Skip to main content

2024 | OriginalPaper | Buchkapitel

Video Steganography Techniques: A Comprehensive Review and Performance Evaluation

verfasst von : Hemant Kumar, Pushpa Mamoria, Shivani Kumari, Manoj Kumar Misra

Erschienen in: Cryptology and Network Security with Machine Learning

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This paper discusses various steganography techniques and their parameters. Based on these parameters, we make some comparative analysis among different steganography methods in various research domains. We take LSB, DCT, hash function, and DWT methods for comparisons. The important parameters of the mentioned techniques are PSNR, embedding capacity, and MSE. Based on these parameters, we found that LSB method is most appropriate for implementation of video steganography having negligible error. Video steganography is a mean of hiding videos from one format to another format. The primary objective of video steganography technique is to conceal an important message (information or data) inside of an ordinary video such that an unauthorized person cannot reveal the message.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Kumar H, Singh A (2016) Internet of Things: a comprehensive analysis and security implementation through elliptic curve cryptography. Int J Curr Eng Technol 6(2):498–502 Kumar H, Singh A (2016) Internet of Things: a comprehensive analysis and security implementation through elliptic curve cryptography. Int J Curr Eng Technol 6(2):498–502
4.
Zurück zum Zitat Hossain S, Mukhopadhyay S, Ray B, Ghosal SK, Sarkar R (2022) A secured image steganography method based on ballot transform and genetic algorithm. Multimed Tools Appl 81:38429–38458CrossRef Hossain S, Mukhopadhyay S, Ray B, Ghosal SK, Sarkar R (2022) A secured image steganography method based on ballot transform and genetic algorithm. Multimed Tools Appl 81:38429–38458CrossRef
5.
Zurück zum Zitat Sakshi S, Verma S, Chaturvedi P, Yadav SA (2022) Least significant bit steganography for text and image hiding. In: 2022 3rd International Conference on Intelligent Engineering and Management (ICIEM), pp 415–421 Sakshi S, Verma S, Chaturvedi P, Yadav SA (2022) Least significant bit steganography for text and image hiding. In: 2022 3rd International Conference on Intelligent Engineering and Management (ICIEM), pp 415–421
6.
Zurück zum Zitat Singh R, Verma S, Yadav SA, Vikram Singh S (2022) Copy-move forgery detection using SIFT and DWT detection techniques. In: 2022 3rd International Conference on Intelligent Engineering and Management (ICIEM), pp 338–343 Singh R, Verma S, Yadav SA, Vikram Singh S (2022) Copy-move forgery detection using SIFT and DWT detection techniques. In: 2022 3rd International Conference on Intelligent Engineering and Management (ICIEM), pp 338–343
7.
Zurück zum Zitat Rathore MS, Poongodi M, Saurabh P, Lilhore UK, Bourouis S, Alhakami W, Osamor J, Hamdi M (2022) A novel trust-based security and privacy model for Internet of Vehicles using encryption and steganography. Comput Electr Eng 102:108205CrossRef Rathore MS, Poongodi M, Saurabh P, Lilhore UK, Bourouis S, Alhakami W, Osamor J, Hamdi M (2022) A novel trust-based security and privacy model for Internet of Vehicles using encryption and steganography. Comput Electr Eng 102:108205CrossRef
8.
Zurück zum Zitat Peter G, Sherine A, Teekaraman Y, Kuppusamy R, Radhakrishnan A (2022) Histogram shifting-based quick response steganography method for secure communication. Wirel Commun Mobile Comput 2022:1–11CrossRef Peter G, Sherine A, Teekaraman Y, Kuppusamy R, Radhakrishnan A (2022) Histogram shifting-based quick response steganography method for secure communication. Wirel Commun Mobile Comput 2022:1–11CrossRef
10.
Zurück zum Zitat Hassaballah M, Hameed MA, Awad AI, Muhammad K (2021) A novel image steganography method for industrial internet of things security. IEEE Trans Industr Inf 17:7743–7751CrossRef Hassaballah M, Hameed MA, Awad AI, Muhammad K (2021) A novel image steganography method for industrial internet of things security. IEEE Trans Industr Inf 17:7743–7751CrossRef
11.
Zurück zum Zitat Rustad S, Setiadi DR, Syukur A, Andono PN (2021) Inverted LSB image steganography using adaptive pattern to improve imperceptibility. J King Saud Univ Comput Inf Sci 34:3559–3568 Rustad S, Setiadi DR, Syukur A, Andono PN (2021) Inverted LSB image steganography using adaptive pattern to improve imperceptibility. J King Saud Univ Comput Inf Sci 34:3559–3568
12.
Zurück zum Zitat Fateh M, Rezvani M (2021) Irani Y (2021) A new method of coding for steganography based on LSB matching revisited. Secur Commun Netw 6610678(1–6610678):15 Fateh M, Rezvani M (2021) Irani Y (2021) A new method of coding for steganography based on LSB matching revisited. Secur Commun Netw 6610678(1–6610678):15
13.
Zurück zum Zitat Soomro K, Zamir AR, Shah M (2012) UCF101: a dataset of 101 human actions classes from videos in the wild. ArXiv, abs/1212.0402 Soomro K, Zamir AR, Shah M (2012) UCF101: a dataset of 101 human actions classes from videos in the wild. ArXiv, abs/1212.0402
15.
Zurück zum Zitat Kuehne H, Jhuang H, Garrote E, Poggio TA, Serre T (2011) HMDB: a large video database for human motion recognition. Int Conf Comput Vis 2011:2556–2563 Kuehne H, Jhuang H, Garrote E, Poggio TA, Serre T (2011) HMDB: a large video database for human motion recognition. Int Conf Comput Vis 2011:2556–2563
18.
Zurück zum Zitat Mishra MK, Shukla V, Chaturvedi A, Bhattacharya P, Tanwar S (2023) A secure authenticated key agreement protocol using polynomials. In: Proceedings of International Conference on Recent Innovations in Computing. Lecture Notes in Electrical Engineering, vol 1001, pp 1001. Springer, Singapore. https://doi.org/10.1007/978-981-19-9876-8_44 Mishra MK, Shukla V, Chaturvedi A, Bhattacharya P, Tanwar S (2023) A secure authenticated key agreement protocol using polynomials. In: Proceedings of International Conference on Recent Innovations in Computing. Lecture Notes in Electrical Engineering, vol 1001, pp 1001. Springer, Singapore. https://​doi.​org/​10.​1007/​978-981-19-9876-8_​44
Metadaten
Titel
Video Steganography Techniques: A Comprehensive Review and Performance Evaluation
verfasst von
Hemant Kumar
Pushpa Mamoria
Shivani Kumari
Manoj Kumar Misra
Copyright-Jahr
2024
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-97-0641-9_3

Neuer Inhalt