Abstract
In the last two decades, the science of covertly concealing and communicating data has acquired tremendous significance due to the technological advancement in communication and digital content. Steganography is the art of concealing secret data in a particular interactive media transporter, e.g., text, audio, image, and video data in order to build a covert communication between authorized parties. Nowadays, video steganography techniques have become important in many video-sharing and social networking applications such as Livestreaming, YouTube, Twitter, and Facebook because of the noteworthy development of advanced video over the Internet. The performance of any steganographic method ultimately relies on the imperceptibility, hiding capacity, and robustness. In the past decade, many video steganography methods have been proposed; however, the literature lacks of sufficient survey articles that discuss all techniques. This paper presents a comprehensive study and analysis of numerous cutting edge video steganography methods and their performance evaluations from literature. Both compressed and raw video steganography methods are surveyed. In the compressed domain, video steganography techniques are categorized according to the video compression stages as venues for data hiding such as intra frame prediction, inter frame prediction, motion vectors, transformed and quantized coefficients, and entropy coding. On the other hand, raw video steganography methods are classified into spatial and transform domains. This survey suggests current research directions and recommendations to improve on existing video steganography techniques.
Similar content being viewed by others
References
Abu-Marie W, Gutub A, Abu-Mansour H (2010) Image based steganography using truth table based and determinate Array on RGB indicator. Int J Signal and Image Process 1:196–204
Ahmad J, Sajjad M, Mehmood I, Rho S, Baik SW (2015) Saliency-weighted graphs for efficient visual content description and their applications in real-time image retrieval systems. J Real-Time Image Proc:1–17
Alavianmehr MA, Rezaei M, Helfroush MS, and Tashk A (2012) A lossless data hiding scheme on video raw data robust against H.264/AVC compression In: 2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE), pp 194–198
Arsalan M, Malik SA, Khan A (2012) Intelligent reversible watermarking in integer wavelet domain for medical images. J Syst Softw 85:883–894
Barni M, Bartolini F, Checcacci N (2005) Watermarking of MPEG-4 video objects. IEEE Trans Multimedia 7:23–32
Bhole AT, Patel R (2012) Steganography over video file using Random Byte Hiding and LSB technique, In: 2012 IEEE. International Conference on Computational Intelligence & Computing Research (ICCIC), pp. 1–6
Bin H, Li-Yi Z, Wei-Dong Z (2011) A novel steganography algorithm based on motion vector and matrix encoding, In: 2011 IEEE. 3rd International Conference on Communication Software and Networks (ICCSN), pp 406–409
Chang F-C, Huang H-C, Hang H-M (2007) Layered access control schemes on watermarked scalable media. The J VLSI Sig Proc Syst Sig, Image, and Video Technol 49:443–455
Chang P-C, Chung K-L, Chen J-J, Lin C-H, Lin T-J (2014) A DCT/DST-based error propagation-free data hiding algorithm for HEVC intra-coded frames. J Vis Commun Image Represent 25:239–253
Cheddad A, Condell J, Curran K, McKevitt P (2008) Skin tone based Steganography in video files exploiting the YCbCr colour space, In: IEEE International Conference on Multimedia and Expo, 2008, pp 905–908
Cheddad A, Condell J, Curran K, Mc Kevitt P (2009a) A secure and improved self-embedding algorithm to combat digital document forgery. Signal Process 89:2324–2332
Cheddad A, Condell J, Curran K, Mc Kevitt P (2009b) A skin tone detection algorithm for an adaptive approach to steganography. Signal Process 89:2465–2478
Cheddad A, Condell J, Curran K, Mc Kevitt P (2010) Digital image steganography: survey and analysis of current methods. Signal Process 90:727–752
Das R and Tuithung T (2012) A novel steganography method for image based on Huffman Encoding, In: 2012 3rd National Conference on Emerging Trends and Applications in Computer Science (NCETACS), pp. 14–18
Dasgupta K, Mondal JK, Dutta P (2013) Optimized video steganography using genetic algorithm (GA). Procedia Technol 10:131–137
Diop I, Farss SM, Tall K, Fall PA, Diouf ML, Diop AK (2014) Adaptive steganography scheme based on LDPC codes. In: 2014 16th International Conference on Advanced Communication Technology (ICACT), pp. 162–166
Egiazarian K, Astola J, Ponomarenko N, Lukin V, Battisti F, and Carli M (2006) New full-reference quality metrics based on HVS In: CD-ROM proceedings of the second international workshop on video processing and quality metrics, Scottsdale, USA
Eltahir ME, Kiah LM, and Zaidan BB (2009) High rate video streaming steganography In: International Conference on Information Management and Engineering, ICIME ‘09. pp 550–553
Farschi S, Farschi H A novel chaotic approach for information hiding in image. Nonlinear Dyn 69:1525–1539 2012/09/01 2012
Fontaine C, Galand F (2007) How can reed-solomon codes improve steganographic schemes? In: Furon T, Cayre F, Doërr G, Bas P (eds) Information Hiding, vol 4567. Springer, Berlin, pp 130–144
Guangjie L, Weiwei L, Yuewei D, and Shiguo L (2011) An adaptive matrix embedding for image steganography, In: 2011 Third International Conference on Multimedia information networking and security (MINES) pp 642–646. doi:10.1109/MINES.2011.138
Guangjie L, Weiwei L, Yuewei D, Shiguo L (2012) Adaptive steganography based on syndrome-trellis codes and local complexity, In: 2012 Fourth International Conference on Multimedia Information Networking and Security (MINES), pp 323–327
Gutub AA-A (2010) Pixel indicator technique for RGB image steganography. J Emerging Technol Web Intell 2:56–64
Gutub A, Ankeer M, Abu-Ghalioun M, Shaheen A, Alvi A (2008) Pixel indicator high capacity technique for RGB image based steganography. In: WoSPA 2008-5th IEEE International Workshop on Signal Processing and its Applications, University of Sharjah, Sharjah, U.A.E. 18-20 March 2008
Hanafy A, Salama G, Mohasseb YZ (2008) A secure covert communication model based on video steganography, In: IEEE Military Communications Conference, 2008 MILCOM 2008 pp 1–6
Hasnaoui M, Mitrea M (2014) Multi-symbol QIM video watermarking. Signal Process Image Commun 29:107–127
He Y, Yang G, Zhu N (2012) A real-time dual watermarking algorithm of H.264/AVC video stream for video-on-demand service. AEU Int J Electron Commun 66:305–312
Horng S-J, Rosiyadi D, Li T, Takao T, Guo M, Khan MK (2013) A blind image copyright protection scheme for e-government. J Vis Commun Image Represent 24:1099–1105
Horng S-J, Rosiyadi D, Fan P, Wang X, Khan MK (2014) An adaptive watermarking scheme for e-government document images. Multimed Tools Appl 72:3085–3103
Hu S, KinTak U (2011) A novel video steganography based on non-uniform rectangular partition In: 2011 IEEE. 14th International Conference on Computational Science and Engineering (CSE), pp 57–61
Hu Y, Zhang C, Su Y (2007) Information hiding based on intra prediction modes for H. 264/AVC In: IEEE. International Conference on Multimedia and Expo 2007, pp 1231–1234
Huang J, Shi YQ (2002) Reliable information bit hiding. IEEE Trans Circuits Syst Video Technol 12:916–920
Huang H-C, Chu S-C, Pan J-S, Huang C-Y, Liao B-Y (2011) Tabu search based multi-watermarks embedding algorithm with multiple description coding. Inf Sci 181:3379–3396
Islam S, Modi MR, Gupta P (2014) Edge-based image steganography. EURASIP J Inf Secur 2014:1–14
Jue W, Min-Qing Z Juan-Li S (2011) Video steganography using motion vector components In: 2011 IEEE. 3rd International Conference on Communication Software and Networks (ICCSN), pp 500–503
Kapotas SK Skodras AN, (2008) A new data hiding scheme for scene change detection in H. 264 encoded video sequences, In: 2008 IEEE. International Conference on Multimedia and Expo
Kawaguchi E, Eason RO (1999) Principles and applications of BPCS steganography In: Photonics East (ISAM, VVDC, IEMB), pp 464–473
Ke N Weidong Z (2013) A video steganography scheme based on H. 264 bitstreams replaced In: 4th IEEE International Conference on Software Engineering and Service Science (ICSESS), pp 447–450
Kelash HM, Abdel Wahab OF, Elshakankiry OA, El-sayed HS (2013) Hiding data in video sequences using steganography algorithms, In: 2013 International Conference on ICT Convergence (ICTC), pp. 353–358
Khan A, Malik SA (2014) A high capacity reversible watermarking approach for authenticating images: exploiting down-sampling, histogram processing, and block selection. Inf Sci 256:162–183
Khan A, Malik SA, Ali A, Chamlawi R, Hussain M, Mahmood MT, Usman I (2012) Intelligent reversible watermarking and authentication: hiding depth map information for 3D cameras. Inf Sci 216:155–175
Khan A, Siddiqa A, Munib S, Malik SA (2014) A recent survey of reversible watermarking techniques. Inf Sci 279:251–272
Khupse S and Patil NN (2014) An adaptive steganography technique for videos using Steganoflage In: 2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT), pp 811–815
Li G, Ito Y, Yu X, Nitta N, Babaguchi N (2009) Recoverable privacy protection for video content distribution. EURASIP J Inf Secur 2009:4
Li Y, Chen H-X Zhao Y (2010) A new method of data hiding based on H. 264 encoded video sequences, In: IEEE 10th International Conference on Signal Processing (ICSP), 2010 pp. 1833–1836
Liao K, Lian S, Guo Z, Wang J (2012) Efficient information hiding in H. 264/AVC video coding. Telecommun Syst 49:261–269
Lie W-N, Lin C-W (2006) Enhancing video error resilience by using data-embedding techniques, IEEE Trans Circuits Syst Video Technol 16:300–308
Lin W-H, Horng S-J, Kao T-W, Fan P, Lee C-L, Pan Y (2008) An efficient watermarking method based on significant difference of wavelet coefficient quantization. IEEE Trans Multimed 10:746–757
Lin W-H, Horng S-J, Kao T-W, Chen R-J, Chen Y-H, Lee C-L, Terano T (2009a) Image copyright protection with forward error correction. Expert Syst Appl 36:11888–11894
Lin W-H, Wang Y-R, Horng S-J, Kao T-W, Pan Y (2009b) A blind watermarking method using maximum wavelet coefficient quantization. Expert Syst Appl 36:11509–11516
Lin W-H, Wang Y-R, Horng S-J (2009c) A wavelet-tree-based watermarking method using distance vector of binary cluster. Expert Syst Appl 36:9869–9878
List P, Joch A, Lainema J, Bjontegaard G, Karczewicz M (2003) Adaptive deblocking filter. IEEE Trans Circuits Syst Video Technol 13:614–619
Liu B, Liu F, Yang C and Sun Y (2008) Secure steganography in compressed video bitstreams, In: Availability, Reliability and Security, ARES 08. Conference on Third International, 2008, pp 1382–1387
Liu Y, Li Z, Ma X, and Liu J (2012a) A novel data hiding scheme for H. 264/AVC video streams without intra-frame distortion drift In: IEEE 14th International Conference on Communication Technology (ICCT), 2012, pp 824–828
Liu Y, Li Z, Ma X and Liu J (2012b) A robust data hiding algorithm for H. 264/AVC video streams without intra-frame distortion drift, In: Proceedings of the 2012 Second International Conference on Electric Information and Control Engineering-Volume 01, pp 182–186
Liu Y, Li Z, Ma X Liu J (2013) A robust data hiding algorithm for H. 264/AVC video streams. J Syst Softw
Lou D-C, Hu C-H (2012) LSB steganographic method based on reversible histogram transformation function for resisting statistical steganalysis. Inf Sci 188:346–358
Lu C-S, Chen J-R, Fan K-C (2005) Real-time frame-dependent video watermarking in VLC domain. Signal Process Image Commun 20:624–642
Lusson F, Bailey K, Leeney M, Curran K (2013) A novel approach to digital watermarking, exploiting colour spaces. Signal Process 93:1268–1294
Ma X, Li Z, Tu H, Zhang B (2010) A data hiding algorithm for H. 264/AVC video streams without intra-frame distortion drift. IEEE Trans Circuits Syst Video Technol 20:1320–1330
Masoumi M, Amiri S (2013) A blind scene-based watermarking for video copyright protection. AEU Int J Electron Commun 67:528–535
Mehmood I, Sajjad M, Rho S, Baik SW (2016) Divide-and-conquer based summarization framework for extracting affective video content. Neurocomputing 174:393–403
Mercuri RT (2004) The many colors of multimedia security. Commun ACM 47:25–29
Meuel P, Chaumont M, Puech W (2007) Data hiding in H. 264 video for lossless reconstruction of region of interest, In: EUSIPCO 07: 15th European Signal Processing Conference, pp. 2301–2305
Mobasseri BG Marcinak MP (2005) Watermarking of MPEG-2 video in compressed domain using VLC mapping In: Proceedings of the 7th workshop on Multimedia and security, pp 91–94
Moon SK Raut RD (2013) Analysis of secured video steganography using computer forensics technique for enhance data security In: 2013 IEEE. Second International Conference on Image Information Processing (ICIIP), pp. 660–665
Mstafa R J Elleithy KM (2014) A highly secure video steganography using hamming code (7, 4) In: Systems, Applications and Technology Conference (LISAT), 2014 IEEE. Long Island, pp 1–6
Mstafa RJ Elleithy KM (2015a) A novel video steganography algorithm in the wavelet domain based on the KLT tracking algorithm and BCH codes In: IEEE Long Island Systems Applications and Technology Conference (LISAT), 2015, pp. 1–7
Mstafa RJ Elleithy KM (2015b) A high payload video steganography algorithm in DWT domain based on BCH codes (15, 11) In: Wirel Telecommunications Symp (WTS), 2015 pp 1–8
Mstafa RJ and Elleithy KM (2015c) A new video steganography algorithm based on the multiple object tracking and hamming codes In: 2015 IEEE 14th International Conference on Machine Learning and Applications (ICMLA), pp 335–340
Mstafa RJ, Elleithy KM (2016a) A DCT-based robust video steganographic method using BCH error correcting codes. IEEE Long Island Systems, Applications and Technology Conference (LISAT) 2016:1–6
Mstafa RJ, Elleithy KM (2016b) A video steganography algorithm based on Kanade-Lucas-Tomasi tracking algorithm and error correcting codes. Multimed Tools Appl 75:10311–10333
Muhammad K, Jamil A, Haleem F, Zahoor J, Muhammad S, Sung Wook B (2015a) A Secure Method for Color Image Steganography using Gray-Level Modification and Multi-level Encryption. KSII Transactions on Internet and Information Systems (TIIS) 9:1938–1962
Muhammad K, Mehmood I, Lee MY, Ji SM Baik SW (2015b) Ontology-based secure retrieval of semantically significant visual contents, arXiv preprint arXiv:1510.02177,
Muhammad K, Sajjad M, Mehmood I, Rho S, Baik S (2015c) A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image Multimed Tools Appl pp 1–27, 2015/05/24
Muhammad K, Sajjad M, Baik SW (2016) Dual-level security based Cyclic18 steganographic method and its application for secure transmission of Keyframes during wireless capsule endoscopy. J Med Syst 40:1–16
Noda H, Furuta T, Niimi M Kawaguchi E (2004) Application of BPCS steganography to wavelet compressed video, In: 2004 International Conference on Image Processing ICIP’04 pp 2147–2150
Pan F, Xiang L, Yang X-Y, Guo Y (2010) Video steganography using motion vector and linear block codes In: 2010 IEEE. International Conference on Software Engineering and Service Sciences (ICSESS), pp 592–595
Patel K, Rora KK, Singh K, and Verma S (2013) Lazy wavelet transform based steganography in video In: 2013 International Conference on Communication Systems and Network Technologies (CSNT), pp 497–500
Paul R, Acharya AK, Yadav VK Batham S (2013) Hiding large amount of data using a new approach of video steganography In: Confluence 2013: The Next Generation Information Technology Summit (4th International Conference), pp 337–343
Petitcolas FA, Anderson RJ, Kuhn MG (1999) Information hiding-a survey. Proc IEEE 87:1062–1078
Ponomarenko N, Silvestri F, Egiazarian K, Carli M, Astola J Lukin V (2007) On between-coefficient contrast masking of DCT basis functions. In: Proceedings of the Third International Workshop on Video Processing and Quality Metrics for Consumer Electronics, VPQM 2007, Scottsdale, Arizona, USA, 25-26 January 2007
Qazanfari K, Safabakhsh R (2014) A new steganography method which preserves histogram: generalization of LSB++. Inf Sci 277:90–101
Qian Z, Feng G, Zhang X, Wang S (2011) Image self-embedding with high-quality restoration capability. Digital Signal Process 21:278–286
Ritchey PC, Rego VJ (2012) A context sensitive tiling system for information hiding. J Inf Hiding and Multimed Sig Process 3:212–226
Robie DL, Mersereau RM (2002) Video error correction using steganography. EURASIP J Appl Sig Proc 2002:164–173
Rosiyadi D, Horng S-J, Fan P, Wang X, Khan MK, Pan Y (2012a) Copyright protection for e-government document images. IEEE MultiMedia 19:62–73
Rosiyadi D, Horng S-J, Suryana N, Masthurah N (2012b) A comparison between the hybrid using genetic algorithm and the pure hybrid watermarking scheme. Int J Comput Theory Eng (IJCTE) 4:329–331
Rupa C (2013) A digital image steganography using sierpinski gasket fractal and PLSB. J Inst Eng (India): Series B 94:147–151
Sadek MM, Khalifa AS, Mostafa MG (2015) Video steganography: a comprehensive review. Multimed Tools Appl 74(17):7063–7094
Sadek MM, Khalifa AS, Mostafa MG (2016) Robust video steganography algorithm using adaptive skin-tone detection. Multimed Tools Appl:1–21
Sajjad M, Muhammad K, Baik SW, Rho S, Jan Z, Yeo S-S, Mehmood I (2016) Mobile-cloud assisted framework for selective encryption of medical images with steganography for resource-constrained devices. Multimed Tools Appl:1–18
Shahid Z, Chaumont M, Puech W (2013) Considering the reconstruction loop for data hiding of intra-and inter-frames of H. 264/AVC. SIViP 7:75–93
Shanableh T (2012) Data hiding in MPEG video files using multivariate regression and flexible macroblock ordering. IEEE Trans Inf Forensics Secur 7:455–464
Spaulding J, Noda H, Shirazi MN, Kawaguchi E (2002) BPCS steganography using EZW lossy compressed images. Pattern Recogn Lett 23:1579–1587
Stanescu D, Stratulat M, Ciubotaru B, Chiciudean D, Cioarga R Micea M (2007) Embedding data in video stream using steganography In: 4th International Symposium on Applied Computational Intelligence and Informatics, 2007. SACI ‘07, pp 241–244
Subhedar MS, Mankar VH (2014) Current status and key issues in image steganography: a survey. Comput Sci Rev 13–14:95–113
Sun SL (2015) A new information hiding method based on improved BPCS steganography. Adv Multimedia 2015:1–7
Tadiparthi GR, Sueyoshi T (2008) A novel steganographic algorithm using animations as cover. Decis Support Syst 45:937–948
Thiesse JM, Jung J Antonini M (2010a) Data hiding of motion information in chroma and luma samples for video compression In: 2010 IEEE International Workshop on Multimedia Signal Processing (MMSP), pp 217–221
Thiesse JM, Jung J, Antonini M (2010b) Data hiding of intra prediction information in chroma samples for video compression In: 2010 17th IEEE International Conference on Image Processing (ICIP), pp 2861–2864
Thiesse JM, Jung J, Antonini M (2011) Rate distortion data hiding of motion vector competition information in Chroma and luma samples for video compression. IEEE Trans Circuits Syst Video Technol 21:729–741
Tse-Hua L, Tewfik AH (2006) A novel high-capacity data-embedding system. IEEE Trans Image Process 15:2431–2440
Wang R, HU L Xu D ( 2011) A watermarking algorithm based on the CABAC entropy coding for H.264/AVC. J Comput Inform Syst 7(6):2132–2141
Wang X-y, Wang C-p, Yang H-y, Niu P-p (2013) A robust blind color image watermarking in quaternion Fourier transform domain. J Syst Softw 86:255–277
Wedi T (2002) Adaptive interpolation filter for motion compensated prediction In: 2002 Proceedings International Conference on Image Processing II-509-II-512 2
Xu C, Ping X and Zhang T (2006) Steganography in compressed video stream In: International Conference on Innovative Computing, Information and Control, 2006. ICICIC’06. First pp 269–272
Yang G, Li J, He Y, Kang Z (2011) An information hiding algorithm based on intra-prediction modes and matrix coding for H. 264/AVC video stream. AEU Int J Electron Commun 65:331–337
Yilmaz A and Alatan AA (2003) Error concealment of video sequences by data hiding In: 2003 Proceedings International Conference on Image Processing, 2003. ICIP 2003. pp II-679-82 vol.3
Yiqi T, KokSheik W (2014) An overview of information hiding in H.264/AVC compressed video. IEEE Trans Circuits Syst Video Technol 24:305–319
Zhang X and Liu S (2012) Method and apparatus for intra mode coding in HEVC ed: Google patents
Zhang W, Cheung S-CS Chen M (2005) Hiding privacy information in video surveillance system In: ICIP (3), pp 868–871
Zhang R, Sachnev V, Kim H (2009) Fast BCH syndrome coding for steganography. In: Katzenbeisser S, Sadeghi A-R (eds) Information hiding, vol 5806. Springer, Berlin, pp 48–58
Zhang R, Sachnev V, Botnan MB, Kim HJ, Heo J (2012) An efficient embedder for BCH coding for steganography. IEEE Trans Inf Theory 58:7272–7279
Zhu H, Wang R, Xu D, and Zhou X (2010) Information Hiding Algorithm for H. 264 Based on the predition difference of Intra_4× 4 In: 2010 3rd International Congress on Image and Signal Processing (CISP), pp 487–490
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Mstafa, R.J., Elleithy, K.M. Compressed and raw video steganography techniques: a comprehensive survey and analysis. Multimed Tools Appl 76, 21749–21786 (2017). https://doi.org/10.1007/s11042-016-4055-1
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-016-4055-1