Volume 20 No 8 (2022)
Download PDF
Video Steganography Using a Hybrid Schem
Faiz Adheem Hameed Ahmad Taha, Salim Wadi
Abstract
The ability to communicate multimedia content quickly has been made possible by recent advancements in Internet speed. However, these technological advancements result in breaches of data security and personal information. Private information protection is made possible through digital
steganography, which is crucial in the contemporary Internet era. Due to its high ability to conceal
critical data, digital video has drawn the attention of many researchers in all digital media. Recently, a
variety of video steganography techniques have been put out to stop the theft of sensitive data.
However, there are numerous problems with these approaches' resilience, embedding ability, and
visual imperceptibility. This work suggests a novel method for video steganography that relies on the
corner location theory and the LSBs algorithm to address these problems. The suggested method initially locates areas of corner points inside the frames using the Shi-Tomasi Technique . Then, it employs the 3-LSBs technique to conceal sensitive information inside the noted corner spots. Additionally, to increase security, the suggested method encrypts sensitive data using the AES cipher method
before embedding. The suggested approach is exceedingly secure and almost unnoticeable, and sufficiently robust Salt & Pepper noise, which has an average Structural Similarity Index (SSIM) of more
than 0.9998, On the basis of experimental results. The results also showed that the proposed method
is superior to the methods developed based on lack of visual imperceptibility, offering good peak sig -
nal-to-noise ratios (PSNR) of an average of 57.57 dB while preserving excellent embedding capacities.
Keywords
Private Information, Steganography, Embedding, 3- LSBs, AES
Copyright
Copyright © Neuroquantology
Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Articles published in the Neuroquantology are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJECSE right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.