A new steganography algorithm based on video sparse representation

  • Arash Jalali
  • Hassan FarsiEmail author


Steganography has been a great interest since long time ago. There are a lot of methods that have been widely used since long past. Recently, there has been a growing interest in the use of sparse representation in signal processing. Sparse representation can efficiently model signals in different applications to facilitate processing. Much of the previous work was focused on image and audio sparse representation for steganography. In this paper, a new steganography scheme based on video sparse representation (VSR) is proposed. To exploit proper dictionary, KSVD algorithm is applied to DCT coefficients of Y component related to video (cover) frames. Both I and Q components of video frames are used for secure message insertion. The aim is to hide secret messages into non-zero coefficients of sparse representation of DCT called, I and Q video frames. Several experiments are performed to evaluate the performance of the proposed algorithm, in case of some metrics such as pick signal to noise ratio (PSNR), the hiding ratio (HR), bit error rate (BER) and similarity (Sim) of secret message, and also runtime. The simulation results show that the proposed method exhibits appropriate invisibility and robustness.


Discrete Cosine Transform (DCT) Dictionary Learning KSVD OMP Sparse Representation Video Sparse Representation Video Steganography 



  1. 1.
    Abdulla AA, Sellahewa H, Jassim SA (2019) Improving embedding efficiency for digital steganography by exploiting similarities between secret and cover images. Multimed Tools Appl:1–25Google Scholar
  2. 2.
    Ahani S, Ghaemmaghami S (2010) Image steganography based on sparse decomposition in wavelet space. IEEE International Conference on Information Theory and Information Security, Beijing, pp 632–637Google Scholar
  3. 3.
    Ahani S, Ghaemmaghami S (2015) Colour image steganography method based on sparse representation. IET Image Process 6:496–505CrossRefGoogle Scholar
  4. 4.
    Ahani S, Ghaemmaghami S (2015) Color image steganography method based on sparse representation. IET Image Process (6):496–505CrossRefGoogle Scholar
  5. 5.
    Ahani S, Ghaemmaghami S, Wang ZJ (2015) A Sparse Representation-Based Wavelet Domain Speech Steganography Method. IEEE/ACM Transactions on Audio, Speech, and Language Processing 1:80–91Google Scholar
  6. 6.
    Ahani S, Ghaemmaghami S, Wang ZJ (2015) A Sparse Representation-Based Wavelet Domain Speech Steganography Method. IEEE Trans Audio Speech Lang Process (1):80–91Google Scholar
  7. 7.
    Akram MZ, Azizah AM, Shayma SM (2011) High watermarking capacity based on spatial domain technique. Inf Technol J 10(7):1367–1373CrossRefGoogle Scholar
  8. 8.
    Aziz Sbai SM, Aissa-El-Bey A, Pastor D (2012) Underdetermined source separation of finite alphabet signals via l1 minimization. 11th International Conference on Information Science, Signal Processing and their Applications (ISSPA), Montreal, pp 625–628Google Scholar
  9. 9.
    Blanchard JD, Tanner J (2015) Performance comparisons of greedy algorithms in compressed sensing. Numerical Linear Algebra with Applications (2):254–282MathSciNetzbMATHCrossRefGoogle Scholar
  10. 10.
    Budhia U, Kundur D, Zourntos T (2006) Digital Video Steganalysis Exploiting Statistical Visibility in the Temporal Domain. IEEE Transactions on Information Forensics and Security (4):502–516CrossRefGoogle Scholar
  11. 11.
    Cai J, Ji H, Liu C, Shen Z (2009) Blind motion deblurring from a single image using sparse approximation. IEEE Conference on Computer Vision and Pattern Recognition, Miami, pp 104–111Google Scholar
  12. 12.
    Cao X, Du L, Wei X, Meng D, Guo X (2015) High Capacity Reversible Data Hiding in Encrypted Images by Patch-Level Sparse Representation. IEEE Transactions on Cybernetics 5:1132–1143Google Scholar
  13. 13.
    Cao X, Du L, Wei X, Meng D, Guo X (2016) High Capacity Reversible Data Hiding in Encrypted Images by Patch-Level Sparse Representation. IEEE Transactions on Cybernetics 5:1132–1143CrossRefGoogle Scholar
  14. 14.
    Chae JJ, Manjunath BS (1999) Data hiding in video. Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348), Kobe, pp 311–315Google Scholar
  15. 15.
    Chandramouli R, Memon N (2001) Analysis of LSB image steganography techniques. IEEE International Conference on Image Processing:1019–1022Google Scholar
  16. 16.
    Cheddad A, Condell J, Curran K, McKevitt P (2008) Biometric Inspired Digital Image Steganography”, 15th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems, pp. 159–168Google Scholar
  17. 17.
    Cheddad A, Condell J, Curran K, McKevitt P (2010) Digital image steganography: Survey and analysis of current methods. Signal Process (3):727–752zbMATHCrossRefGoogle Scholar
  18. 18.
    Chen Y, Nasrabadi NM, Tran TD (2013) Hyperspectral Image Classification via Kernel Sparse Representation. IEEE Trans Geosci Remote Sens (1):217–231CrossRefGoogle Scholar
  19. 19.
    Chen L, Papandreou G, Kokkinos I, Murphy K, Yuille AL (2018) DeepLab: Semantic Image Segmentation with Deep Convolutional Nets, Atrous Convolution, and Fully Connected CRFs. IEEE Trans Pattern Anal Mach Intell (4):834–848CrossRefGoogle Scholar
  20. 20.
    Cong Y, Zhang S, Lian Y (2015) K-SVD Dictionary Learning and Image Reconstruction Based on Variance of Image Patches. 8th International Symposium on Computational Intelligence and Design (ISCID), Hangzhou, pp 254–257Google Scholar
  21. 21.
    Dabov K, Foi A, Katkovnik V, Egiazarian K (2007) Image Denoising by Sparse 3-D Transform-Domain Collaborative Filtering. IEEE Trans Image Process (8):2080–2095MathSciNetCrossRefGoogle Scholar
  22. 22.
    Dai W, Milenkovic O (2009) Subspace pursuit for compressive sensing signal reconstruction. IEEE Trans Inf Theory (5):2230–2249MathSciNetzbMATHCrossRefGoogle Scholar
  23. 23.
    Dan W, Xia W, Guangyan W, Yan Z (2016) Speech enhancement based on Emd and compressed sensing. IEEE International Conference on Signal and Image Processing (ICSIP), Beijing, pp 699–702Google Scholar
  24. 24.
    Donoho DL, Tsaig Y, Drori I, Starck JL (2012) Sparse solution of underdetermined systems of linear equations by stagewise orthogonal matching pursuit. IEEE Trans Inf Theory:1094–1121MathSciNetzbMATHCrossRefGoogle Scholar
  25. 25.
    Escoda OD, Vandergheynst P (2004) A Bayesian approach to video expansions on parametric over-complete 2-D dictionaries. IEEE 6th Workshop on Multimedia Signal Processing, Siena, pp 490–493Google Scholar
  26. 26.
    Etezadifar P, Farsi H (2017) Scalable video summarization via sparse dictionary learning and selection simultaneously. Multimed Tools Appl (6):7947–7971CrossRefGoogle Scholar
  27. 27.
    Fadili JM, Starck J, Murtagh F (2009) Inpainting and Zooming Using Sparse Representations. Comput J , Oxford University Press (UK) 1:64–79Google Scholar
  28. 28.
    Fang DY, Chang LW (2006) Data hiding for digital video with phase of motion vector. IEEE International Symposium on Circuits and Systems:1422–1425Google Scholar
  29. 29.
    Farsi H (2010) Improvement of minimum tracking in Minimum Statistics noise estimation method. Signal Processing: an International Journal (SPIJ) 4:17–22Google Scholar
  30. 30.
    Figueiredo MA, Nowak RD, Wright SJ (2007) Gradient projection for sparse reconstruction: Application to compressed sensing and other inverse problems. IEEE Journal of Selected Topics in Signal Processing (4):586–597CrossRefGoogle Scholar
  31. 31.
    Forster E, Lowe T, Wenger S, Magnor M (2015) RGB-guided depth map compression via Compressed Sensing and Sparse Coding. Picture Coding Symposium (PCS), Cairns, pp 1–4Google Scholar
  32. 32.
    Geng Q, Wright J (2014) On the local correctness of ℓ1-minimization for dictionary learning. IEEE International Symposium on Information Theory, Honolulu, pp 3180–3184Google Scholar
  33. 33.
    Gorodnitsky IF, Rao BD (1997) Sparse signal reconstruction from limited data using FOCUSS: a re-weighted minimum norm algorithm. IEEE Trans Signal Process (3):600–616CrossRefGoogle Scholar
  34. 34.
    Hasheminejad M, Farsi H (2016) Frame level sparse representation classification for speaker verification. Multimed Tools Appl 76:21211–21224CrossRefGoogle Scholar
  35. 35.
    Hasheminejad M, Farsi H (2018) Sample-specific late classifier fusion for speaker verification. Multimed Tools Appl 77:15273–15289CrossRefGoogle Scholar
  36. 36.
    Hosseini SM, Farsi H, SadoghiYazdi H (2009) Best Clustering Around the Color Images. International Journal of Computer and Electrical Engineering 1:20–24CrossRefGoogle Scholar
  37. 37.
    Hu HT, Hsu LY (2015) Robust, transparent and high-capacity audio watermarking in DCT domain. Signal Process:226–235CrossRefGoogle Scholar
  38. 38.
    Hu Y, Zhang C, Su Y (2007) Information Hiding Based on Intra Prediction Modes for H.264/AVC. IEEE International Conference on Multimedia and Expo, Beijing, pp 1231–1234Google Scholar
  39. 39.
    Hua G, Xiang Y, Bi G (2016) When Compressive Sensing Meets Data Hiding. IEEE Signal Processing Letters (4):473–477CrossRefGoogle Scholar
  40. 40.
    Huang J, Xu Y, Zhu P, Wang Y (2014) An Improved Reconstruction Algorithm Based on Multi-candidate Orthogonal Matching Pursuit Algorithm. Seventh International Symposium on Computational Intelligence and Design, Hangzhou, pp 564–568Google Scholar
  41. 41.
    Jalali A, Farsi H, Ghaemmaghami S (2018) A steganalysis System Based on Double Sparse Representation Classification (DSRC). Multimed Tools Appl 11:16347–16366CrossRefGoogle Scholar
  42. 42.
    Jamil T (1999) Steganography: the art of hiding information in plain sight. IEEE Potentials 1:10–12CrossRefGoogle Scholar
  43. 43.
    Keshavarz SN, Hajizadeh S, Hamidi M, Omali MG (2010) A Novel UWB Pulse Waveform Design Method. Fourth International Conference on Next Generation Mobile Applications, Services and Technologies, Amman, pp 168–173Google Scholar
  44. 44.
    Keshavarz SN, Hamidi M, Khoshbin H (2010) A PSO-Based UWB Pulse Waveform Design Method. Second International Conference on Computer and Network Technology, Bangkok, pp 249–253Google Scholar
  45. 45.
    Keshavarz SN, Kakhki MA, Omali MG, Hamidi M (2010) A novel UWB pulse design method using particle swarm optimization algorithm. Sci Res Essays (5):3049–3058Google Scholar
  46. 46.
    Krstulovic S, Gribonval R (2006) MPTK: Matching pursuit made tractable, vol 3. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Toulouse, pp 496–499Google Scholar
  47. 47.
    Kumar V, Kumar D (2010) Performance evaluation of DWT based image steganography. IEEE 2nd International Advance Computing Conference (IACC), Patiala, pp 223–228Google Scholar
  48. 48.
    Kumar BS, Shree VU (2017) Encrypting Images by Patch-Level Sparse Representation for High Capacity Reversible Data Hiding. International Journal of Advanced Technology and Innovative Research (1):1–8Google Scholar
  49. 49.
    Liu P, Tao Y, Zhao W, Tang X (2017) Abnormal crowd motion detection using double sparse representation. Journal of Neurocomputing, Elsevier:3–12Google Scholar
  50. 50.
    Liu E, Temlyakov VN (2012) The orthogonal super greedy algorithm and applications in compressed sensing. IEEE Trans Inf Theory (4):2040–2047MathSciNetzbMATHCrossRefGoogle Scholar
  51. 51.
    Liu Y, Wang Z (2015) Simultaneous image fusion and denoising with adaptive sparse representation. IET Image Process (5):347–357CrossRefGoogle Scholar
  52. 52.
    Lou DC, Liu JL, Tso HK (2008) Evolution of information – hiding technology. Information Security and Ethics: Concepts, Methodologies, Tools and Applications, New York, pp 438–450Google Scholar
  53. 53.
    Maechler P, Greisen P, Sporrer B, Steiner S, Felber N, Burg A (2010) Implementation of greedy algorithms for LTE sparse channel estimation. Conference Record of the Forty Fourth Asilomar Conference on Signals, Systems and Computers (ASILOMAR), Pacific Grove, pp 400–405Google Scholar
  54. 54.
    Mallat SG, Zhang Z (1993) Matching pursuits with time-frequency dictionaries. IEEE Trans Signal Process:3397–3415zbMATHCrossRefGoogle Scholar
  55. 55.
    Mansouri J, Khademi M (2009) An adaptive scheme for compressed video steganography using temporal and spatial features of the video signal. Int J Imaging Syst Technol (4):306–315Google Scholar
  56. 56.
    Masud Karim SM, Rahman MS, Hossain MI (2011) A new approach for LSB based image steganography using secret key. 14th International Conference on Computer and Information Technology (ICCIT 2011), Dhaka, pp 286–291Google Scholar
  57. 57.
    Mohamadzadeh S, Farsi H (2016) Content Based Video Retrieval Based on HDWT and Sparse Representation. Image Analysis and Stereology (2):67–80MathSciNetzbMATHCrossRefGoogle Scholar
  58. 58.
    Mstafa RJ, Elleithy KM (2015) A New Video Steganography Algorithm Based on the Multiple Object Tracking and Hamming Codes. IEEE 14th International Conference on Machine Learning and Applications (ICMLA):335–340Google Scholar
  59. 59.
    Mstafa RJ, Elleithy KM (2015) A novel video steganography algorithm in the wavelet domain based on the KLT tracking algorithm and BCH codes. IEEE Long Island Systems, Applications and Technology Conference (LISAT):1–7Google Scholar
  60. 60.
    Mstafa RJ, Elleithy KM (2015) A high payload video steganography algorithm in DWT domain based on BCH codes (15, 11). International IEEE Wireless Telecommunications Symposium, New York:1–8Google Scholar
  61. 61.
    Mstafa RJ, Elleithy KM (2016) A novel video steganography algorithm in DCT domain based on hamming and BCH codes. IEEE 37th Sarnoff Symposium:208–213Google Scholar
  62. 62.
    Mstafa RJ, Elleithy KM (2016) A DCT-based robust video steganographic method using BCH error correcting codes. IEEE Long Island Systems, Applications and Technology Conference (LISAT):1–6Google Scholar
  63. 63.
    Needell D, Tropp JA (2009) CoSaMP: Iterative signal recovery from incomplete and inaccurate samples. Appl Comput Harmon Anal (3):301–321MathSciNetzbMATHCrossRefGoogle Scholar
  64. 64.
    Needell D, Vershynin R (2009) Uniform uncertainty principle and signal recovery via regularized orthogonal matching pursuit. Found Comput Math, Springer 9:317–334MathSciNetzbMATHCrossRefGoogle Scholar
  65. 65.
    Pan JS, Li W, Yang CS, Yan L (2015) Image steganography based on subsampling and compressive sensing. Multimed Tools Appl:9191–9205CrossRefGoogle Scholar
  66. 66.
    Patsakis C, Aroukatos N (2014) LSB and DCT steganographic detection using compressive sensing. Journal of Information Hiding and Multimedia Signal Processing 1:20–32Google Scholar
  67. 67.
    Raja KB, Chowdary CR, Venugopal KR, Patnaik LM (2005) A Secure Image Steganography using LSB, DCT and Compression Techniques on Raw Images. 3rd International Conference on Intelligent Sensing and Information Processing, Bangalore, pp 170–176Google Scholar
  68. 68.
    Rajesh GR, Nargunam AS (2013) Steganography algorithm based on discrete cosine transform for data embedding into raw video streams. IET Chennai Fourth International Conference on Sustainable Energy and Intelligent Systems (SEISCON), Chennai, pp 554–558Google Scholar
  69. 69.
    Rencker L, Wang W, Plumbley MD (2017) A greedy algorithm with learned statistics for sparse signal reconstruction. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), New Orleans, pp 4775–4779Google Scholar
  70. 70.
    RoselinKiruba R, Sree Sharmila T (2018) Hiding Data in Videos Using Optimal Selection of Key-Frames. International Conference on Computer, Communication, and Signal Processing (ICCCSP):1–6Google Scholar
  71. 71.
    Saha B, Sharma S (2012) Steganographic Techniques of Data Hiding Using Digital Images. Def Sci J 1:11–18CrossRefGoogle Scholar
  72. 72.
    Schepker HF, Dekorsy A (2011) Sparse multi-user detection for CDMA transmission using greedy algorithms. 8th International Symposium on Wireless Communication Systems (ISWCS), Aachen, pp 291–295Google Scholar
  73. 73.
    Singh A, Hariharan S (2017) Performance analysis of energy efficient algorithm for MIMO based CRN with antenna selection and maximal ratio combining. International Conference on Trends in Electronics and Informatics (ICEI), Tirunelveli, pp 663–668Google Scholar
  74. 74.
    Song L, Peng J (2012) Dictionary Learning Research Based on Sparse Representation. International Conference on Computer Science and Service System, Nanjing, pp 14–17Google Scholar
  75. 75.
    Su P (2013) C., S., Lu, M. T., Wu, C. Y.: “A practical design of high-volume steganography in digital video files”. Multimed Tools Appl 2:247–266CrossRefGoogle Scholar
  76. 76.
    Sun G, Meng L, Liu L, Tan Y, Zhang J, Zhang H (2018) KSVD-based Multiple Description Image Coding. IEEE Access Journal:1962–1972Google Scholar
  77. 77.
    Sung T, Shieh Y, Yu C, Hsin H (2006) High-Efficiency and Low-Power Architectures for 2-D DCT and IDCT Based on CORDIC Rotation. Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT'06), Taipei, pp 191–196Google Scholar
  78. 78.
    Swanson MD, Zhu B, Tewfik AH (1997) Data hiding for video-in-video, vol 2. International Conference on Image Processing, Santa Barbara, pp 676–679Google Scholar
  79. 79.
    Tropp JA, Gilbert AC (2007) Signal recovery from random measurements via orthogonal matching pursuit. IEEE Trans Inf Theory (12):586–597MathSciNetzbMATHCrossRefGoogle Scholar
  80. 80.
    Tseng YC, Chen YY, Pan HK (2002) A secure data hiding scheme for binary images. IEEE Trans Commun 8:1227–1231CrossRefGoogle Scholar
  81. 81.
    Wang H, Xia Y, Wang Z (2017) Dictionary learning-based image compression. IEEE International Conference on Image Processing (ICIP), Beijing, pp 3235–3239Google Scholar
  82. 82.
    Xi R (2010) Super resolution processing of SAR images by Matching Pursuit method based on Genetic Algorithm. 3rd International Congress on Image and Signal Processing, Yantai, pp 2066–2070Google Scholar
  83. 83.
    Xu Z, Sun J (2010) Image Inpainting by Patch Propagation Using Patch Sparsity. IEEE Trans Image Process (5):1153–1165Google Scholar
  84. 84.
    Yadav P, Mishra N, Sharma S (2013) A secure video steganography with encryption based on LSB technique. IEEE International Conference on Computational Intelligence and Computing Research, Enathi, pp 1–5Google Scholar
  85. 85.
    Yan X, Yang B, Zhang W, Liu C, Wang Y (2016) An Improved Denoising Algorithm of Feather and Down Image Based on KSVD. 8th International Conference on Information Technology in Medicine and Education (ITME), Fuzhou, pp 419–423Google Scholar
  86. 86.
    Yao M, Qi M, Yi Y, Shi Y, Kong J (2015) An Improved Information Hiding Method Based on Sparse Representation. Math Probl Eng:1–10Google Scholar
  87. 87.
    Zaheer M, Qureshi I, Muzaffar Z, Aslam L (2017) Compressed Sensing Based Image Steganography System for Secure Transmission of Audio Message with Enhanced Security. International Journal of Computer Science and Network Security 7:133–141Google Scholar
  88. 88.
    Zhang Q, Liu Y, Blum RS, Han J, Tao D (2018) Sparse representation based multi-sensor image fusion for multi-focus and multi-modality images: A review”, Elsevier. Information Fusion Journal:57–75CrossRefGoogle Scholar
  89. 89.
    Zhang S, Wang H, Huang W (2017) Two-stage plant species recognition by local mean clustering and weighted sparse representation classification. Journal of Cluster Computing:1–9Google Scholar
  90. 90.
    Zhao Y, Li J, Zhong Z (2014) Group-based sparse coding dictionary learning for object recognition. IEEE Workshop on Advanced Research and Technology in Industry Applications, Ottawa, pp 331–334Google Scholar
  91. 91.
    Zheng A, Zhao Y, Li C, Tang J, Luo B (2018) Moving Object Detection via Robust Low-Rank and Sparse Separating with High-Order Structural Constraint. IEEE Fourth International Conference on Multimedia Big Data (BigMM), Xi’an, pp 1–6Google Scholar
  92. 92.
    Zhu X, Liu L, Wang X, Wang J (2016) Super-resolution reconstruction via multiple sparse dictionary combined with sparse coding. IEEE International Conference on Information and Automation (ICIA), Ningbo, pp 1720–1725Google Scholar
  93. 93.
    Zhu X, Tao J, Li B, Chen X, Li Q (2015) A novel image super-resolution reconstruction method based on sparse representation using classified dictionaries. IEEE International Conference on Information and Automation, Lijiang, pp 776–780Google Scholar
  94. 94.
    Zhu Y, Zhang X, Wen G, He W, Cheng D (2016) Double sparse-representation feature selection algorithm for classification. Multimed Tools Appl:17525–17539CrossRefGoogle Scholar
  95. 95.
    Zibulevsky M, Elad M (2010) L1-L2 Optimization in Signal and Image Processing. IEEE Signal Process Mag (3):76–88CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Department of Electrical and Computer EngineeringUniversity of BirjandBirjandIran

Personalised recommendations