zitat Li, Z., Jiang, J., Xiao, G., Fang, H.: An effective and fast scene change detection algorithm for MPEG compressed videos. In: International Conference on Image Analysis and Recognition, pp. 206–214. Springer (2006) Li, Z., Jiang, J., Xiao, G., Fang, H.: An effective and fast scene change detection algorithm for MPEG compressed videos. In: International Conference on Image Analysis and Recognition, pp. 206–214. Springer (2006)
15.
Zurück zum Zitat Lin, T., Chung, K., Chang, P., Huang, Y.: An improved DCT-based perturbation scheme for high capacity data hiding in H.264/AVC intra frames. J. Syst. Softw. 86, 604–614 (2013)CrossRef Lin, T., Chung, K., Chang, P., Huang, Y.: An improved DCT-based perturbation scheme for high capacity data hiding in H.264/AVC intra frames. J. Syst. Softw. 86, 604–614 (2013)CrossRef
16.
Zurück zum Zitat Ma, X., Li, L., Tu, H., Zhang, B.: A data hiding algorithm for H.264/AVC video streams without intra-frame distortion drift. IEEE Trans. Circuits Syst. Video Technol. 20, 1320–1330 (2010)CrossRef Ma, X., Li, L., Tu, H., Zhang, B.: A data hiding algorithm for H.264/AVC video streams without intra-frame distortion drift. IEEE Trans. Circuits Syst. Video Technol. 20, 1320–1330 (2010)CrossRef
17.
Zurück zum Zitat Mozo, A., Obien, M., Rigor, C., Rayel, D., Chua, K., Tangonan, G.: Video steganography using Flash Video (FLV). In: IEEE Conference on International Instrumentation and Measurement Technology, pp. 822–827 (2009) Mozo, A., Obien, M., Rigor, C., Rayel, D., Chua, K., Tangonan, G.: Video steganography using Flash Video (FLV). In: IEEE Conference on International Instrumentation and Measurement Technology, pp. 822–827 (2009)
18.
Zurück zum Zitat Mstafa, R., Elleithy, K.: A DCT-based robust video steganographic method using BCH error correcting codes. In: IEEE Conference on Long Island Systems, Applications and Technology, pp. 1–6 (2016) Mstafa, R., Elleithy, K.: A DCT-based robust video steganographic method using BCH error correcting codes. In: IEEE Conference on Long Island Systems, Applications and Technology, pp. 1–6 (2016)
19.
Zurück zum Zitat Mstafa, R., Elleithy, K.: A high payload video steganography algorithm in DWT domain based on BCH codes (15, 11). In: IEEE Wireless Telecommunications Symposium (WTS), pp. 1–8 (2015) Mstafa, R., Elleithy, K.: A high payload video steganography algorithm in DWT domain based on BCH codes (15, 11). In: IEEE Wireless Telecommunications Symposium (WTS), pp. 1–8 (2015)
20.
Zurück zum Zitat Mstafa, R., Elleithy, K.: A novel video steganography algorithm in the wavelet domain based on the KLT tracking algorithm and BCH codes. In: IEEE Conference on Systems, Applications and Technology, pp. 1–7 (2015) Mstafa, R., Elleithy, K.: A novel video steganography algorithm in the wavelet domain based on the KLT tracking algorithm and BCH codes. In: IEEE Conference on Systems, Applications and Technology, pp. 1–7 (2015)
21.
Zurück zum Zitat Lemos, N., Sonawane, K., Roy, B.: Secure data transmission using video. In: IEEE International Conference on Contemporary Computing, pp. 231–243 (2015) Lemos, N., Sonawane, K., Roy, B.: Secure data transmission using video. In: IEEE International Conference on Contemporary Computing, pp. 231–243 (2015)
22.
Zurück zum Zitat Noda, H., Furuta, T., Niimi, M., Kawaguchi, E.: Application of BPCS steganography to wavelet compressed video. In: IEEE International Conference on Image Processing, vol. 4, pp. 2147–2150 (2004) Noda, H., Furuta, T., Niimi, M., Kawaguchi, E.: Application of BPCS steganography to wavelet compressed video. In: IEEE International Conference on Image Processing, vol. 4, pp. 2147–2150 (2004)
23.
Zurück zum Zitat Reddy, M., Kumar, A.: Secured data transmission using wavelet based steganography and cryptography by using AES algorithm. In: International Conference on Computational Modeling and Security, vol. 85, pp. 62–69. Elsevier (2016) Reddy, M., Kumar, A.: Secured data transmission using wavelet based steganography and cryptography by using AES algorithm. In: International Conference on Computational Modeling and Security, vol. 85, pp. 62–69. Elsevier (2016)
24.
Zurück zum Zitat Reddy, M., Kumar, V., Reddy, K.: A practical approach for secured data transmission using wavelet based steganography and cryptography. Int. J. Comput. Appl. 67, 18–23 (2013) Reddy, M., Kumar, V., Reddy, K.: A practical approach for secured data transmission using wavelet based steganography and cryptography. Int. J. Comput. Appl. 67, 18–23 (2013)
25.
Zurück zum Zitat Shanableh, T.: Data hiding in MPEG video files using multivariate regression and flexible macro block ordering. IEEE Trans. Inf. Forensics Secur. 7, 455–464 (2012)CrossRef Shanableh, T.: Data hiding in MPEG video files using multivariate regression and flexible macro block ordering. IEEE Trans. Inf. Forensics Secur. 7, 455–464 (2012)CrossRef
26.
Zurück zum Zitat Sherlyand, A., Amritha, P.: A compressed video steganography using TPVD. Int. J. Database Manag. Syst. 2, 67–80 (2010)CrossRef Sherlyand, A., Amritha, P.: A compressed video steganography using TPVD. Int. J. Database Manag. Syst. 2, 67–80 (2010)CrossRef
27.
Zurück zum Zitat Singh, S., Agarwal, G.: Hiding image to video: a new approach of LSB replacement. Int. J. Eng. Sci. Technol. 2, 6999–7003 (2010) Singh, S., Agarwal, G.: Hiding image to video: a new approach of LSB replacement. Int. J. Eng. Sci. Technol. 2, 6999–7003 (2010)
28.
Zurück zum Zitat Sudeepa, K., Raju, K., Kumar, H., Aithal, G.: A new approach for video steganography based on randomization and parallelization. In: International Conference on Information Security & Privacy, vol. 78, pp. 483–490. Elsevier (2015) Sudeepa, K., Raju, K., Kumar, H., Aithal, G.: A new approach for video steganography based on randomization and parallelization. In: International Conference on Information Security & Privacy, vol. 78, pp. 483–490. Elsevier (2015)
29.
Zurück zum Zitat Tamboli, M., Gulve, A.: Improving security in tri pixel difference value method. Int. J. Inf. Electron. Eng. 2, 505–508 (2012) Tamboli, M., Gulve, A.: Improving security in tri pixel difference value method. Int. J. Inf. Electron. Eng. 2, 505–508 (2012)
30.
Zurück zum Zitat Thakur, V., Saikia, M.: Hiding secret image in video. In: IEEE International Conference on Intelligent Systems and Signal Processing, pp. 150–153 (2013) Thakur, V., Saikia, M.: Hiding secret image in video. In: IEEE International Conference on Intelligent Systems and Signal Processing, pp. 150–153 (2013)
31.
Zurück zum Zitat Zhao, W., Jie, Z., Xin, L., Qiaoyan, W.: Data embedding based on pixel value differencing and modulus function using indeterminate equation. J. China Univ. Posts Telecommun. 22, 95–100 (2015)CrossRef Zhao, W., Jie, Z., Xin, L., Qiaoyan, W.: Data embedding based on pixel value differencing and modulus function using indeterminate equation. J. China Univ. Posts Telecommun. 22, 95–100 (2015)CrossRef
32.
Zurück zum Zitat Thakur, A., Singh, H., Sharda, S.: Secure video steganography based on discrete wavelet transform and arnold transform. Int. J. Comput. Appl. 123, 25–29 (2015) Thakur, A., Singh, H., Sharda, S.: Secure video steganography based on discrete wavelet transform and arnold transform. Int. J. Comput. Appl. 123, 25–29 (2015)
33.
Zurück zum Zitat Viral, G., Jain, D., Ravin, S.: A real time approach for secure text transmission using video cryptography. In: IEEE International Conference on Communication Systems and Network Technologies, pp. 635–638 (2014) Viral, G., Jain, D., Ravin, S.: A real time approach for secure text transmission using video cryptography. In: IEEE International Conference on Communication Systems and Network Technologies, pp. 635–638 (2014)
34.
Zurück zum Zitat Zhang, Y., Zhang, M., Niu, K., Liu, J.: Video steganography algorithm based on trailing coefficients. In: IEEE International Conference on Intelligent Networking and Collaborative Systems, pp. 360–364 (2015) Zhang, Y., Zhang, M., Niu, K., Liu, J.: Video steganography algorithm based on trailing coefficients. In: IEEE International Conference on Intelligent Networking and Collaborative Systems, pp. 360–364 (2015)
Metadaten
Titel
A Review on Various Approaches in Video Steganography
verfasst von
S. Raja Ratna
J. B. Shajilin Loret
D. Merlin Gethsy
P. Ponnu Krishnan
P. Anand Prabu
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-28364-3_64