Abstract
Steganography’s capability to transmit data secretly has made it more popular in recent decades. Steganography secretly transmits information via a cover media such as a text file, picture file, audio file, or video file. As a result of its potential for concealing a more significant quantity of sensitive data, video steganography is gaining popularity. Compression methods and video deduplication are provided in this study as they pertain to the use of video in clandestine communication. When conducting surveys, both processed and raw footage are taken into account. Moreover, we discuss whether such an encryption method is even possible. This study covers state of the art in covert video embedding and encryption methods. Numerous compression techniques are discussed here, and data is also more securely stored in motion vectors in dynamic scenes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Wu L, Huang K, Shen H, Gao L (2020) Foreground–background parallel compression with residual encoding for surveillance video. IEEE Trans Circuits Syst Video Technol 31(7):2711–2724
Zhao L, Wang S, Wang S, Ye Y, Ma S, Gao W (2021) Enhanced surveillance video compression with dual reference frames generation. IEEE Trans Circuits Syst Video Technol 32(3):1592–1606
Wahab OFA, Khalaf AA, Hussein AI, Hamed HF (2021) Hiding data using efficient combination of RSA cryptography, and compression steganography techniques. IEEE Access 9:31805–31815
Li Y, Hu L, Xia K, Luo J (2019) Fast distributed video deduplication via locality-sensitive hashing with similarity ranking. EURASIP J Image Video Process 2019(1):1–11
Mstafa RJ, Elleithy KM (2017) Compressed and raw video steganography techniques: A comprehensive survey and analysis. Multimed Tools Appl 76(20):21749–21786
Liu Y, Liu S, Wang Y, Zhao H, Liu S (2019) Video steganography: A review. Neurocomputing 335:238–250
Pilania U, Tanwar R, Gupta P (2022) An ROI-based robust video steganography technique using SVD in wavelet domain. Open Comput Sci 12(1):1–16
Rajkumar GP, Malemath VS (2017) Video steganography: Secure data hiding technique. Int J Comput Netw & Inf Secur 9(9)
Bandyopadhyay S, Bose P, Goyel V (2021) A graphical based video steganography
Younus ZS, Younus GT (2020) Video steganography using knight tour algorithm and LEAST SIGNIFICANT BIT method for encrypted data. J Intell Syst 29(1):1216–1225
Manohar N, Kumar PV (2020) Data encryption & decryption using steganography. In: 2020 4th International conference on intelligent computing and control systems (ICICCS) pp 697–702, IEEE
Aiswarya S, Gomathi R (2018) Review on cryptography and steganography techniques in video. In:2018 IEEE International conference on computational intelligence and computing research (ICCIC). pp 1–4, IEEE
Halder R, Sengupta S, Ghosh S, Kundu D (2016) A secure image steganography based on RSA algorithm and hash-LSB technique. IOSR J Comput Eng (IOSR-JCE) 18(1): 39–43
Mudusu R, Nagesh A, Sdanandam M (2018) Enhancing data security using audio-video steganography. Int J Eng & Technol 7(2.20): 276–279
Joshi J (2015) A review on data security using video steganography. Int J Adv Res Electr, Electron Instrum Eng 04: 3892–3896, doi:https://doi.org/10.15662/ijareeie.2015.0405015
Gursukhmani E Case study of hiding a text using video steganography
Singh N (2018) XOR encryption techniques of video steganography: A comparative analysis. In: International conference on intelligent systems design and applications. pp 203–214, Springer, Cham
Ranjithkumar R, Ganeshkumar D, Senthamilarasu S (2021) Efficient and secure data hiding in video sequence with three layer security: an approach using chaos. Multimed Tools Appl 80(9):13865–13878
Bansal R, Badal N (2020) Hiding the message using cryptography in video steganography. Int J Sci Technol Res 9:1192–1195
Choudry KN, Wanjari A (2015) A survey paper on video steganography. Int J Comput Sci Inf Technol 6(3):2335–2338
Hacimurtazaoglu M, Tutuncu K (2022) LEAST SIGNIFICANT BIT-based pre-embedding video steganography with rotating & shifting poly-pattern block matrix. PeerJ Comput Sci 8:e843
Reddy VL (2017) Improved secure data transfer using video steganographic technique. Int J Rough Sets Data Anal (IJRSDA) 4(3):55–70
Khan N, Gorde KS (2015) Video steganography by using statistical key frame extraction method and LEAST SIGNIFICANT BIT technique. Int J Innov Res Sci Eng Technol 4(10):10410–10417
Maheswari K, Selvi RT (2016) A survey: Video steganography and security forbidden zone and selective embedding
Isong E, Bassey, Ibanga I, Ubi G (2019) Information security system using video-steganography technique. doi:https://doi.org/10.22624/AIMS/DIGITAL/V7N1P7
Lekha MAC (2018) Hiding an image data into video stenography using different algorithm and MATLAB: A review. Int J Comput Sci Trends Technol 6(2):12–16
Voeller JG (ed) (2014) Cyber security. John Wiley & Sons
Tarun MVS, Rao KV, Mahesh MN, Srikanth N, Reddy M (2020) Digital video steganography using the LEAST SIGNIFICANT BIT technique. Red 100111(11101000):11001001
Kamil S, Ayob M, Abdullah SNHS, Ahmad Z (2018) Lightweight and optimized multi-layer data hiding using video steganography paper. Int J Adv Comput Sci Appl 9(12):256–262
Thakur A, Singh H, Sharda S (2015) Different techniques of image and video steganography: A review. Int J Electr Elec-Tronics Eng (IJEEE) 2:225–228
Bodhak PV, Gunjal BL (2012) Improved protection in video steganography using dct & least significant bit. Int J Eng Innov Technol (IJEIT) 1(4):31–37
Sudeepa KB, Raju K, Ranjan HS, Ganesh A (2016) A new approach for video steganography based on randomization and parallelization. Procedia Comput Sci 78: 483–490 doi:https://doi.org/10.1016/j.procs.2016.02.092
Rezagholipour K, Eshghi M (2016) Video steganography algorithm based on motion vector of moving object. In: 2016 Eighth international conference on information and knowledge technology (IKT). pp 183–187, IEEE
Bachu S, Madam AK (2018) Detection of motion vector-based video steganography by adding or subtracting one motion vector value. In: Digital image and video watermarking and steganography. IntechOpen
Tan Y, Qin J, Xiang X, Zhang C, Wang Z (2021) Coverless steganography based on motion analysis of video. Secur Commun Netw
Ghamsarian N, Schoeffmann K, Khademi M (2021) Blind MV-based video steganalysis based on joint inter-frame and intra-frame statistics. Multimed Tools Appl 80(6):9137–9159
Mstafa RJ, Younis YM, Hussein HI, Atto M (2020) A new video steganography scheme based on the Shi-Tomasi corner detector. IEEE Access 8:161825–161837
Mstafa RJ, Elleithy KM (2015) A new video steganography algorithm based on the multiple object tracking and Hamming codes. In: 2015 IEEE 14th International conference on machine learning and applications (ICMLA). pp 335–340, IEEE
Hashemzadeh M (2018) Hiding information in videos using motion clues of feature points. Comput Electr Eng 68:14–25
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sameerunnisa, S., Aruna, O. (2023). A Survey on Hiding Data Using Video Steganography. In: Raj, J.S., Perikos, I., Balas, V.E. (eds) Intelligent Sustainable Systems. ICoISS 2023. Lecture Notes in Networks and Systems, vol 665. Springer, Singapore. https://doi.org/10.1007/978-981-99-1726-6_31
Download citation
DOI: https://doi.org/10.1007/978-981-99-1726-6_31
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-1725-9
Online ISBN: 978-981-99-1726-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)