Skip to main content
Log in

Steganalysis of DWT Based Steganography Technique for SD and HD Videos

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Steganography is mainly used for secure and covert communication via digital media transferred through the internet. A successful steganography technique should have high imperceptibility, payload and should be robust against attacks. Another main aspect of the successful steganography technique is that it should not be vulnerable to the attack of steganalysis. Therefore, for covert communication, the testing of video steganography technique must be performed against steganalysis. This paper intended to perform steganalysis of the technique proposed by the authors (Dalal and Juneja in Multimed Tools Appl 1–21, 2018) using DWT (Discrete Wavelet Transform) based video steganography scheme for SD and HD videos. The testing has been done using state-of-the-art steganalysis techniques using machine learning among which one is for DWT based image steganalysis, and the other two are for H.264/AVC video steganalysis. The performance has been calculated using different objective parameters such as detection accuracy, specificity, and sensitivity. The experimental results demonstrated the effectiveness of the proposed technique against steganalysis with only maximum 56.6% average detection accuracy.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

Data availability

Enquiries about data availability should be directed to the authors.

References

  1. Dalal, M., & Juneja, M. (2018). A robust and imperceptible steganography technique for SD and HD videos. Multimedia Tools and Applications 1–21.

  2. Dalal, M., & Juneja, M. (2018). Video steganography techniques in spatial domain—A Survey. In Proceedings of the international conference on computing and communication systems (pp. 705–711). Singapore: Springer.

  3. Petitcolas, F. A. P., Anderson, R. J., & Kuhn, M. G. (1999). Information hiding—A survey. Proceedings of the IEEE, 87(7), 1062–1078.

    Article  Google Scholar 

  4. Dalal, M., & Juneja, M. (2018). Video steganalysis to obstruct criminal activities for digital forensics: A survey. International Journal of Electronic Security and Digital Forensics, 10(4), 338–355.

    Article  Google Scholar 

  5. Das, S., Sharma, S., Bakshi, S., & Mukherjee, I. (2018). A Framework for Pixel Intensity Modulation Based Image Steganography. In Progress in advanced computing and intelligent engineering (pp. 3–14). Springer.

  6. Rabie, T., & Baziyad, M. (2019). The Pixogram: Addressing High Payload Demands for Video Steganography. IEEE Access, 7, 21948–21962.

    Article  Google Scholar 

  7. Patel, K., Rora, K. K., Singh, K., & Verma, S. (2013) Lazy wavelet transform based steganography in video. In International Conference on Communication Systems and Network Technologies CSNT 2013 (pp. 497–500).

  8. Kumar, G. S. N., Bhavanam, S. N., & Midasala, V. (2014) Image Hiding in a Video-based on DWT & LSB Algorithm. In ICPVS Conference.

  9. Ramalingam, M., & Isa, N. A. M. (2014). Video steganography based on integer Haar wavelet transforms for secured data transfer. Indian Journal of Science and Technology, 7(7), 897–904.

    Article  Google Scholar 

  10. Shukur, W. A., Abdullah, W. N., & Qurban, L. K. (2018). Information Hiding In Digital Video Using DCT, DWT and CvT. Journal of Physics: Conference Series, 1003(1), 12035.

    Google Scholar 

  11. Mstafa, R. J., & Elleithy, K. M. (2015). A high payload video steganography algorithm in DWT domain based on BCH codes (15, 11). Wireless Telecommunications Symposium (WTS), 2015, 1–8.

    Google Scholar 

  12. Jakhmola, R., Rani, R. (2019). Enhanced Digital Video Watermarking Technique Using 2-Level DWT. In Progress in Advanced Computing and Intelligent Engineering (pp. 415–424). Springer.

  13. Sadek, M. M., Khalifa, A. S., & Mostafa, M. G. M. (2016). Robust video steganography algorithm using adaptive skin-tone detection. Multimedia Tools and Applications, 1, 1–21.

    Google Scholar 

  14. Mstafa, R. J., Elleithy, K. M., & Abdelfattah, E. (2017). A robust and secure video steganography method in DWT-DCT domains based on multiple object tracking and ECC. IEEE Access, 5, 5354–5365.

    Google Scholar 

  15. Zhang, H., Cao, Y., & Zhao, X. (2015). Motion vector-based video steganography with preserved local optimality. Multimedia Tools and Applications, 89, 1–17.

    Google Scholar 

  16. Cao, Y., Wang, Y., Zhao, X., Zhu, M., & Xu, Z. (2018) Cover block decoupling for content-adaptive H. 264 steganography. In Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security (pp. 23–30).

  17. Ren, Y., Zhai, L., Wang, L., & Zhu, T. (2014). Video steganalysis based on subtractive probability of optimal matching feature. In Proceedings of the 2nd ACM workshop on Information hiding and multimedia security (pp. 83–90).

  18. Wang, K., Zhao, H., & Wang, H. (2014). Video steganalysis against motion vector-based steganography by adding or subtracting one motion vector value. IEEE Transactions on Information Forensics and Security, 9(5), 741–751.

    Article  Google Scholar 

  19. Wang, P., Cao, Y., Zhao, X., & Zhu, M. A Steganalytic algorithm to detect DCT-based data hiding methods for H. 264/AVC videos. In Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security (pp. 123–133).

  20. Khan, S., Ibrahim, M. S., Ebrahim, M., & Amjad, H. (2015). FPGA implementation of secure force (64-bit) low complexity encryption algorithm. International Journal of Computer Network and Information Security, 7(12), 60.

    Article  Google Scholar 

  21. Pevny, T., Bas, P., & Fridrich, J. (2010). Steganalysis by subtractive pixel adjacency matrix. IEEE Transactions on Information Forensics and Security, 5(2), 215–224.

    Article  Google Scholar 

  22. Wang, K., Han, J., & Wang, H. (2014). Digital video steganalysis by subtractive prediction error adjacency matrix. Multimedia Tools and Applications, 72(1), 313–330.

    Article  Google Scholar 

  23. Da, T., Li, Z., & Feng, B. A Video Steganalysis Algorithm for H. 264/AVC Based on the Markov Features. In International Conference on Intelligent Computing (pp. 47–59).

  24. Thomee, B., Shamma, D. A., Friedland, G., Elizalde, B., Ni, K., Poland, D., Borth, D., & Li, L.-J. (2016). YFCC100M: The new data in multimedia research. Communications of the ACM, 59(2), 64–73.

    Article  Google Scholar 

  25. Fridrich, J. (2004). Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In International Workshop on Information Hiding (pp. 67–81).

  26. Chang, C.-C., & Lin, C.-J. (2011). LIBSVM: A library for support vector machines. ACM Transactions on Intelligent Systems and Technology, 2(3), 27.

    Article  Google Scholar 

Download references

Acknowledgements

This research work is supported by Technical Education Quality Improvement Project III (TEQIP III) of MHRD, Government of India assisted by World Bank under Grant Number P154523 and sanctioned to UIET, Panjab University, Chandigarh (India).

Funding

The authors have not disclosed any funding.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mamta Juneja.

Ethics declarations

Competing interests

The authors have not disclosed any competing interests.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Dalal, M., Juneja, M. Steganalysis of DWT Based Steganography Technique for SD and HD Videos. Wireless Pers Commun 128, 2441–2452 (2023). https://doi.org/10.1007/s11277-022-10050-3

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-022-10050-3

Keywords

Navigation