Skip to main content
Log in

StegVRN: Enhancing Quality of Video Steganography Using CNN-Based Object Selection

  • Original Research
  • Published:
SN Computer Science Aims and scope Submit manuscript

Abstract

The dynamic nature of video content facilitates steganographic processes, and recent advancements in Deep Learning, particularly Convolutional Neural Networks (CNNs), have led to the development of new steganographic techniques. The main contribution lies in using CNN-based deep learning techniques for object identification, with a particular focus on leveraging the full potential of ResNet and VGGNet architectures to achieve superior object classification results. In this paper, StegVRN-a deep learning model for object detection and data embedding using edge detection technique is proposed. StegVRN comprises 2 models: the first model, VEDS (VGGNet-based Edge Detection Steganography), employs the VGGNet architecture for object detection and utilizes an edge detection algorithm for data embedding. The second model, named REDS (ResNet-based Edge Detection Steganography), is based on the ResNet architecture and incorporates an edge detection algorithm for object detection and data embedding. Both models have been applied with three different edge detection techniques, which are Canny, Sobel, and Haar, for data embedding. Experimental results demonstrate that the StegVRN-based steganography framework is easy to optimize, and increasing the depth of layers in ResNet can enhance accuracy while reducing loss. STEGVRN has been evaluated using the Imagenet 1000 dataset for secret images and the UCF101 dataset for cover videos. The comparison with other state-of-the-art methods is based on stego quality metrics, such as MSE, PSNR, and SSIM. The experimental outcomes demonstrate that STEGVRN outperforms other steganography methodologies in terms of stego video perceptual quality, secret data decoding accuracy, and embedding capacity.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Data availability

The ImageNet1000 Dataset used to select secret images is freely downloadable from Kaggle.com. The UCF101 dataset from which cover videos are selected is freely downloadable from official website http://crcv.ucf.edu/data/UCF101.php.

Abbreviations

Conv:

Convolutional layer

ReLU:

Rectified linear unit activation function

Max-Pooling:

Max-pooling layer

FC:

Fully connected layer

Softmax:

Softmax activation function

X:

Input image

Z:

Output activation

W:

Weights of the layer

A:

Activation

Fh:

Height of the filter

Fw:

Width of the filter

P:

Max-pooling operation

s:

Stride

b:

Bias vector

K:

Total number of classes

P(y = j|X):

Probability of input X belonging to class j

References

  1. Ernawan F, Abdullah MF. A New Embedding Technique Based On Psychovisual Threshold for Robust and Secure Compressed Video Steganography. In: 2020 XXXIIIrd General Assembly and Scientific Symposium of the International Union of Radio Science [Internet]. Rome, Italy: IEEE; 2020 [cited 2023 Aug 4]. p. 1–5. Available from: https://ieeexplore.ieee.org/document/9231989/

  2. Mstafa RJ, Younis YM, Hussein HI, Atto M. A new video steganography scheme based on Shi-Tomasi corner detector. IEEE Access. 2020;8:161825–37.

    Article  Google Scholar 

  3. Zhao H, Liu Y, Wang Y, Liu S, Feng C. A video steganography method based on transform block decision for H.265/HEVC. IEEE Access. 2021;9:55506–21.

    Article  Google Scholar 

  4. Tang W, Li B, Tan S, Barni M, Huang J. CNN-based adversarial embedding for image steganography. IEEE TransInformForensic Secur. 2019;14(8):2074–87.

    Article  Google Scholar 

  5. Dalal M, Juneja M. A secure video steganography scheme using DWT based on object tracking. Inform Secur J Global Perspect. 2022;31(2):196–213.

    Article  Google Scholar 

  6. Li M, Li Z, Zhang Z. A VVC video steganography based on coding units in chroma components with a deep learning network. Symmetry. 2022;15(1):116.

    Article  Google Scholar 

  7. Djeddi C, Jamil A, Siddiqi I, editors. Pattern Recognition and Artificial Intelligence: Third Mediterranean Conference, MedPRAI 2019, Istanbul, Turkey, December 22–23, 2019, Proceedings [Internet]. Cham: Springer International Publishing; 2020 [cited 2023 Aug 4]. (Communications in Computer and Information Science; 1144). https://doi.org/10.1007/978-3-030-37548-5

  8. Fu Z, Wang F, Cheng X. The secure steganography for hiding images via GAN. J Image Video Proc. 2020;2020(1):46.

    Article  Google Scholar 

  9. Hayes J, Danezis G. Generating Steganographic Images via Adversarial Training [Internet]. arXiv; 2017 [cited 2023 Aug 4]. Available from: http://arxiv.org/abs/1703.00371

  10. Selim NM, Guirguis SK, Hassan YF. Video Steganography for Image and Text Using Deep Genetic Algorithm and LSB.

  11. Mishra A. VStegNET: Video Steganography Network using Spatio-Temporal features and Micro-Bottleneck.

  12. Suresh M, Sam IS. Exponential fractional cat swarm optimization for video steganography. Multimed Tools Appl. 2021;80(9):13253–70.

    Article  Google Scholar 

  13. Fuad M, Ernawan F, Hui LJ. Video scene change detection based on histogram analysis for hiding message. J Phys Conf Ser. 2021;1918(4):042141.

    Article  Google Scholar 

  14. Reshma VK, Vinod Kumar RS, Shahi D, Shyjith MB. Chicken-moth search optimization-based deep convolutional neural network for image steganography. SCPE. 2020;21(2):217–32.

    Article  Google Scholar 

  15. Al-Ahmad A, Almousa OS, Abuein Q. Enhancing Steganography by Image Segmentation and Multi-level Deep Hiding. Int j commun netw inf secur [Internet]. 2022 Apr 16 [cited 2023 Aug 4]; 13(1). Available from: https://www.ijcnis.org/index.php/ijcnis/article/view/4869

  16. Weng X, Li Y, Chi L, Mu Y. High-Capacity Convolutional Video Steganography with Temporal Residual Modeling. In: Proceedings of the 2019 on International Conference on Multimedia Retrieval [Internet]. Ottawa ON Canada: ACM; 2019 [cited 2023 Aug 4]. p. 87–95. https://doi.org/10.1145/3323873.3325011

  17. Ray B, Mukhopadhyay S, Hossain S, Ghosal SK, Sarkar R. Image steganography using deep learning based edge detection. Multimed Tools Appl. 2021;80(24):33475–503.

    Article  Google Scholar 

  18. Mou C, Xu Y, Song J, Zhao C, Ghanem B, Zhang J. Large-capacity and Flexible Video Steganography via Invertible Neural Network [Internet]. arXiv; 2023 [cited 2023 Aug 4]. Available from: http://arxiv.org/abs/2304.12300

  19. Hacimurtazaoglu M, Tutuncu K. LSB-based pre-embedding video steganography with rotating & shifting poly-pattern block matrix. PeerJ Comput Sci. 2022;8:e843.

    Article  Google Scholar 

  20. Himthani V, Dhaka VS, Kaur M, Rani G, Oza M, Lee HN. Comparative performance assessment of deep learning based image steganography techniques. Sci Rep. 2022;12(1):16895.

    Article  Google Scholar 

  21. Shang Y, Jiang S, Ye D, Huang J. Enhancing the security of deep learning steganography via adversarial examples. Mathematics. 2020;8(9):1446.

    Article  Google Scholar 

  22. Chai H, Li Z, Li F, Zhang Z. An End-to-end video steganography network based on a coding unit mask. Electronics. 2022;11(7):1142.

    Article  Google Scholar 

  23. Goodfellow I, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, et al. Generative Adversarial Nets.

Download references

Acknowledgements

This work is funded by Vision Group of Technology (VGST), Government of Karnataka, India under CISEE scheme. The authors would like to express gratitude to Management and Staff of JNN College of Engineering and VGST for their invaluable support.

Funding

The work of G. R. Manjula was funded by Vision Group on Science and Technology, GRD-749.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to R. B. Sushma.

Ethics declarations

Conflict of interest

We wish to confirm that there are no known conflicts of interest associated with this publication and there is a financial support for this research work from Vision Group of Science and Technology (VGST), Karnataka, India. The organization supports research work of academicians through funding. There is no objection from VGST and JNNCE regarding publishing the research work. We confirm that the manuscript has been read and approved by all named authors and that there are no other persons who satisfied the criteria for authorship but are not listed. We further confirm that the order of authors listed in the manuscript has been approved by all of us. We confirm that we have given due consideration to the protection of intellectual property associated with this work and that there are no impediments to publication, including the timing of publication, with respect to intellectual property. In so doing, we confirm that we have followed the regulations of our institutions concerning intellectual property. We understand that the Corresponding Author is the sole contact for the Editorial process (including Editorial Manager and direct communications with the office). He/she is responsible for communicating with the other authors about progress, submissions of revisions, and final approval of proofs. We confirm that we have provided a current, correct email address which is accessible by the corresponding author.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sushma, R.B., Manjula, G.R. StegVRN: Enhancing Quality of Video Steganography Using CNN-Based Object Selection. SN COMPUT. SCI. 5, 227 (2024). https://doi.org/10.1007/s42979-023-02498-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s42979-023-02498-2

Keywords

Navigation