Abstract
The technique of hiding knowledge in certain details is steganography. One of the main trends of computer infrastructure and connectivity following the advent of the Internet has been cyber protection and information security. It is required to hide valuable information like passwords, bank details, and other personal documents. In this perspective, a novel algorithm is proposed for data hiding in digital videos using entropy-based blocks selection to make the message more secure. In which firstly random frames are selected by using a key and then random macroblocks are selected. The macroblocks with high entropy have chosen to hide the data in them. This paper presents a critical analysis driven from the literature and the experimental results. To quantify the results and to evaluate the performance of distinct steganography techniques, different quality metrics like peak signal-to-noise ratio (PSNR), mean squared error (MSE) & bit error rate (BER). have been used. Experimental results show that the proposed algorithm outperforms the other state of art techniques and also able to hide the secret message in the video without adding the noise and other distortions.
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs00542-022-05302-y/MediaObjects/542_2022_5302_Fig1_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs00542-022-05302-y/MediaObjects/542_2022_5302_Fig2_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs00542-022-05302-y/MediaObjects/542_2022_5302_Fig3_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs00542-022-05302-y/MediaObjects/542_2022_5302_Fig4_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs00542-022-05302-y/MediaObjects/542_2022_5302_Fig5_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs00542-022-05302-y/MediaObjects/542_2022_5302_Fig6_HTML.jpg)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs00542-022-05302-y/MediaObjects/542_2022_5302_Fig7_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs00542-022-05302-y/MediaObjects/542_2022_5302_Fig8_HTML.jpg)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs00542-022-05302-y/MediaObjects/542_2022_5302_Fig9_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs00542-022-05302-y/MediaObjects/542_2022_5302_Fig10_HTML.jpg)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs00542-022-05302-y/MediaObjects/542_2022_5302_Fig11_HTML.png)
Similar content being viewed by others
References
Bruce AM (2001) A review of digital watermarking. Dep Eng Univ Aberdeen 2(5): 63–65
Cao Y, Zhao X, Feng D, Sheng R (2011) Video steganography with perturbed motion estimation. Lect Notes Comput Sci (including Subser Lect Notes Artif Intell Lect Notes Bioinformatics) 6958 LNCS:193–207
Gaj S, Kanetkar A, Sur A, Bora PK (2017) Drift-compensated robust watermarking algorithm for H.265/HEVC video stream. ACM Trans Multimed Comput Commun Appl 13(1)
Girdhar A, Kumar V (2018) Comprehensive survey of 3D image steganography techniques. IET Image Process 12(1):1–10
Kaur R, Singh S (2016) An artificial neural network based approach to calculate BER in CDMA for multiuser detection using MEM. In: Proc. 2nd Int. Conf. Next Gener. Comput. Technol. NGCT 2016, no. October, pp. 450–455, 2017
Kessler GC, Hosmer C (2011) An overview of steganography. Adv Comput 83:51–107
Khunteta A, Sharma P, Pathak S, Noonia A (2020) Image security using triple key chaotic encryption and SPIHT compression technique in steganography. pp 227–235
Lemos N, Sonawane K, Roy B (2015) Secure data transmission using video. In: 8th International Conference on Contemporary Computing, IC3 2015, 2015, pp 231–234
Mary SSC (2010) Improved protection in video steganography used compressed video bitstreams. Improv Prot Video Steganography Used Compress. Video Bitstreams 2(3): 764–766
Mishra D, Singh SK, Singh RK (2022) Deep architectures for image compression: a critical review. Signal Process 191:2
Mstafa RJ, Elleithy KM (2017) Compressed and raw video steganography techniques: a comprehensive survey and analysis. Multimed Tools Appl 76(20):21749–21786
Mumthas S, Lijiya A (2017) Transform domain video steganography using RSA, random DNA encryption and huffman encoding. Proc Comput Sci 115:660–666
Rajkumar F (2011) Entropy based robust watermarking scheme using HADAMARD transformation technique. Int J Comput Appl 12(9):14–21
Robie DL, Mersereau RM (2002) Video error correction using steganography inEurasip. J Appl Signal Process 2:164–173
Rodríguez Galiano D, Del Barrio AA, Botella G, Cuesta D (2020) Efficient embedding and retrieval of information for high-resolution videos coded with HEVC. Comput Electr Eng 81:2
Shanableh T (2012) Matrix encoding for data hiding using multilayer video coding and transcoding solutions. Signal Process Image Commun 27(9):1025–1034
Singh R (2018) Image sharing using cryptography (ISUC): a review. Int J Manag Technol Eng 8(1686):1686–1689
Singh R, Singh S, Sharma N (2019) The hybrid approach for image watermarking using GLCM algorithm. Int J Recent Technol Eng 8(1C2):105–111
Singh S, Mittal N, Singh H (2020) Classification of various image fusion algorithms and their performance evaluation metrics. Comput Intell Mach Learn Healthc Inform pp 179–198
Singh S, Mittal N, Singh H (2020) A multilevel thresholding algorithm using LebTLBO for image segmentation. Neural Comput Appl 32(21):16681–16706
Singh S, Mittal N, Singh H (2020) Multifocus image fusion based on multiresolution pyramid and bilateral filter. IETE J Res 2:1–12
Singh H, Gandhi CP, Gupta A, Bakshi S (2021) Entropy based designing and analysis of a compact single layer double negative metamaterial with oblique incidents. Eng Appl Artif Intell 103:1–11
Singh S, Mittal N, Singh H (2021) Review of various image fusion algorithms and image fusion performance metric. Arch Comput Methods Eng 28(5):3645–3659
Xu C, ** X, Zhang T (2006) Steganography in compressed video stream. In: First International Conference on Innovative Computing, Information and Control 2006, ICICIC’06, pp. 269–272
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Singh, S., Gehlot, A. A data hiding technique for digital videos using entropy-based blocks selection. Microsyst Technol 28, 2705–2714 (2022). https://doi.org/10.1007/s00542-022-05302-y
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00542-022-05302-y