Advertisement

Multimedia Tools and Applications

, Volume 77, Issue 20, pp 27427–27445 | Cite as

Robust secure video steganography using reversible patch-wise code-based embedding

  • K. RajalakshmiEmail author
  • K. Mahesh
Article
  • 123 Downloads

Abstract

During the process of data hiding for secure transmission, there is possibility of easy accessing of secret data due to availability of various issues in video steganography techniques. The large size of video file is divided into different number of frames in order to process the large amount of data. By using the embedding process, the secret data is easily embedded on the cover video for either large or small amount of information. The process of encryption and decryption is performed to provide high security in data hiding algorithm. In the transformation technique, the effective decryption process arises an issue during the video encryption process. The ineffective restoration of compression process involves in the encryption of input video frames by using Discrete Cosine Transform (DCT) or Discrete Wavelet Transform (DWT) transformation. Also, the pixel information are lost due to processing of frame conversion and encoding in transformation technique. Thus, the encryption efficiency is affected by lossy pixel information. Hence, the flexible φ-correction filtering method with Blind Pixel Algorithm (BPA) technique is proposed in this paper to hide secured data without degrading the information. The pixel grouping is performed by replacing the relevant and recurrent pixels with the message information during the encryption process in order to reduce lossy pixel information. Also, the flexible φ-correction filtering method is developed as preprocessing method to remove noise information on cover and secret video by analyzing the pixel value in terms of Fast Fourier Transform (FFT) after performing the pixel optimization with the help of different boundary coefficient value. Thus, the preprocessing and pixel grouping stage in the proposed technique reduces lossy pixel information. Based on the Least Significant Bit (LSB) concept, the pixel value of secret message embeds on pixel value of cover frame sequentially by using the BPA algorithm and the disadvantage of LSB approach is overwhelmed by embedding the set of random pixel value between cover and secret video. The Patch Wise Code Formation (PWCF) algorithm is utilized as video encoding process to provide high security during data hiding process. The BPA algorithm utilizes in reversible manner to achieve efficient working of decryption process. The performance of the proposed Blind-Pixel Based Secure Data Embedding (BPSDA) technique is evaluated for various video sequences in terms of Peak Signal Noise Ratio (PSNR), Mean Square Error (MSE), Compression Rate (CR), and Bits Per Pixel (BPP).

Keywords

Fast fourier transform (FFT) Least significant bit (LSB) Blind pixel (BP) Patch code formation (PCF) Elliptic curve cryptography (ECC) Discrete cosine transform (DCT) Discrete wavelet transform (DWT) 

References

  1. 1.
    Abdallah EE et al (2007) MPEG video watermarking using tensor singular value decomposition. In: International Conference Image Analysis and Recognition, pp. 772–783.  https://doi.org/10.1007/978-3-540-74260-9_69
  2. 2.
    Abdallah EE et al (2010) "Video watermarking using wavelet transform and tensor algebra," Signal. Image and Video Processing 4:233–245CrossRefGoogle Scholar
  3. 3.
    Alhaj SA et al (2016) Multi-layers Video Steganography: A Novel Technique for Image Hiding. Transactions on Networks and Communications 4:53CrossRefGoogle Scholar
  4. 4.
    Devi MR, Suneetha P (2016) Tampering Detection for Encrypted Compressed Video Watermarking Using Bit Substitution for Copy Right Protection. International Journal of Engineering Science 4:3725–3730.  https://doi.org/10.4010/2016.78_9
  5. 5.
    Dixit S et al (2016) Public key cryptography based lossless and reversible data hiding in encrypted images. International Journal of Engineering Science 3550:3550–3558.  https://doi.org/10.4010/2016.822
  6. 6.
    Elsheh E, Hamza AB (2011) Secret sharing approaches for 3D object encryption. Expert Syst Appl 38:13906–13911Google Scholar
  7. 7.
    Hegde R, Jagadeesha S (2016) An optimal modified matrix encoding technique for secret writing in MPEG video using ECC. Computer Standards & Interfaces 48:173–182CrossRefGoogle Scholar
  8. 8.
    Hong W (2013) Adaptive image data hiding in edges using patched reference table and pair-wise embedding technique. Inf Sci 221:473–489CrossRefGoogle Scholar
  9. 9.
    Jindal S, Kaur N (2016) Digital image steganography survey and analysis of current methods. International Journal of Computer Science and Information Technology & Security 6:10–13Google Scholar
  10. 10.
    Jung K-H, Yoo K-Y (2015) Steganographic method based on interpolation and LSB substitution of digital images. Multimedia Tools and Applications 74:2143–2155CrossRefGoogle Scholar
  11. 11.
    Kaur M, Kaur EA (2014) Improved security mechanisam of text in video by using steganographic technique: a review. International Journal of Advanced Research in Computer Science and Software Engineering 4:44–51Google Scholar
  12. 12.
    Kishor SN et al (2016) Secure data transmission through color images using PHLSB method. Indian Journal of Science and Technology 9:1–7.  https://doi.org/10.17485/ijst/2016/v9iS1/109414
  13. 13.
    Kruthika S, Kalpana V (2016) Enhancing embedding capacity and security using reversible texture synthesis in image steganography. Indian Journal of Science and Technology 9:1–9.  https://doi.org/10.17485/ijst/2016/v9i48/107957
  14. 14.
    Kumravat S (2013) An efficient steganographic scheme using skin tone detection and discrete wavelet transformation. International Journal of Computer Science & Engineering Technology 4:971–976Google Scholar
  15. 15.
    Liu Y et al (2016) A reversible data hiding method for H. 264 with Shamir’s (t, n)-threshold secret sharing. Neurocomputing 188:63–70CrossRefGoogle Scholar
  16. 16.
    Liu Y et al (2016) A new data hiding method for H. 264 based on secret sharing. Neurocomputing 188:113–119CrossRefGoogle Scholar
  17. 17.
    Manimegalai P et al (2014) The Image Steganography And Steganalysis Based On Peak-Shaped Technique For Mp3 Audio And Video. International Journal of Computer Science and Mobile Computing 3:300–308Google Scholar
  18. 18.
    Mstafa RJ, Elleithy KM (2017) Efficient and robust video steganography algorithms for secure data communication (Thesis)Google Scholar
  19. 19.
    Mstafa RJ et al (2017) A robust and secure video steganography method in DWT-DCT domains based on multiple object tracking and ecc. IEEE AccessGoogle Scholar
  20. 20.
    Mundher M et al (2014) Digital watermarking for images security using discrete slantlet transform. Applied Mathematics & Information Sciences 8:2823CrossRefGoogle Scholar
  21. 21.
    Najafi MH, Lilja DJ (2016) A high-capacity separable reversible method for hiding multiple messages in encrypted images. arXiv preprint arXiv:1612.04339Google Scholar
  22. 22.
    Parnami P et al (2016) Performance evaluation of DWT and LSB based audio steganography. Performance Evaluation 3:167–170.  https://doi.org/10.17148/IARJSET.2016.31232
  23. 23.
    Rajesh G, Nargunam AS (2014) Video steganography algorithm for embedding data into raw video streams using discrete cosine transform. Applied Mechanics and Materials, 626:58–64.  https://doi.org/10.4028/www.scientific.net/AMM.626.58 CrossRefGoogle Scholar
  24. 24.
    Ramalingam M, Isa NAM (2014) Video steganography based on integer haar wavelet transforms for secured data transfer. Indian Journal of Science and Technology 7:897–904Google Scholar
  25. 25.
    Singh TR et al (2013) Video watermarking scheme based on visual cryptography and scene change detection. AEU-International Journal of Electronics and Communications 67:645–651CrossRefGoogle Scholar
  26. 26.
    Soni A, Badodia SK (2015) Implementation Of Improved Steganography For Hiding Text On Digital Data. International Journal of Science and Research (IJSR) 4:80–84CrossRefGoogle Scholar
  27. 27.
    Viral MG et al (2015) A Real Time Approach for Secure Image Transmission Using Video Steganography. International Journal of Electronics, Communication and Soft Computing Science & Engineering (IJECSCSE) 4:1CrossRefGoogle Scholar
  28. 28.
    Xie X, Livermore C (2016) A pivot-hinged, multilayer SU-8 micro motion amplifier assembled by a self-aligned approach. In: Micro Electro Mechanical Systems (MEMS), 2016 I.E. 29th International Conference on, pp. 75–78.  https://doi.org/10.1109/MEMSYS.2016.7421561
  29. 29.
    Xie X, Livermore C (2017) Passively self-aligned assembly of compact barrel hinges for high-performance, out-of-plane mems actuators. In: Micro Electro Mechanical Systems (MEMS), 2017 I.E. 30th International Conference on, pp. 813–816.  https://doi.org/10.1109/MEMSYS.2017.7863532
  30. 30.
    Xie X et al (2014) Scalable, MEMS-enabled, vibrational tactile actuators for high resolution tactile displays. J Micromech Microeng 24:125014CrossRefGoogle Scholar
  31. 31.
    Xie X et al (2014) Compact, scalable, high-resolution, MEMS-enabled tactile displays. In: Proc. of solid-state sensors, actuators, and microsystems workshop, pp. 127–130Google Scholar
  32. 32.
    Zhang X et al (2016) Lossless and reversible data hiding in encrypted images with public-key cryptography. IEEE Transactions on Circuits and Systems for Video Technology 26:1622–1631CrossRefGoogle Scholar
  33. 33.
    Zhang Y et al (2017) Novel video steganography algorithm based on secret sharing and error-correcting code for H. 264/AVC. Tsinghua Sci Technol 22:198–209CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Department of Computer ApplicationsAlagappa UniversityKaraikudiIndia

Personalised recommendations