High-Capacity Video Steganography Based on Chaotic Maps for High-Efficiency Video Coding (HEVC)

Authors

  • Salwan F. Salman Al-Rubaie Electrical Engineering Department, College of Engineering, Mustansiriyah University, Baghdad, Iraq Author https://orcid.org/0009-0000-0847-3775
  • Maher K. Mahmood Al-Azawi Electrical Engineering Department, College of Engineering, Mustansiriyah University, Baghdad, Iraq Author https://orcid.org/0000-0003-3326-8911

DOI:

https://doi.org/10.31272/jeasd.28.6.10

Keywords:

Chaotic maps, Discrete Cosine Transform, High-Efficiency Video Coding, High capacity, Intra-prediction, Video steganography

Abstract

Video steganography is a method for concealing information within a video without substantially changing its visual content. The utilization of high-definition videos has garnered considerable interest from industries. H.265/HEVC, the recent video coding technology, is a promising field for video steganography. In this paper, a high concealment capacity based on three chaotic maps for the HEVC video standard is proposed, where the confidential data will be encrypted using two chaotic maps and then concealed in randomly selected Discrete Cosine Transform (DCT) coefficients of Transform Blocks (TBs), which are also randomly chosen using one chaotic map. The technique used in the DCT domain to achieve superior embedding capacity at the same visual quality compared with the state-of-the-art schemes in the compressed domain, and the use of three novel chaotic maps to protect the secret information and get uncrackable security level are the significant contributions of this paper. The simulation findings proved that the proposed approach has an average concealing capacity reaching 41.3 Kbits/frame. This payload exceeds what recent cutting-edge techniques could achieve in 1280 x 720 video frame dimensions with a ) of -0.009 dB and a Bit Rate Increase (BRI) of 0.0747 at a Quantization Parameter (QP) value of 32. Furthermore, the critical space size of the suggested scheme is , which makes it very secure against all types of brute-force attacks.

References

R. J. Mustafa, K. M. Elleithy, and E. Abdelfattah, "A Robust and Secure Video Steganography Method in DWT-DCT Domains Based on Multiple Object Tracking and ECC," IEEE Access, pp. 1–1, 2017, doi: https://doi.org/10.1109/access.2017.2691581.

A. Jabbar, Shahrin Sahib, and M. Zamani, “An Introduction to Image Steganography Techniques,” International Conference on Advanced Computer Science Applications and Technologies, Nov. 2012, doi: https://doi.org/10.1109/acsat.2012.25.

R. J. Mstafa, Y. M. Younis, H. I. Hussein, and M. Atto, “A New Video Steganography Scheme Based on Shi-Tomasi Corner Detector,” IEEE Access, vol. 8, pp. 161825–161837, 2020, doi: https://doi.org/10.1109/access.2020.3021356.

S. Liu, Y. Liu, C. Feng, and H. Zhao, “An Efficient Video Steganography Method Based on HEVC,” Springer, cham, vol. 12836, pp. 327–336, Aug. 2021, doi: https://doi.org/10.1007/978-3-030-84522-3_26.

H. Zhao, M. Pang, and Y. Liu, “Intra-frame Adaptive Transform Size for Video Steganography in H.265/HEVC Bitstreams,” Springer, cham, vol. 12465, pp. 601–610, Oct. 2020, doi: https://doi.org/10.1007/978-3-030-60796-8_52.

S. Liu, Y. Liu, C. Feng, H. Zhao, and Y. Huang, “A HEVC Steganography Method Based on QDCT Coefficient,” Springer, cham, vol. 12465, pp. 624–632, Oct. 2020, doi: https://doi.org/10.1007/978-3-030-60796-8_54.

W. Yan, Z. Jiang, X. Huang, and Q. Ding, “A Three-Dimensional Infinite Collapse Map with Image Encryption,” Entropy, vol. 23, no. 9, pp. 1221–1221, Sep. 2021, doi: https://doi.org/10.3390/e23091221.

J. S. Muthu and P. Murali, “A new chaotic map with large chaotic band for a secured image cryptosystem,” Optik, vol. 242, p. 167300, Sep. 2021, doi: https://doi.org/10.1016/j.ijleo.2021.167300.

H.-Q. Huang, “Novel Scheme for Image Encryption Combining 2D Logistic-Sine-Cosine Map and Double Random-Phase Encoding,” IEEE Access, vol. 7, pp. 177988–177996, Dec. 2019, doi: https://doi.org/10.1109/access.2019.2958319.

X. Wang and P. Liu, “A New Image Encryption Scheme Based on a Novel One-Dimensional Chaotic System,” IEEE Access, vol. 8, pp. 174463–174479, Sep. 2020, doi: https://doi.org/10.1109/access.2020.3024869.

Mohamed Zakariya Talhaoui, X. Wang, and Mohamed Amine Midoun, “A new one-dimensional cosine polynomial chaotic map and its use in image encryption,” Vis Comput, vol. 37, no. 3, pp. 541–551, Mar. 2021, doi: https://doi.org/10.1007/s00371-020-01822-8.

J. Liu, Z. Li, X. Jiang, and Z. Zhang, “A High-Performance CNN-Applied HEVC Steganography Based on Diamond-Coded PU Partition Modes,” IEEE Transactions on Multimedia, vol. 24, pp. 2084–2097, 2022, doi: https://doi.org/10.1109/tmm.2021.3075858.

H. Zhao, Y. Liu, Y. Wang, S. Liu, and C. Feng, “A Video Steganography Method Based on Transform Block Decision for H.265/HEVC,” IEEE Access, vol. 9, pp. 55506–55521, Feb. 2021, doi: https://doi.org/10.1109/access.2021.3059654.

H. Zhao, M. Pang, and Y. Liu, “An Efficient Video Steganography Scheme for Data Protection in H.265/HEVC,” Springer, cham, vol. 12836, pp. 358–368, Aug. 2021, doi: https://doi.org/10.1007/978-3-030-84522-3_29.

Y. Liu, H. Zhao, S. Liu, C. Feng, and S. Liu, “A Robust and Improved Visual Quality Data Hiding Method for HEVC,” IEEE Access, vol. 6, pp. 53984–53997, 2018, doi: https://doi.org/10.1109/access.2018.2869148.

T. N. Swamy, Kannadka Ramesha, and K. R. Diwakar, “An efficient algorithm for intra prediction in HEVC/H.265 standard for 16×16 pixels,” International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT), pp. 226–233, Dec. 2017, doi: https://doi.org/10.1109/iceeccot.2017.8284674.

I.-K. Kim, M. Jung-Hye, T. D. Lee, W. M. Han, and Jeong Hoon Park, “Block Partitioning Structure in the HEVC Standard,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 22, no. 12, pp. 1697–1706, Dec. 2012, doi: https://doi.org/10.1109/tcsvt.2012.2223011.

G. J. Sullivan, J.-R. Ohm, W.-J. Han, and T. Wiegand, “Overview of the High Efficiency Video Coding (HEVC) Standard,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 22, no. 12, 2013, doi: https://doi.org/10.1109/TCSVT.2012.2221191.

S. Gaj, A. Sur, and P. K. Bora, “Prediction mode based H.265/HEVC video watermarking resisting re-compression attack,” Multimedia Tools and Applications, vol. 79, Feb. 2020, doi: https://doi.org/10.1007/s11042-019-08301-w.

S. Liu, Y. Liu, C. Feng, H. Zhao, and Y. Huang, “Blockchain Privacy Data Protection Method Based on HEVC Video Steganography,” 2020 3rd International Conference on Smart BlockChain (SmartBlock), pp. 1–6, Oct. 2020, doi: https://doi.org/10.1109/smartblock52591.2020.00015.

M. Z. Konyar, O. Akbulut, and S. Öztürk, “Matrix encoding-based high-capacity and high-fidelity reversible data hiding in HEVC,” Signal, Image and Video Processing, vol. 14, pp. 897–905, Jan. 2020, doi: https://doi.org/10.1007/s11760-019-01621-2.

A. A. Elrowayati, M. A. Alrshah, M. F. L. Abdullah, and R. Latip, “HEVC Watermarking Techniques for Authentication and Copyright Applications: Challenges and Opportunities,” IEEE Access, vol. 8, pp. 114172–114189, 2020, doi: https://doi.org/10.1109/access.2020.3004049.

B. Peng and J. Yang, “An optimized algorithm based on generalized difference expansion method used for HEVC reversible video information hiding,” 2017 IEEE 17th International Conference on Communication Technology (ICCT), pp. 1668–1672, Oct. 2017, doi: https://doi.org/10.1109/icct.2017.8359914.

R. O. El Safy, H. H. Zayed, and A. El Dessouki, “An adaptive steganographic technique based on integer wavelet transform,” 2009 International Conference on Networking and Media Convergence, pp. 111–117, Mar. 2009, doi: https://doi.org/10.1109/icnm.2009.4907200.

U. Sara, M. Akter, and M. S. Uddin, “Image Quality Assessment through FSIM, SSIM, MSE and PSNR—A Comparative Study,” Journal of Computer and Communications, vol. 07, no. 03, pp. 8–18, 2019, doi: https://doi.org/10.4236/jcc.2019.73002.

Y. Zhang, M. Zhang, X. Yang, D. Guo, and L. Liu, “Novel video steganography algorithm based on secret sharing and error-correcting code for H.264/AVC,” Tsinghua Science and Technology, vol. 22, no. 2, pp. 198–209, Apr. 2017, doi: https://doi.org/10.23919/tst.2017.7889641.

Y. Cui, Y. Yao, and N. Yu, “Defining Embedding Distortion for Sample Adaptive Offset-Based HEVC Video Steganography,” 2020 IEEE 22nd International Workshop on Multimedia Signal Processing (MMSP), pp. 1–6, Sep. 2020, doi: https://doi.org/10.1109/mmsp48831.2020.9287075.

R. Patel, K. Lad, and M. Patel, “Study and investigation of video steganography over uncompressed and compressed domain: a comprehensive review,” Multimedia Systems, vol. 27, pp. 985–1024, Mar. 2021, doi: https://doi.org/10.1007/s00530-021-00763-z.

V. Kumar and D. Kumar, “A modified DWT-based image steganography technique,” Multimedia Tools and Applications, vol. 77, no. 11, pp. 13279–13308, Jul. 2017, doi: https://doi.org/10.1007/s11042-017-4947-8.

Jayakanth Kunhoth, N. Subramanian, Somaya Al-Maadeed, and A. Bouridane, “Video steganography: recent advances and challenges,” Multimedia Tools and Applications, Apr. 2023, doi: https://doi.org/10.1007/s11042-023-14844-w.

X. Jia, Jie Jin Wang, Y. Liu, X. Kang, and Y. Q. Shi, “A Layered Embedding-Based Scheme to Cope with Intra-Frame Distortion Drift In IPM-Based HEVC Steganography,” ICASSP 2021 - 2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2720–2724, Jun. 2021, doi: https://doi.org/10.1109/icassp39728.2021.9413728.

I. Hussain, Amir Anees, A. H. Alkhaldi, M. Aslam, N. A. Siddiqui, and R. Ahmed, “Image encryption based on Chebyshev chaotic map and S8 S-boxes,” Optica Applicata, vol. 49, pp. 317–330, Jan. 2019, doi: https://doi.org/10.5277/oa190212.

Downloads

Key Dates

Received

2023-06-21

Revised

2024-10-02

Accepted

2024-10-17

Published Online First

2024-11-01

Published

2024-11-01

How to Cite

Al-Rubaie, S. F. S. ., & Al-Azawi, M. K. M. . (2024). High-Capacity Video Steganography Based on Chaotic Maps for High-Efficiency Video Coding (HEVC). Journal of Engineering and Sustainable Development, 28(6), 770-781. https://doi.org/10.31272/jeasd.28.6.10

Similar Articles

1-10 of 634

You may also start an advanced similarity search for this article.