Abstract
Steganography is mainly used for secure and covert communication via digital media transferred through the internet. A successful steganography technique should have high imperceptibility, payload and should be robust against attacks. Another main aspect of the successful steganography technique is that it should not be vulnerable to the attack of steganalysis. Therefore, for covert communication, the testing of video steganography technique must be performed against steganalysis. This paper intended to perform steganalysis of the technique proposed by the authors (Dalal and Juneja in Multimed Tools Appl 1–21, 2018) using DWT (Discrete Wavelet Transform) based video steganography scheme for SD and HD videos. The testing has been done using state-of-the-art steganalysis techniques using machine learning among which one is for DWT based image steganalysis, and the other two are for H.264/AVC video steganalysis. The performance has been calculated using different objective parameters such as detection accuracy, specificity, and sensitivity. The experimental results demonstrated the effectiveness of the proposed technique against steganalysis with only maximum 56.6% average detection accuracy.
Similar content being viewed by others
Data availability
Enquiries about data availability should be directed to the authors.
References
Dalal, M., & Juneja, M. (2018). A robust and imperceptible steganography technique for SD and HD videos. Multimedia Tools and Applications 1–21.
Dalal, M., & Juneja, M. (2018). Video steganography techniques in spatial domain—A Survey. In Proceedings of the international conference on computing and communication systems (pp. 705–711). Singapore: Springer.
Petitcolas, F. A. P., Anderson, R. J., & Kuhn, M. G. (1999). Information hiding—A survey. Proceedings of the IEEE, 87(7), 1062–1078.
Dalal, M., & Juneja, M. (2018). Video steganalysis to obstruct criminal activities for digital forensics: A survey. International Journal of Electronic Security and Digital Forensics, 10(4), 338–355.
Das, S., Sharma, S., Bakshi, S., & Mukherjee, I. (2018). A Framework for Pixel Intensity Modulation Based Image Steganography. In Progress in advanced computing and intelligent engineering (pp. 3–14). Springer.
Rabie, T., & Baziyad, M. (2019). The Pixogram: Addressing High Payload Demands for Video Steganography. IEEE Access, 7, 21948–21962.
Patel, K., Rora, K. K., Singh, K., & Verma, S. (2013) Lazy wavelet transform based steganography in video. In International Conference on Communication Systems and Network Technologies CSNT 2013 (pp. 497–500).
Kumar, G. S. N., Bhavanam, S. N., & Midasala, V. (2014) Image Hiding in a Video-based on DWT & LSB Algorithm. In ICPVS Conference.
Ramalingam, M., & Isa, N. A. M. (2014). Video steganography based on integer Haar wavelet transforms for secured data transfer. Indian Journal of Science and Technology, 7(7), 897–904.
Shukur, W. A., Abdullah, W. N., & Qurban, L. K. (2018). Information Hiding In Digital Video Using DCT, DWT and CvT. Journal of Physics: Conference Series, 1003(1), 12035.
Mstafa, R. J., & Elleithy, K. M. (2015). A high payload video steganography algorithm in DWT domain based on BCH codes (15, 11). Wireless Telecommunications Symposium (WTS), 2015, 1–8.
Jakhmola, R., Rani, R. (2019). Enhanced Digital Video Watermarking Technique Using 2-Level DWT. In Progress in Advanced Computing and Intelligent Engineering (pp. 415–424). Springer.
Sadek, M. M., Khalifa, A. S., & Mostafa, M. G. M. (2016). Robust video steganography algorithm using adaptive skin-tone detection. Multimedia Tools and Applications, 1, 1–21.
Mstafa, R. J., Elleithy, K. M., & Abdelfattah, E. (2017). A robust and secure video steganography method in DWT-DCT domains based on multiple object tracking and ECC. IEEE Access, 5, 5354–5365.
Zhang, H., Cao, Y., & Zhao, X. (2015). Motion vector-based video steganography with preserved local optimality. Multimedia Tools and Applications, 89, 1–17.
Cao, Y., Wang, Y., Zhao, X., Zhu, M., & Xu, Z. (2018) Cover block decoupling for content-adaptive H. 264 steganography. In Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security (pp. 23–30).
Ren, Y., Zhai, L., Wang, L., & Zhu, T. (2014). Video steganalysis based on subtractive probability of optimal matching feature. In Proceedings of the 2nd ACM workshop on Information hiding and multimedia security (pp. 83–90).
Wang, K., Zhao, H., & Wang, H. (2014). Video steganalysis against motion vector-based steganography by adding or subtracting one motion vector value. IEEE Transactions on Information Forensics and Security, 9(5), 741–751.
Wang, P., Cao, Y., Zhao, X., & Zhu, M. A Steganalytic algorithm to detect DCT-based data hiding methods for H. 264/AVC videos. In Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security (pp. 123–133).
Khan, S., Ibrahim, M. S., Ebrahim, M., & Amjad, H. (2015). FPGA implementation of secure force (64-bit) low complexity encryption algorithm. International Journal of Computer Network and Information Security, 7(12), 60.
Pevny, T., Bas, P., & Fridrich, J. (2010). Steganalysis by subtractive pixel adjacency matrix. IEEE Transactions on Information Forensics and Security, 5(2), 215–224.
Wang, K., Han, J., & Wang, H. (2014). Digital video steganalysis by subtractive prediction error adjacency matrix. Multimedia Tools and Applications, 72(1), 313–330.
Da, T., Li, Z., & Feng, B. A Video Steganalysis Algorithm for H. 264/AVC Based on the Markov Features. In International Conference on Intelligent Computing (pp. 47–59).
Thomee, B., Shamma, D. A., Friedland, G., Elizalde, B., Ni, K., Poland, D., Borth, D., & Li, L.-J. (2016). YFCC100M: The new data in multimedia research. Communications of the ACM, 59(2), 64–73.
Fridrich, J. (2004). Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In International Workshop on Information Hiding (pp. 67–81).
Chang, C.-C., & Lin, C.-J. (2011). LIBSVM: A library for support vector machines. ACM Transactions on Intelligent Systems and Technology, 2(3), 27.
Acknowledgements
This research work is supported by Technical Education Quality Improvement Project III (TEQIP III) of MHRD, Government of India assisted by World Bank under Grant Number P154523 and sanctioned to UIET, Panjab University, Chandigarh (India).
Funding
The authors have not disclosed any funding.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Competing interests
The authors have not disclosed any competing interests.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Dalal, M., Juneja, M. Steganalysis of DWT Based Steganography Technique for SD and HD Videos. Wireless Pers Commun 128, 2441–2452 (2023). https://doi.org/10.1007/s11277-022-10050-3
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-022-10050-3