Abstract
Steganography is the ancient art of concealing messages into data. High research interest has grown over the last years, however, techniques in literature are only focused on standard and in some way legacy multimedia formats (e.g., H.264). Moreover, most video steganography techniques are based on concealing data into contents of each frame employing many strategies. In this paper, a codec-level video steganography technique is presented on the novel AV1: a royalty-free video compression format proposed by the Alliance for Open Media (AOM). The proposed method is based on the alteration of intra-prediction angles and, differently from other solutions, it works along the compression process, by allowing the encoder to reduce possible distortions caused by the messages to be hidden. The effectiveness of the technique was demonstrated by hiding up to 1024 characters into an highly compressed video of 40 s maintaining an average Peak Signal-to-Noise Ratio value of 37.53 dB.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Yao, Y., Zhang, W., Yu, N., Zhao, X.: Defining embedding distortion for motion vector-based video steganography. Multimedia Tools Appl. 74(24), 11163–11186 (2014). https://doi.org/10.1007/s11042-014-2223-8
Battiato, S., Giudice, O., Paratore, A.: Multimedia forensics: discovering the history of multimedia contents. In: Proceedings of the 17th International Conference on Computer Systems and Technologies 2016, pp. 5–16 (2016)
Cao, M., Tian, L., Li, C.: A secure video steganography based on the intra-prediction mode (IPM) for h264. Sensors 20(18), 5242 (2020)
Cao, Y., Zhang, H., Zhao, X., Yu, H.: Video steganography based on optimized motion estimation perturbation. In: Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, pp. 25–31 (2015)
Dasgupta, K., Mandal, J.K., Dutta, P.: Hash based least significant bit technique for video steganography (HLSB). Int. J. Secur. Priv. Trust Manage. (IJSPTM) 1(2), 1–11 (2012)
Dhawan, S., Gupta, R.: Analysis of various data security techniques of steganography: a survey. Inf. Secur. J. Glob. Perspect. 30(2), 63–87 (2021)
Patel, et al.: Lazy wavelet transform based steganography in video. In: 2013 International Conference on Communication Systems and Network Technologies, pp. 497–500 (2013)
Oh, S., et al.: A large-scale benchmark dataset for event recognition in surveillance video (2011)
Manjula, G.R., Sushma, R.B.: Video steganography: a survey of techniques and methodologies. Available at SSRN 3851241 (2021)
Gomez, T.S., Guillermo, A., Francia, I.I.I.: Steganography obliterator: an attack on the least significant bits. In: InfoSecCD Conference 2006, September 2006
Gujjunoori, S., Amberker, B.B.: DCT based reversible data embedding for mpeg-4 video using HVS characteristics. J. Inf. Secur. Appl. 18(4), 157–166 (2013)
Liu, Y., Liu, S., Wang, Y., Zhao, H., Liu, S.: Video steganography: a review. Neurocomputing 335, 238–250 (2019)
Mstafa, R.J., Elleithy, K.M.: Compressed and raw video steganography techniques: a comprehensive survey and analysis. Multimedia Tools Appl. 76(20), 21749–21786 (2016). https://doi.org/10.1007/s11042-016-4055-1
Piva, A.: An overview on image forensics. ISRN Signal Process. 2013, 22 (2013)
Dahatonde, A., Bhautmage, P., Jeyakumar, A.: Advanced video steganography algorithm. Int. J. Eng. Res. Appl. (IJERA) 3, 1641–1644 (2013)
Sampat, V., Dave, K., Madia, J., Toprani, P.: A novel video steganography technique using dynamic cover generation. In: National Conference on Advancement of Technologies-Information Systems & Computer Networks (ISCON-2012), Proceedings published in Int J of Comput Appl (IJCA). Citeseer (2012)
Swathi, A., Jilani, S.A.K.: Video steganography by LSB substitution using different polynomial equations. Int. J. Comput. Eng. Res. 2(5), 1620–1623 (2012)
Yadav, P., Mishra, N., Sharma, S.: A secure video steganography with encryption based on LSB technique. In: 2013 IEEE International Conference on Computational Intelligence and Computing Research, pp. 1–5. IEEE (2013)
Zhang, M., Guo, Y.: Video steganography algorithm with motion search cost minimized. In: 2014 9Th IEEE Conference on Industrial Electronics and Applications, pp. 940–943. IEEE (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Catania, L., Allegra, D., Giudice, O., Stanco, F., Battiato, S. (2022). Introducing AV1 Codec-Level Video Steganography. In: Sclaroff, S., Distante, C., Leo, M., Farinella, G.M., Tombari, F. (eds) Image Analysis and Processing – ICIAP 2022. ICIAP 2022. Lecture Notes in Computer Science, vol 13231. Springer, Cham. https://doi.org/10.1007/978-3-031-06427-2_24
Download citation
DOI: https://doi.org/10.1007/978-3-031-06427-2_24
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-06426-5
Online ISBN: 978-3-031-06427-2
eBook Packages: Computer ScienceComputer Science (R0)