Skip to main content

Advertisement

Study and investigation of video steganography over uncompressed and compressed domain: a comprehensive review

  • Regular Paper
  • Published:
Multimedia Systems Aims and scope Submit manuscript

Abstract

In the technological era, the primary source of information is in the form of digital data, which has to be secured while storing or transmitting during communication over an unsecured network. Different approaches are used to provide security to digital data, viz. text, audio, image, and video. This paper initially explains the security system such as cryptography, watermarking, and steganography and their comparative analysis based on different characteristics, viz. satisfaction level of objective, type of carrier object and secret information to be used, dependency of security level, and quality assessment parameters. This review article focuses more on steganography methods applied over video. The various methods implemented for video steganography in compressed domain, viz. inter-frame and intra-frame prediction, motion vector estimation, entropy coding (CAVLC and CABAC), and transformed and quantized coefficients of DCT, DST, and DWT, etc. and the methods based on spatial and transform domain for uncompressed video are briefly described. It is followed by the detailed analysis of related work done by various researchers in video steganography and the obtained experimental results. Furthermore, the confidential data hiding in compressed videos are explained using Moving Picture Expert Group (MPEG—1, MPEG—2, MPEG—4), Advanced Video Coding (AVC)/H.264, and High-Efficiency Video Coding (HEVC)/H.265 that includes both spatial and transform domain. This paper summarizes and explains the detailed investigations of numerous techniques of video steganography based on the comprehensive literature survey. The methods used to assess the performance of video steganography are analyzed based on the quality assessment parameters such as imperceptibility; measured by peak signal to noise ratio (PSNR), mean square error (MSE), and structural similarity (SSIM), robustness; measured by bit error rate (BER) and similarity (Sim), and embedding capacity; measured by hiding ratio. The overall review of past literature facilitates to have in-depth knowledge for upgrading the video steganography.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23
Fig. 24
Fig. 25
Fig. 26
Fig. 27

Similar content being viewed by others

References

  1. Dasgupta, K., Mandal, J.K., Dutta, P.: Hash based least significant bit technique for video steganography (HLSB). Int. J. Secur. Privacy Trust Manag. (IJSPTM) (2012). https://doi.org/10.5121/ijsptm.2012.2201

    Article  Google Scholar 

  2. Mstafa, R.J., Elleithy, K.M.: “A video steganography algorithm based on Kanade-Lucas-Tomasi tracking algorithm and error correcting codes. Multimed. Tools Appl. 75(17), 10311–10333 (2015). https://doi.org/10.1007/s11042-015-3060-0

    Article  Google Scholar 

  3. Mstafa, R.J., Elleithy, K.M., Abdelfattah, E.: Video steganography techniques: taxonomy, challenges, and future directions. In: Applications and Technology Conference (LISAT), 2017 IEEE Long Island. pp. 1–6, IEEE 2017. https://doi.org/10.1109/LISAT.2017.8001965

  4. Liu, S., Xu, D.: A robust steganography method for HEVC based on secret sharing. Cognitive Syst. Res. 59, 207–220 (2020). https://doi.org/10.1016/j.cogsys.2019.09.008

    Article  Google Scholar 

  5. Sadek, M.M., Khalifa, A.S., Mostafa, G.M.: Video steganography: a comprehensive review. Multimed. Tools Appl. 74(17), 7063–7094 (2014). https://doi.org/10.1007/s11042-014-1952-z

    Article  Google Scholar 

  6. Chang, F.-C., Hang, H.-M.: Layered access control schemes on watermarked scalable media. J. VLSI Signal Process. 49(3), 443–455 (2007). https://doi.org/10.1007/s11265-007-0095-0

    Article  MathSciNet  Google Scholar 

  7. Huang, H.-C., Chu, S.-C., Pan, J.-S., Huang, C.-Y., Liao, B.-Y.: Tabu search based multi-watermarks embedding algorithm with multiple description coding. Inf. Sci. J. 181(16), 3379–3396 (2011). https://doi.org/10.1016/j.ins.2011.04.007

    Article  Google Scholar 

  8. Disha, K.S.: A review on video steganography techniques in spatial domain. In: Recent Developments in Control, Automation & Power Engineering (RDCAPE) 2017, pp. 366–371, IEEE 2017. https://doi.org/10.1109/RDCAPE.2017.8358298

  9. Srinivasan, Y., Nutter, B., Mitra, S., Phillips, B., Ferris, D.: Secure transmission of medical records using high capacity steganography. In: 17th IEEE Symposium on Computer-Based Medical Systems, IEEE 2004. https://doi.org/10.1109/CBMS.2004.1311702

  10. Balu, S., Babu, C.N.K., Amudha, K.: “Secure and efficient data transmission by video steganography in medical imaging system. Cluster Comput. (2018). https://doi.org/10.1007/s10586-018-2639-4

    Article  Google Scholar 

  11. Mohsin, A.H., Zaidan, A.A., Zaidan, B.B., Ariffin, S.A.B., Albahri, O.S., Albahri, A.S., Alsalem, M.A., Mohammed, K.I., Hashim, M.: Real-time medical systems based on human biometric steganography: a systematic review. J. Med. Syst. 42, 245 (2018). https://doi.org/10.1007/s10916-018-1103-6

    Article  Google Scholar 

  12. Hanafy, A.A., Salama, G.I., Mohasseb, Y.Z.: A secure covert communication model based on video steganography. In: 2008 IEEE military communications conference, pp. 1–6, IEEE 2008. https://doi.org/10.1109/MILCOM.2008.4753107

  13. Kaur, M., Kaur, A.: Improved security mechanism of text in video by using steganographic technique. Int. J. Adv. Res. Comput. Sci. Manag. Stud. 2(10), 44–51 (2014)

  14. Khan, N., Gorde, K.S.: Video steganography by using statistical key frame extraction method and LSB technique. Int J Innov Res Sci Eng Technol (2015). https://doi.org/10.15680/IJIRSET.2015.0410114]

    Article  Google Scholar 

  15. Cetin, O., Ozcerit, A.T.: “A new steganography algorithm based on color histograms for data embedding into raw video streams. Comput. Secur. J. 28, 670–682 (2009). https://doi.org/10.1016/j.cose.2009.04.002

    Article  Google Scholar 

  16. Cheddad, A., Condell, J., Curran, K., McKevitt, P.: Skin tone based Steganography in video files exploiting the YCbCr colour space. In: 2008 IEEE International Conference on Multimedia and Expo, pp. 905–908, IEEE 2008. https://doi.org/10.1109/ICME.2008.4607582

  17. Tadiparthi, G.R., Sueyoshi, T.: A novel steganographic algorithm using animations as cover. Decision Support Syst. 45, 937–948 (2008). https://doi.org/10.1016/j.dss.2008.03.005

    Article  Google Scholar 

  18. Cetin, O., Ozcerit, A.T.: A new steganography algorithm based on color histograms for data embedding into raw video streams. Comput. Secur. 28(7), 670–682 (2009). https://doi.org/10.1016/j.cose.2009.04.002

    Article  Google Scholar 

  19. Cheddad, A., Condell, J., Curran, K., McKevitt, P.: A skin tone detection algorithm for an adaptive approach to steganography. Signal Process J 89(12), 2465–2478 (2009). https://doi.org/10.1016/j.sigpro.2009.04.022

    Article  MATH  Google Scholar 

  20. Ramalingam, M.: Stego machine—video steganography using modified LSB algorithm. World Acad. Sci. Eng. Technol. Int. J. Inf. Commun. Eng. 5(2), 170–173 (2011)

    Google Scholar 

  21. Bhole, A.T., Patel, R.: Steganography over video file using random byte hiding and LSB technique. In: 2012 IEEE International Conference on Computational Intelligence and Computing Research, 2012. https://doi.org/10.1109/ICCIC.2012.6510230

  22. Lou, D.-C., Hu, C.-H.: LSB steganographic method based on reversible histogram transformation function for resisting statistical steganalysis. Inf. Sci. 188, 346–358 (2012). https://doi.org/10.1016/j.ins.2011.06.003

    Article  Google Scholar 

  23. Alavianmehr, M.A., Rezaei, M., Helfroush, M.S., Tashk, A.: A lossless data hiding scheme on video raw data robust against H.264/AVC compression. In: 2nd International e-Conference on Computer and Knowledge Engineering (ICCKE), pp. 194–198, IEEE 2012. https://doi.org/10.1109/ICCKE.2012.6395377

  24. Zhang, R., Sachnev, A., Botnan, M.B., Kim, H.J., Heo, J.: An efficient embedder for BCH coding for steganography. IEEE Trans Inf Theory J 58(12), 7272–7279 (2012). https://doi.org/10.1109/TIT.2012.2217072

    Article  MathSciNet  MATH  Google Scholar 

  25. Moon, S.K., Raut, R.D.: Analysis of secured video steganography using computer forensics technique for enhance data security. In: IEEE Second International Conference on Image Information Processing (ICIIP-2013), pp. 660–665, IEEE 2013. https://doi.org/10.1109/ICIIP.2013.6707677

  26. Kelash, H.M., Abdel Wahab, O.F., Elshakankiry, O.A., El-Sayed, H.S.: Hiding Data in Video Sequences using Steganography Algorithms. Int Conf ICT Converg ICTC (2013). https://doi.org/10.1109/ICTC.2013.6675372

    Article  Google Scholar 

  27. Paul, R., Acharya, A.K., Yadav, V.K., Batham, S.: Hiding large amount of data using a new approach of video steganography. In: Confluence 2013: The Next Generation Information Technology Summit (4th International Conference), pp. 337–343, IEEE 2013. https://doi.org/10.1049/cp.2013.2338

  28. Dasgupta, K., Mondal, J.K., Dutta, P.: Optimized video steganography using genetic algorithm (GA). Int. Conf. Comput. Intell. Model Tech Appl (CIMTA) 10, 131–137 (2013). https://doi.org/10.1016/j.protcy.2013.12.345

    Article  Google Scholar 

  29. Khupse, S., Patil, N.N.: An adaptive steganography technique for videos using steganoflage. In: 2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT), pp. 811–815, IEEE 2014. https://doi.org/10.1109/ICICICT.2014.6781384

  30. Ramalingam, M., Isa, N.A.M.: Fast retrieval of hidden data using enhanced hidden Markov model in video steganography. Appl. Soft Comput. 34, 744–757 (2015). https://doi.org/10.1016/j.asoc.2015.05.040

    Article  Google Scholar 

  31. Sun, S.: A new information hiding method based on improved BPCS steganography. Adv. Multimed. 2015, 1–7 (2015). https://doi.org/10.1155/2015/698492. (Article ID 698492)

    Article  Google Scholar 

  32. Sadek, M.M., Khalifa, A.S., Mostafa, G.M.: Robust video steganography algorithm using adaptive skin-tone detection. Multimed. Tools Appl. 76(2), 3065–3085 (2016). https://doi.org/10.1007/s11042-015-3170-8

    Article  Google Scholar 

  33. Patel, K., Rora, K.K., Singh, K., Verma, S.: Lazy wavelet transform based steganography in video. In: 2013 International Conference on Communication Systems and Network Technologies, pp. 497–500, IEEE 2013. https://doi.org/10.1109/CSNT.2013.109

  34. Mstafa, R.J., Elleithy, K.M.: A novel video steganography algorithm in the wavelet domain based on the KLT tracking algorithm and BCH Codes. In: Applications and Technology Conference (LISAT), IEEE 2015. https://doi.org/10.1109/LISAT.2015.7160192

  35. Mstafa, R.J., Elleithy, K.M.: A novel video steganography algorithm in DCT domain based on hamming and BCH codes. In: 37th IEEE Sarnoff symposium, pp. 208–213, IEEE 2016. https://doi.org/10.1109/SARNOF.2016.7846757

  36. Ramalingam, M., Isa, N.A.M.: A data-hiding technique using scene-change detection for video steganography. Comput. Electric. Eng. J. (2016). https://doi.org/10.1016/j.compeleceng.2015.10.005

    Article  Google Scholar 

  37. Mstafa, R.J., Elleithy, K.M., Abdelfattah, E.: A robust and secure video steganography method in DWT-DCT domains based on multiple object tracking and ECC. In: IEEE access, IEEE—Institute of Electrical Electronics Engineers, Vol. 5, pp. 5354–5365, IEEE 2017. https://doi.org/10.1109/ACCESS.2017.2691581

  38. Shukur, W.A., Abdullah, W.N., Qurban, L.K.: Information Hiding in DigitalVideo Using DCT, DWT and CvT. In: Journal of Physics: Conference Series, Volume 1003, Conference 1, 2018. https://doi.org/10.1088/1742-6596/1003/1/012035

  39. Spaulding, J., Noda, H., Shirazi, M.N., Kawaguchi, E.: BPCS Steganography using EZW Lossy Compressed Images. Pattern Recognit. Lett. 23(13), 1579–1587 (2002). https://doi.org/10.1016/S0167-8655(02)00122-8

    Article  MATH  Google Scholar 

  40. Noda, H., Furuta, T., Niimi, M., Kawaguchi, E.: Application of BPCS steganography to wavelet compressed video. In: 2004 International Conference on Image Processing (ICIP), pp. 2147–2150, IEEE 2004. https://doi.org/10.1109/ICIP.2004.1421520

  41. Richardson, I.E.: The H.264 advanced video compression standard. Wiley, New York (2010).. (ISBN: 978-0-470-51692-8)

    Book  Google Scholar 

  42. Chen, J., Koc, U.V., Liu, K.J.R.: Design of digital video coding systems: a complete compressed domain approach. In: Signal processing and communications. CRC Press, New York (2001)

    Google Scholar 

  43. Sze, V., Budagavi, M., Sullivan, G.J.: High efficiency video coding (HEVC). Springer, New York (2014). https://doi.org/10.1007/978-3-319-06895-4 . (ISBN: 978-3-319-06895-4 (eBook))

    Book  Google Scholar 

  44. Akramullah, S.: Digital video concepts, methods, and metrics quality, compression, performance, and power trade-off analysis. The Optimization Guidebook for Multimedia and Telecommunications Professionals. Apress Open, (2014) (ISBN: 978-1-4302-6712-6)

  45. Zhai, L., Wang, L., Ren, Y.: Combined and calibrated features for steganalysis of motion vector-based steganography in H.264/AVC. In: Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, Session: Video Steganalysis, pp. 135–146, June 2017. https://doi.org/10.1145/3082031.3083237

  46. Yang, J., Li, S.: An efficient information hiding method based on motion vector space encoding for HEVC. Multimed. Tools Appl. 77(10), 11979–12001 (2017). https://doi.org/10.1007/s11042-017-4844-1

    Article  Google Scholar 

  47. Mstafa, R.J., Elleithy, K.M.: An ECC/DCT—based robust video steganography algorithm for secure data communication. J. Cyber Secur. 53, 167–194 (2017). https://doi.org/10.13052/jcsm2245-1439.531

    Article  Google Scholar 

  48. Liu, Y., Ju, L., Hu, M., Zhao, H., Jia, S., Jia, Z.: A new data hiding method for H.264 based on secret sharing. Neurocomputing 188, 113–119 (2016). https://doi.org/10.1016/j.neucom.2015.02.102

    Article  Google Scholar 

  49. Hu, Y., Zhang, C., Su, Y.: Information hiding based on intra prediction modes for H.264/AVC. In: 2007 IEEE International Conference on Multimedia and Expo, pp. 1231–1234, IEEE 2007. https://doi.org/10.1109/ICME.2007.4284879

  50. Liu, B., Liu, F., Yang, C., Sun, Y.: Secure steganography in compressed video bitstreams. In: The Third International Conference on Availability, Reliability and Security, pp. 1382–1387, IEEE 2008. https://doi.org/10.1109/ARES.2008.140

  51. Ma, X., Li, Z., Lv, J., Wang, W.: Data hiding in H.264/AVC streams with limited intra-frame distortion drift. In: International Symposium on Computer Network and Multimedia Technology, IEEE 2009. https://doi.org/10.1109/CNMT.2009.5374766

  52. Zhu, H., Wang, R., Xu, D., Zhou, X.: Information Hiding Algorithm for H.264 Based on the prediction difference of Intra_4×4. In: 3rd International Congress on Image and Signal Processing (CISP2010), pp. 487–490, IEEE 2010. https://doi.org/10.1109/CISP.2010.5646792

  53. Shahid, Z., Chaumont, M., Puech, W.: Considering the reconstruction loop for data hiding of intra- and inter-frames of H264/AVC. Signal Image Video Process J (SIViP) 7(1), 75–93 (2011). https://doi.org/10.1007/s11760-011-0225-9

    Article  Google Scholar 

  54. Chang, P.-C., Chung, K.-L., Chen, J.-J., Lin, C.-H., Lin, T.-J.: A DCT/DST-based error propagation-free data hiding algorithm for HEVC intra-coded frames. J. Visual Commun. Image Represent. 25(2), 239–253 (2014). https://doi.org/10.1016/j.jvcir.2013.10.007

    Article  Google Scholar 

  55. Liu, Y., Li, Z., Ma, X., Liu, J.: A robust without intra-frame distortion drift data hiding algorithm based on H.264/AVC. Multimed. Tools Appl. 72(1), 613–636 (2014). https://doi.org/10.1007/s11042-013-1393-0

    Article  Google Scholar 

  56. Liu, Y., Hu, M., Ma, X., Zhao, H.: A new robust data hiding method for H.264/AVC without intra-frame distortion drift. Neurocomputing 151, 1076–1085 (2015). https://doi.org/10.1016/j.neucom.2014.03.089

    Article  Google Scholar 

  57. Kapotas, S.K., Skodras, A.N.: A new data hiding scheme for scene change detection in H.264 encoded video sequences. In: IEEE International Conference on Multimedia and Expo, pp. 277–280, IEEE 2008. https://doi.org/10.1109/ICME.2008.4607425

  58. Xu, C., Ping, X., Zhang, T.: Steganography in compressed video stream. In: First International Conference on Innovative Computing, Information and Control (ICICIC'06), Vol. 1, IEEE 2006. https://doi.org/10.1109/ICICIC.2006.158

  59. Pan, F., Xiang, L., Yang, X.-Y., Guo, Y.: Video steganography using motion vector and linear block codes. In: 2010 IEEE International Conference on Software Engineering and Service Sciences, pp. 592–595, IEEE 2010. https://doi.org/10.1109/ICSESS.2010.5552283

  60. Li-Yi, Z., Wei-Dong, Z.: A novel steganography algorithm based on motion vector and matrix encoding. In: IEEE 3rd International Conference on Communication Software and Networks, pp. 406–409, IEEE 2011. https://doi.org/10.1109/ICCSN.2011.6013622

  61. Jue, W., Min-qing, Z., Juan-li, S.: Video steganography using motion vector components. In: IEEE 3rd International Conference on Communication Software and Networks, pp. 500–503, IEEE 2011. https://doi.org/10.1109/ICCSN.2011.6013642

  62. Song, G., Li, Z., Zhao, J., Hu, J., Tu, H.: A reversible video steganography algorithm for MVC based on motion vector. Multimed. Tools Appl. 74(11), 3759–3782 (2013). https://doi.org/10.1007/s11042-013-1798-9

    Article  Google Scholar 

  63. Yao, Y., Zhang, W., Yu, N., Zhao, X.: Defining embedding distortion for motion vector-based video steganography. Multimed. Tools Appl. 74(24), 11163–11186 (2014). https://doi.org/10.1007/s11042-014-2223-8

    Article  Google Scholar 

  64. Zhang, H., Cao, Y., Zhao, X.: Motion vector-based video steganography with preserved local optimality. Multimed. Tools Appl. 75(21), 13503–13519 (2015). https://doi.org/10.1007/s11042-015-2743-x

    Article  Google Scholar 

  65. Niu, K., Yang, X., Zhang, Y.: A novel video reversible data hiding algorithm using motion vector for H.264/AVC. Tsinghua Sci. Technol. J. 22(5), 489–498 (2017). https://doi.org/10.23919/TST.2017.8030538

    Article  Google Scholar 

  66. Fuad, M., Ernawan, F.: Video steganography based on DCT psychovisual and object motion. Bull. Electric. Eng. Inform. J. 9(3), 1015–1023 (2020). https://doi.org/10.11591/eei.v9i3.1859

    Article  Google Scholar 

  67. Britanak, V., Rao, K.R.: Two-dimensional DCT/DST universal computational structure for block sizes. IEEE Trans. Signal Process. (2000). https://doi.org/10.1109/78.875483

    Article  Google Scholar 

  68. Sullivan, G.J., Ohm, J.-R., Han, W.-J., Wiegand, T.: Overview of the High Efficiency Video Coding (HEVC) Standard. IEEE Trans. Circuits Syst. Video Technol. 22(12), 1649–1668 (2012). https://doi.org/10.1109/TCSVT.2012.2221191

    Article  Google Scholar 

  69. Yadav, S.K., Bhogal, R.K.: A video steganography in spatial, discrete wavelet transform and integer wavelet domain. In: 2018 International Conference on Intelligent Circuits and Systems (ICICS), pp. 258–264. IEEE (2018). https://doi.org/10.1109/ICICS.2018.00060

  70. Gonzalez, R.C., Woods, R.E.: Digital Image Processing, 3rd edn. Pearson Education, London (2008).. (ISBN: 0-13-168728-x 978-0-13-168728-8)

    Google Scholar 

  71. Huang, J., Shi, Y.Q.: Reliable information bit hiding. IEEE Trans. Circuits Syst. Video Technol. 12(10), 916–920 (2002). https://doi.org/10.1109/TCSVT.2002.804897

    Article  Google Scholar 

  72. Yilmaz, A., Alatan, A.A.: Error concealment of video sequences by data hiding. In: 2003 International Conference on Image Processing, pp. 679–682, IEEE 2003. https://doi.org/10.1109/ICIP.2003.1246771

  73. Meuel, P., Chaumont, M., Puech, W.: Data hiding in H.264 video for lossless reconstruction of region of interest. In: 2007 15th European Signal Processing Conference, pp. 2301–2305, IEEE 2007. https://doi.org/10.5281/ZENODO.40675

  74. Li, G., Ito, Y., Yu, X., Nitta, N., Babaguchi, N.: Recoverable privacy protection for video content distribution. EURASIP J. Inf. Secur. 2009, 1–11 (2010). https://doi.org/10.1155/2009/293031

    Article  Google Scholar 

  75. Li, Y., Chen, H.-X., Zhao, Y.: A new method of data hiding based on H.264 encoded video sequences. In: IEEE 10th International Conference on Signal Processing Proceedings, pp. 1833–1836, IEEE 2010. https://doi.org/10.1109/ICOSP.2010.5656918

  76. Liu, Y.X., Li, Z., Ma, X., Liu, J.: A novel data hiding scheme for H.264/AVC video streams without intra-frame distortion drift. In: IEEE 14th International Conference on Communication Technology, pp. 824–828, IEEE 2012. https://doi.org/10.1109/ICCT.2012.6511318

  77. Liu, Y., Li, Z., Maa, X., Liu, J.: A robust data hiding algorithm for H.264/AVC video streams. J. Syst. Softw. 86(8), 2174–2183 (2013). https://doi.org/10.1016/j.jss.2013.03.101

    Article  Google Scholar 

  78. Mstafa, R.J., Elleithy, K.M.: A DCT-based robust video steganographic method using BCH error correcting codes. In: 2016 IEEE long island systems, applications and technology conference (LISAT), IEEE 2016. https://doi.org/10.1109/LISAT.2016.7494111

  79. Khan, A., Sarfaraz, A.: FFT-ETM based distortion less and high payload image steganography. Multimed. Tools Appl. (2019). https://doi.org/10.1007/s11042-019-7664-7

    Article  Google Scholar 

  80. Lu, C.-S., Chen, J.-R., Fan, K.-C.: Real-time frame-dependent video watermarking in VLC domain. Signal Process. Image Commun. 20, 624–642 (2005). https://doi.org/10.1016/j.image.2005.03.012

    Article  Google Scholar 

  81. Mobasseri, B.G., Marcinak, M.P. Watermarking of MPEG-2 video in compressed domain using VLC mapping. In: 7th Workshop on Multimedia & Security, pp. 91–94, 2005. https://doi.org/10.1145/1073170.1073187

  82. Liao, K., Lian, S., Guo, Z., Wang, J.: Efficient information hiding in H.264/AVC video coding. Telecommun. Syst. 49(2), 261–269 (2012). https://doi.org/10.1007/s11235-010-9372-5

    Article  Google Scholar 

  83. Shahid, Z., Chaumont, M., Puech, W.: Fast protection of H.264/AVC by selective encryption of CAVLC and CABAC for I and P frames. IEEE Trans. Circuits Syst. Video Technol. 21(5), 565–576 (2011). https://doi.org/10.1109/TCSVT.2011.2129090

    Article  Google Scholar 

  84. Ke, N., Weidong, Z.: A video steganography scheme based on H.264 bitstreams replaced. In: IEEE 4th International Conference on Software Engineering and Service Science, pp. 447–450, IEEE 2013. https://doi.org/10.1109/ICSESS.2013.6615345

  85. Wang, Y., Oneill, M., Kurugollu, F.: A tunable encryption scheme and analysis of fast selective encryption for CAVLC and CABAC in H.264/AVC. IEEE Trans. Circuits Syst. Video Technol. 23(9), 1476–1490 (2013). https://doi.org/10.1109/TCSVT.2013.2248588

    Article  Google Scholar 

  86. Zhang, Y., Zhang, M., Wang, X.A., Niu, K., Liu, J.: A novel video steganography algorithm based on trailing coefficients for H264/AVC. Inform. Int. J. Comput. Inform. 40(1), 63–70 (2016)

    Google Scholar 

  87. Abd-El-Atty, B., Iliyasu, A.M., Alaskar, H., Abd-El-Latif, A.A.: A robust quasi-quantum walks-based steganography protocol for secure transmission of images on cloud-based E-healthcare platforms. Sensors 20(11), 3108 (2020). https://doi.org/10.3390/s20113108

    Article  Google Scholar 

  88. Abd-El-Latif, A.A., Abd-El-Atty, B., Elseuofi, S., Khalifa, H.S., Alghamdi, A., Polat, K., Amin, M.: Secret images transfer in cloud system based on investigating quantum walks in steganography approaches. Phys. A Stat. Mech. Appl. 541, 123687 (2020). https://doi.org/10.1016/j.physa.2019.123687

    Article  MathSciNet  Google Scholar 

  89. Peng, J., Abd El-Atty, B., Khalifa, H.S., Abd El-Latif, A.A.: Image steganography algorithm based on key matrix generated by quantum walks. In: Eleventh International Conference on Digital Image Processing, Vol. 11179, 1117905, ICDIP 2019. https://doi.org/10.1117/12.2539630

  90. Abd-EL-Latif, A.A., Abd-El-Atty, B., Venegas-Andraca, S.E.: A novel image steganography technique based on quantum substitution boxes. Opt. Laser Technol. 116, 92–102 (2019). https://doi.org/10.1016/j.optlastec.2019.03.005

    Article  Google Scholar 

  91. Li, L., Hossain, M.S., Abd-El-Latif, A.A., Alhamid, M.F.: Distortion less secret image sharing scheme for Internet of Things system. Cluster Comput. J. 22(1), 2293–2307 (2019). https://doi.org/10.1007/s10586-017-1345-y

    Article  Google Scholar 

  92. Abd-El-Latif, A.A., Abd-El-Atty, B., Hossain, M.S., Abdur Rahman, M.D., Alamri, A., Gupta, B.B.: Efficient quantum information hiding for remote medical image sharing. IEEE Access J. 6, 21075–21083 (2018). https://doi.org/10.1109/ACCESS.2018.2820603

    Article  Google Scholar 

  93. Yan, C., Gong, B., Wei, Y., Gao, Y.: Deep multi-view enhancement hashing for image retrieval. IEEE Trans. Pattern Anal. Mach. Intell. (2020). https://doi.org/10.1109/TPAMI.2020.2975798

    Article  Google Scholar 

  94. Yan, C., Shao, B., Zhao, H., Ning, R., Zhang, Y., Xu, F.: 3D room layout estimation from a single RGB image. IEEE Trans. Multimed. (2020). https://doi.org/10.1109/TMM.2020.2967645]

    Article  Google Scholar 

  95. Peng, J., Abd El-Atty, B., Khalifa, H.S., Abd El-Latif, A.A.: Image watermarking algorithm based on quaternion and chaotic Lorenz system. In: Eleventh International Conference on Digital Image Processing, Vol. 11179, 111790W, ICDIP 2019. https://doi.org/10.1117/12.2539753

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rachna Patel.

Additional information

Communicated by Y. Zhang.

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Patel, R., Lad, K. & Patel, M. Study and investigation of video steganography over uncompressed and compressed domain: a comprehensive review. Multimedia Systems 27, 985–1024 (2021). https://doi.org/10.1007/s00530-021-00763-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00530-021-00763-z

Keywords