Skip to main content

A Survey on Hiding Data Using Video Steganography

  • Conference paper
  • First Online:
Intelligent Sustainable Systems (ICoISS 2023)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 665))

Included in the following conference series:

  • 411 Accesses

Abstract

Steganography’s capability to transmit data secretly has made it more popular in recent decades. Steganography secretly transmits information via a cover media such as a text file, picture file, audio file, or video file. As a result of its potential for concealing a more significant quantity of sensitive data, video steganography is gaining popularity. Compression methods and video deduplication are provided in this study as they pertain to the use of video in clandestine communication. When conducting surveys, both processed and raw footage are taken into account. Moreover, we discuss whether such an encryption method is even possible. This study covers state of the art in covert video embedding and encryption methods. Numerous compression techniques are discussed here, and data is also more securely stored in motion vectors in dynamic scenes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Wu L, Huang K, Shen H, Gao L (2020) Foreground–background parallel compression with residual encoding for surveillance video. IEEE Trans Circuits Syst Video Technol 31(7):2711–2724

    Article  Google Scholar 

  2. Zhao L, Wang S, Wang S, Ye Y, Ma S, Gao W (2021) Enhanced surveillance video compression with dual reference frames generation. IEEE Trans Circuits Syst Video Technol 32(3):1592–1606

    Article  Google Scholar 

  3. Wahab OFA, Khalaf AA, Hussein AI, Hamed HF (2021) Hiding data using efficient combination of RSA cryptography, and compression steganography techniques. IEEE Access 9:31805–31815

    Article  Google Scholar 

  4. Li Y, Hu L, Xia K, Luo J (2019) Fast distributed video deduplication via locality-sensitive hashing with similarity ranking. EURASIP J Image Video Process 2019(1):1–11

    Article  Google Scholar 

  5. Mstafa RJ, Elleithy KM (2017) Compressed and raw video steganography techniques: A comprehensive survey and analysis. Multimed Tools Appl 76(20):21749–21786

    Article  Google Scholar 

  6. Liu Y, Liu S, Wang Y, Zhao H, Liu S (2019) Video steganography: A review. Neurocomputing 335:238–250

    Article  Google Scholar 

  7. Pilania U, Tanwar R, Gupta P (2022) An ROI-based robust video steganography technique using SVD in wavelet domain. Open Comput Sci 12(1):1–16

    Article  Google Scholar 

  8. Rajkumar GP, Malemath VS (2017) Video steganography: Secure data hiding technique. Int J Comput Netw & Inf Secur 9(9)

    Google Scholar 

  9. Bandyopadhyay S, Bose P, Goyel V (2021) A graphical based video steganography

    Google Scholar 

  10. Younus ZS, Younus GT (2020) Video steganography using knight tour algorithm and LEAST SIGNIFICANT BIT method for encrypted data. J Intell Syst 29(1):1216–1225

    MathSciNet  Google Scholar 

  11. Manohar N, Kumar PV (2020) Data encryption & decryption using steganography. In: 2020 4th International conference on intelligent computing and control systems (ICICCS) pp 697–702, IEEE

    Google Scholar 

  12. Aiswarya S, Gomathi R (2018) Review on cryptography and steganography techniques in video. In:2018 IEEE International conference on computational intelligence and computing research (ICCIC). pp 1–4, IEEE

    Google Scholar 

  13. Halder R, Sengupta S, Ghosh S, Kundu D (2016) A secure image steganography based on RSA algorithm and hash-LSB technique. IOSR J Comput Eng (IOSR-JCE) 18(1): 39–43

    Google Scholar 

  14. Mudusu R, Nagesh A, Sdanandam M (2018) Enhancing data security using audio-video steganography. Int J Eng & Technol 7(2.20): 276–279

    Google Scholar 

  15. Joshi J (2015) A review on data security using video steganography. Int J Adv Res Electr, Electron Instrum Eng 04: 3892–3896, doi:https://doi.org/10.15662/ijareeie.2015.0405015

  16. Gursukhmani E Case study of hiding a text using video steganography

    Google Scholar 

  17. Singh N (2018) XOR encryption techniques of video steganography: A comparative analysis. In: International conference on intelligent systems design and applications. pp 203–214, Springer, Cham

    Google Scholar 

  18. Ranjithkumar R, Ganeshkumar D, Senthamilarasu S (2021) Efficient and secure data hiding in video sequence with three layer security: an approach using chaos. Multimed Tools Appl 80(9):13865–13878

    Article  Google Scholar 

  19. Bansal R, Badal N (2020) Hiding the message using cryptography in video steganography. Int J Sci Technol Res 9:1192–1195

    Google Scholar 

  20. Choudry KN, Wanjari A (2015) A survey paper on video steganography. Int J Comput Sci Inf Technol 6(3):2335–2338

    Google Scholar 

  21. Hacimurtazaoglu M, Tutuncu K (2022) LEAST SIGNIFICANT BIT-based pre-embedding video steganography with rotating & shifting poly-pattern block matrix. PeerJ Comput Sci 8:e843

    Article  Google Scholar 

  22. Reddy VL (2017) Improved secure data transfer using video steganographic technique. Int J Rough Sets Data Anal (IJRSDA) 4(3):55–70

    Article  MathSciNet  Google Scholar 

  23. Khan N, Gorde KS (2015) Video steganography by using statistical key frame extraction method and LEAST SIGNIFICANT BIT technique. Int J Innov Res Sci Eng Technol 4(10):10410–10417

    Google Scholar 

  24. Maheswari K, Selvi RT (2016) A survey: Video steganography and security forbidden zone and selective embedding

    Google Scholar 

  25. Isong E, Bassey, Ibanga I, Ubi G (2019) Information security system using video-steganography technique. doi:https://doi.org/10.22624/AIMS/DIGITAL/V7N1P7

  26. Lekha MAC (2018) Hiding an image data into video stenography using different algorithm and MATLAB: A review. Int J Comput Sci Trends Technol 6(2):12–16

    Google Scholar 

  27. Voeller JG (ed) (2014) Cyber security. John Wiley & Sons

    Google Scholar 

  28. Tarun MVS, Rao KV, Mahesh MN, Srikanth N, Reddy M (2020) Digital video steganography using the LEAST SIGNIFICANT BIT technique. Red 100111(11101000):11001001

    Google Scholar 

  29. Kamil S, Ayob M, Abdullah SNHS, Ahmad Z (2018) Lightweight and optimized multi-layer data hiding using video steganography paper. Int J Adv Comput Sci Appl 9(12):256–262

    Google Scholar 

  30. Thakur A, Singh H, Sharda S (2015) Different techniques of image and video steganography: A review. Int J Electr Elec-Tronics Eng (IJEEE) 2:225–228

    Google Scholar 

  31. Bodhak PV, Gunjal BL (2012) Improved protection in video steganography using dct & least significant bit. Int J Eng Innov Technol (IJEIT) 1(4):31–37

    Google Scholar 

  32. Sudeepa KB, Raju K, Ranjan HS, Ganesh A (2016) A new approach for video steganography based on randomization and parallelization. Procedia Comput Sci 78: 483–490 doi:https://doi.org/10.1016/j.procs.2016.02.092

  33. Rezagholipour K, Eshghi M (2016) Video steganography algorithm based on motion vector of moving object. In: 2016 Eighth international conference on information and knowledge technology (IKT). pp 183–187, IEEE

    Google Scholar 

  34. Bachu S, Madam AK (2018) Detection of motion vector-based video steganography by adding or subtracting one motion vector value. In: Digital image and video watermarking and steganography. IntechOpen

    Google Scholar 

  35. Tan Y, Qin J, Xiang X, Zhang C, Wang Z (2021) Coverless steganography based on motion analysis of video. Secur Commun Netw

    Google Scholar 

  36. Ghamsarian N, Schoeffmann K, Khademi M (2021) Blind MV-based video steganalysis based on joint inter-frame and intra-frame statistics. Multimed Tools Appl 80(6):9137–9159

    Article  Google Scholar 

  37. Mstafa RJ, Younis YM, Hussein HI, Atto M (2020) A new video steganography scheme based on the Shi-Tomasi corner detector. IEEE Access 8:161825–161837

    Article  Google Scholar 

  38. Mstafa RJ, Elleithy KM (2015) A new video steganography algorithm based on the multiple object tracking and Hamming codes. In: 2015 IEEE 14th International conference on machine learning and applications (ICMLA). pp 335–340, IEEE

    Google Scholar 

  39. Hashemzadeh M (2018) Hiding information in videos using motion clues of feature points. Comput Electr Eng 68:14–25

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sk. Sameerunnisa .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sameerunnisa, S., Aruna, O. (2023). A Survey on Hiding Data Using Video Steganography. In: Raj, J.S., Perikos, I., Balas, V.E. (eds) Intelligent Sustainable Systems. ICoISS 2023. Lecture Notes in Networks and Systems, vol 665. Springer, Singapore. https://doi.org/10.1007/978-981-99-1726-6_31

Download citation

Publish with us

Policies and ethics