Home About Login Current Archives Announcements Editorial Board
Submit Now For Authors Call for Submissions Statistics Contact
Home > Archives > Volume 20, No 8 (2022) > Article

DOI: 10.14704/nq.2022.20.8.NQ44899

Video Steganography Using a Hybrid Schem

Faiz Adheem Hameed, Ahmad Taha, Salim Wadi

Abstract

The ability to communicate multimedia content quickly has been made possible by recent advancements in Internet speed. However, these technological advancements result in breaches of data security and personal information. Private information protection is made possible through digital steganography, which is crucial in the contemporary Internet era. Due to its high ability to conceal critical data, digital video has drawn the attention of many researchers in all digital media. Recently, a variety of video steganography techniques have been put out to stop the theft of sensitive data. However, there are numerous problems with these approaches' resilience, embedding ability, and visual imperceptibility. This work suggests a novel method for video steganography that relies on the corner location theory and the LSBs algorithm to address these problems. The suggested method initially locates areas of corner points inside the frames using the Shi-Tomasi Technique . Then, it employs the 3-LSBs technique to conceal sensitive information inside the noted corner spots. Additionally, to increase security, the suggested method encrypts sensitive data using the AES cipher method before embedding. The suggested approach is exceedingly secure and almost unnoticeable, and sufficiently robust Salt & Pepper noise, which has an average Structural Similarity Index (SSIM) of more than 0.9998, On the basis of experimental results. The results also showed that the proposed method is superior to the methods developed based on lack of visual imperceptibility, offering good peak signal-to-noise ratios (PSNR) of an average of 57.57 dB while preserving excellent embedding capacities.

Keywords

Private Information, Steganography, Embedding, 3- LSBs, AES

Full Text

PDF

References

?>