Log in

A data hiding technique for digital videos using entropy-based blocks selection

  • Technical Paper
  • Published:
Microsystem Technologies Aims and scope Submit manuscript

Abstract

The technique of hiding knowledge in certain details is steganography. One of the main trends of computer infrastructure and connectivity following the advent of the Internet has been cyber protection and information security. It is required to hide valuable information like passwords, bank details, and other personal documents. In this perspective, a novel algorithm is proposed for data hiding in digital videos using entropy-based blocks selection to make the message more secure. In which firstly random frames are selected by using a key and then random macroblocks are selected. The macroblocks with high entropy have chosen to hide the data in them. This paper presents a critical analysis driven from the literature and the experimental results. To quantify the results and to evaluate the performance of distinct steganography techniques, different quality metrics like peak signal-to-noise ratio (PSNR), mean squared error (MSE) & bit error rate (BER). have been used. Experimental results show that the proposed algorithm outperforms the other state of art techniques and also able to hide the secret message in the video without adding the noise and other distortions.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (United Kingdom)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  • Bruce AM (2001) A review of digital watermarking. Dep Eng Univ Aberdeen 2(5): 63–65

  • Cao Y, Zhao X, Feng D, Sheng R (2011) Video steganography with perturbed motion estimation. Lect Notes Comput Sci (including Subser Lect Notes Artif Intell Lect Notes Bioinformatics) 6958 LNCS:193–207

    Google Scholar 

  • Gaj S, Kanetkar A, Sur A, Bora PK (2017) Drift-compensated robust watermarking algorithm for H.265/HEVC video stream. ACM Trans Multimed Comput Commun Appl 13(1)

  • Girdhar A, Kumar V (2018) Comprehensive survey of 3D image steganography techniques. IET Image Process 12(1):1–10

    Article  Google Scholar 

  • Kaur R, Singh S (2016) An artificial neural network based approach to calculate BER in CDMA for multiuser detection using MEM. In: Proc. 2nd Int. Conf. Next Gener. Comput. Technol. NGCT 2016, no. October, pp. 450–455, 2017

  • Kessler GC, Hosmer C (2011) An overview of steganography. Adv Comput 83:51–107

    Article  Google Scholar 

  • Khunteta A, Sharma P, Pathak S, Noonia A (2020) Image security using triple key chaotic encryption and SPIHT compression technique in steganography.  pp 227–235

  • Lemos N, Sonawane K, Roy B (2015) Secure data transmission using video. In: 8th International Conference on Contemporary Computing, IC3 2015, 2015, pp 231–234

  • Mary SSC (2010) Improved protection in video steganography used compressed video bitstreams. Improv Prot Video Steganography Used Compress. Video Bitstreams 2(3): 764–766

  • Mishra D, Singh SK, Singh RK (2022) Deep architectures for image compression: a critical review.  Signal Process 191:2

  • Mstafa RJ, Elleithy KM (2017) Compressed and raw video steganography techniques: a comprehensive survey and analysis. Multimed Tools Appl 76(20):21749–21786

    Article  Google Scholar 

  • Mumthas S, Lijiya A (2017) Transform domain video steganography using RSA, random DNA encryption and huffman encoding. Proc Comput Sci 115:660–666

    Article  Google Scholar 

  • Rajkumar F (2011) Entropy based robust watermarking scheme using HADAMARD transformation technique. Int J Comput Appl 12(9):14–21

    Google Scholar 

  • Robie DL, Mersereau RM (2002) Video error correction using steganography inEurasip. J Appl Signal Process 2:164–173

    MATH  Google Scholar 

  • Rodríguez Galiano D, Del Barrio AA, Botella G, Cuesta D (2020) Efficient embedding and retrieval of information for high-resolution videos coded with HEVC. Comput Electr Eng 81:2

    Article  Google Scholar 

  • Shanableh T (2012) Matrix encoding for data hiding using multilayer video coding and transcoding solutions. Signal Process Image Commun 27(9):1025–1034

    Article  Google Scholar 

  • Singh R (2018) Image sharing using cryptography (ISUC): a review. Int J Manag Technol Eng 8(1686):1686–1689

    Google Scholar 

  • Singh R, Singh S, Sharma N (2019) The hybrid approach for image watermarking using GLCM algorithm. Int J Recent Technol Eng 8(1C2):105–111

    Google Scholar 

  • Singh S, Mittal N, Singh H (2020) Classification of various image fusion algorithms and their performance evaluation metrics. Comput Intell Mach Learn Healthc Inform pp 179–198

  • Singh S, Mittal N, Singh H (2020) A multilevel thresholding algorithm using LebTLBO for image segmentation. Neural Comput Appl 32(21):16681–16706

    Article  Google Scholar 

  • Singh S, Mittal N, Singh H (2020) Multifocus image fusion based on multiresolution pyramid and bilateral filter. IETE J Res 2:1–12

    Google Scholar 

  • Singh H, Gandhi CP, Gupta A, Bakshi S (2021) Entropy based designing and analysis of a compact single layer double negative metamaterial with oblique incidents. Eng Appl Artif Intell 103:1–11

    Article  Google Scholar 

  • Singh S, Mittal N, Singh H (2021) Review of various image fusion algorithms and image fusion performance metric. Arch Comput Methods Eng 28(5):3645–3659

    Article  Google Scholar 

  • Xu C, ** X, Zhang T (2006) Steganography in compressed video stream. In: First International Conference on Innovative Computing, Information and Control 2006, ICICIC’06, pp. 269–272

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Simrandeep Singh.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Singh, S., Gehlot, A. A data hiding technique for digital videos using entropy-based blocks selection. Microsyst Technol 28, 2705–2714 (2022). https://doi.org/10.1007/s00542-022-05302-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00542-022-05302-y

Navigation