Skip to main content
Log in

Robust secure video steganography using reversible patch-wise code-based embedding

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

During the process of data hiding for secure transmission, there is possibility of easy accessing of secret data due to availability of various issues in video steganography techniques. The large size of video file is divided into different number of frames in order to process the large amount of data. By using the embedding process, the secret data is easily embedded on the cover video for either large or small amount of information. The process of encryption and decryption is performed to provide high security in data hiding algorithm. In the transformation technique, the effective decryption process arises an issue during the video encryption process. The ineffective restoration of compression process involves in the encryption of input video frames by using Discrete Cosine Transform (DCT) or Discrete Wavelet Transform (DWT) transformation. Also, the pixel information are lost due to processing of frame conversion and encoding in transformation technique. Thus, the encryption efficiency is affected by lossy pixel information. Hence, the flexible φ-correction filtering method with Blind Pixel Algorithm (BPA) technique is proposed in this paper to hide secured data without degrading the information. The pixel grouping is performed by replacing the relevant and recurrent pixels with the message information during the encryption process in order to reduce lossy pixel information. Also, the flexible φ-correction filtering method is developed as preprocessing method to remove noise information on cover and secret video by analyzing the pixel value in terms of Fast Fourier Transform (FFT) after performing the pixel optimization with the help of different boundary coefficient value. Thus, the preprocessing and pixel grouping stage in the proposed technique reduces lossy pixel information. Based on the Least Significant Bit (LSB) concept, the pixel value of secret message embeds on pixel value of cover frame sequentially by using the BPA algorithm and the disadvantage of LSB approach is overwhelmed by embedding the set of random pixel value between cover and secret video. The Patch Wise Code Formation (PWCF) algorithm is utilized as video encoding process to provide high security during data hiding process. The BPA algorithm utilizes in reversible manner to achieve efficient working of decryption process. The performance of the proposed Blind-Pixel Based Secure Data Embedding (BPSDA) technique is evaluated for various video sequences in terms of Peak Signal Noise Ratio (PSNR), Mean Square Error (MSE), Compression Rate (CR), and Bits Per Pixel (BPP).

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Abdallah EE et al (2007) MPEG video watermarking using tensor singular value decomposition. In: International Conference Image Analysis and Recognition, pp. 772–783. https://doi.org/10.1007/978-3-540-74260-9_69

  2. Abdallah EE et al (2010) "Video watermarking using wavelet transform and tensor algebra," Signal. Image and Video Processing 4:233–245

    Article  Google Scholar 

  3. Alhaj SA et al (2016) Multi-layers Video Steganography: A Novel Technique for Image Hiding. Transactions on Networks and Communications 4:53

    Article  Google Scholar 

  4. Devi MR, Suneetha P (2016) Tampering Detection for Encrypted Compressed Video Watermarking Using Bit Substitution for Copy Right Protection. International Journal of Engineering Science 4:3725–3730. https://doi.org/10.4010/2016.78_9

  5. Dixit S et al (2016) Public key cryptography based lossless and reversible data hiding in encrypted images. International Journal of Engineering Science 3550:3550–3558. https://doi.org/10.4010/2016.822

  6. Elsheh E, Hamza AB (2011) Secret sharing approaches for 3D object encryption. Expert Syst Appl 38:13906–13911

    Google Scholar 

  7. Hegde R, Jagadeesha S (2016) An optimal modified matrix encoding technique for secret writing in MPEG video using ECC. Computer Standards & Interfaces 48:173–182

    Article  Google Scholar 

  8. Hong W (2013) Adaptive image data hiding in edges using patched reference table and pair-wise embedding technique. Inf Sci 221:473–489

    Article  Google Scholar 

  9. Jindal S, Kaur N (2016) Digital image steganography survey and analysis of current methods. International Journal of Computer Science and Information Technology & Security 6:10–13

  10. Jung K-H, Yoo K-Y (2015) Steganographic method based on interpolation and LSB substitution of digital images. Multimedia Tools and Applications 74:2143–2155

    Article  Google Scholar 

  11. Kaur M, Kaur EA (2014) Improved security mechanisam of text in video by using steganographic technique: a review. International Journal of Advanced Research in Computer Science and Software Engineering 4:44–51

  12. Kishor SN et al (2016) Secure data transmission through color images using PHLSB method. Indian Journal of Science and Technology 9:1–7. https://doi.org/10.17485/ijst/2016/v9iS1/109414

  13. Kruthika S, Kalpana V (2016) Enhancing embedding capacity and security using reversible texture synthesis in image steganography. Indian Journal of Science and Technology 9:1–9. https://doi.org/10.17485/ijst/2016/v9i48/107957

  14. Kumravat S (2013) An efficient steganographic scheme using skin tone detection and discrete wavelet transformation. International Journal of Computer Science & Engineering Technology 4:971–976

  15. Liu Y et al (2016) A reversible data hiding method for H. 264 with Shamir’s (t, n)-threshold secret sharing. Neurocomputing 188:63–70

    Article  Google Scholar 

  16. Liu Y et al (2016) A new data hiding method for H. 264 based on secret sharing. Neurocomputing 188:113–119

    Article  Google Scholar 

  17. Manimegalai P et al (2014) The Image Steganography And Steganalysis Based On Peak-Shaped Technique For Mp3 Audio And Video. International Journal of Computer Science and Mobile Computing 3:300–308

    Google Scholar 

  18. Mstafa RJ, Elleithy KM (2017) Efficient and robust video steganography algorithms for secure data communication (Thesis)

  19. Mstafa RJ et al (2017) A robust and secure video steganography method in DWT-DCT domains based on multiple object tracking and ecc. IEEE Access

  20. Mundher M et al (2014) Digital watermarking for images security using discrete slantlet transform. Applied Mathematics & Information Sciences 8:2823

    Article  Google Scholar 

  21. Najafi MH, Lilja DJ (2016) A high-capacity separable reversible method for hiding multiple messages in encrypted images. arXiv preprint arXiv:1612.04339

  22. Parnami P et al (2016) Performance evaluation of DWT and LSB based audio steganography. Performance Evaluation 3:167–170. https://doi.org/10.17148/IARJSET.2016.31232

  23. Rajesh G, Nargunam AS (2014) Video steganography algorithm for embedding data into raw video streams using discrete cosine transform. Applied Mechanics and Materials, 626:58–64. https://doi.org/10.4028/www.scientific.net/AMM.626.58

    Article  Google Scholar 

  24. Ramalingam M, Isa NAM (2014) Video steganography based on integer haar wavelet transforms for secured data transfer. Indian Journal of Science and Technology 7:897–904

    Google Scholar 

  25. Singh TR et al (2013) Video watermarking scheme based on visual cryptography and scene change detection. AEU-International Journal of Electronics and Communications 67:645–651

    Article  Google Scholar 

  26. Soni A, Badodia SK (2015) Implementation Of Improved Steganography For Hiding Text On Digital Data. International Journal of Science and Research (IJSR) 4:80–84

    Article  Google Scholar 

  27. Viral MG et al (2015) A Real Time Approach for Secure Image Transmission Using Video Steganography. International Journal of Electronics, Communication and Soft Computing Science & Engineering (IJECSCSE) 4:1

    Article  Google Scholar 

  28. Xie X, Livermore C (2016) A pivot-hinged, multilayer SU-8 micro motion amplifier assembled by a self-aligned approach. In: Micro Electro Mechanical Systems (MEMS), 2016 I.E. 29th International Conference on, pp. 75–78. https://doi.org/10.1109/MEMSYS.2016.7421561

  29. Xie X, Livermore C (2017) Passively self-aligned assembly of compact barrel hinges for high-performance, out-of-plane mems actuators. In: Micro Electro Mechanical Systems (MEMS), 2017 I.E. 30th International Conference on, pp. 813–816. https://doi.org/10.1109/MEMSYS.2017.7863532

  30. Xie X et al (2014) Scalable, MEMS-enabled, vibrational tactile actuators for high resolution tactile displays. J Micromech Microeng 24:125014

    Article  Google Scholar 

  31. Xie X et al (2014) Compact, scalable, high-resolution, MEMS-enabled tactile displays. In: Proc. of solid-state sensors, actuators, and microsystems workshop, pp. 127–130

  32. Zhang X et al (2016) Lossless and reversible data hiding in encrypted images with public-key cryptography. IEEE Transactions on Circuits and Systems for Video Technology 26:1622–1631

    Article  Google Scholar 

  33. Zhang Y et al (2017) Novel video steganography algorithm based on secret sharing and error-correcting code for H. 264/AVC. Tsinghua Sci Technol 22:198–209

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. Rajalakshmi.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Rajalakshmi, K., Mahesh, K. Robust secure video steganography using reversible patch-wise code-based embedding. Multimed Tools Appl 77, 27427–27445 (2018). https://doi.org/10.1007/s11042-018-5930-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-5930-8

Keywords

Navigation