Skip to main content

Introducing AV1 Codec-Level Video Steganography

  • Conference paper
  • First Online:
Image Analysis and Processing – ICIAP 2022 (ICIAP 2022)

Abstract

Steganography is the ancient art of concealing messages into data. High research interest has grown over the last years, however, techniques in literature are only focused on standard and in some way legacy multimedia formats (e.g., H.264). Moreover, most video steganography techniques are based on concealing data into contents of each frame employing many strategies. In this paper, a codec-level video steganography technique is presented on the novel AV1: a royalty-free video compression format proposed by the Alliance for Open Media (AOM). The proposed method is based on the alteration of intra-prediction angles and, differently from other solutions, it works along the compression process, by allowing the encoder to reduce possible distortions caused by the messages to be hidden. The effectiveness of the technique was demonstrated by hiding up to 1024 characters into an highly compressed video of 40 s maintaining an average Peak Signal-to-Noise Ratio value of 37.53 dB.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Yao, Y., Zhang, W., Yu, N., Zhao, X.: Defining embedding distortion for motion vector-based video steganography. Multimedia Tools Appl. 74(24), 11163–11186 (2014). https://doi.org/10.1007/s11042-014-2223-8

    Article  Google Scholar 

  2. Battiato, S., Giudice, O., Paratore, A.: Multimedia forensics: discovering the history of multimedia contents. In: Proceedings of the 17th International Conference on Computer Systems and Technologies 2016, pp. 5–16 (2016)

    Google Scholar 

  3. Cao, M., Tian, L., Li, C.: A secure video steganography based on the intra-prediction mode (IPM) for h264. Sensors 20(18), 5242 (2020)

    Google Scholar 

  4. Cao, Y., Zhang, H., Zhao, X., Yu, H.: Video steganography based on optimized motion estimation perturbation. In: Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, pp. 25–31 (2015)

    Google Scholar 

  5. Dasgupta, K., Mandal, J.K., Dutta, P.: Hash based least significant bit technique for video steganography (HLSB). Int. J. Secur. Priv. Trust Manage. (IJSPTM) 1(2), 1–11 (2012)

    Google Scholar 

  6. Dhawan, S., Gupta, R.: Analysis of various data security techniques of steganography: a survey. Inf. Secur. J. Glob. Perspect. 30(2), 63–87 (2021)

    Article  Google Scholar 

  7. Patel, et al.: Lazy wavelet transform based steganography in video. In: 2013 International Conference on Communication Systems and Network Technologies, pp. 497–500 (2013)

    Google Scholar 

  8. Oh, S., et al.: A large-scale benchmark dataset for event recognition in surveillance video (2011)

    Google Scholar 

  9. Manjula, G.R., Sushma, R.B.: Video steganography: a survey of techniques and methodologies. Available at SSRN 3851241 (2021)

    Google Scholar 

  10. Gomez, T.S., Guillermo, A., Francia, I.I.I.: Steganography obliterator: an attack on the least significant bits. In: InfoSecCD Conference 2006, September 2006

    Google Scholar 

  11. Gujjunoori, S., Amberker, B.B.: DCT based reversible data embedding for mpeg-4 video using HVS characteristics. J. Inf. Secur. Appl. 18(4), 157–166 (2013)

    Google Scholar 

  12. Liu, Y., Liu, S., Wang, Y., Zhao, H., Liu, S.: Video steganography: a review. Neurocomputing 335, 238–250 (2019)

    Article  Google Scholar 

  13. Mstafa, R.J., Elleithy, K.M.: Compressed and raw video steganography techniques: a comprehensive survey and analysis. Multimedia Tools Appl. 76(20), 21749–21786 (2016). https://doi.org/10.1007/s11042-016-4055-1

    Article  Google Scholar 

  14. Piva, A.: An overview on image forensics. ISRN Signal Process. 2013, 22 (2013)

    Article  Google Scholar 

  15. Dahatonde, A., Bhautmage, P., Jeyakumar, A.: Advanced video steganography algorithm. Int. J. Eng. Res. Appl. (IJERA) 3, 1641–1644 (2013)

    Google Scholar 

  16. Sampat, V., Dave, K., Madia, J., Toprani, P.: A novel video steganography technique using dynamic cover generation. In: National Conference on Advancement of Technologies-Information Systems & Computer Networks (ISCON-2012), Proceedings published in Int J of Comput Appl (IJCA). Citeseer (2012)

    Google Scholar 

  17. Swathi, A., Jilani, S.A.K.: Video steganography by LSB substitution using different polynomial equations. Int. J. Comput. Eng. Res. 2(5), 1620–1623 (2012)

    Google Scholar 

  18. Yadav, P., Mishra, N., Sharma, S.: A secure video steganography with encryption based on LSB technique. In: 2013 IEEE International Conference on Computational Intelligence and Computing Research, pp. 1–5. IEEE (2013)

    Google Scholar 

  19. Zhang, M., Guo, Y.: Video steganography algorithm with motion search cost minimized. In: 2014 9Th IEEE Conference on Industrial Electronics and Applications, pp. 940–943. IEEE (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dario Allegra .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Catania, L., Allegra, D., Giudice, O., Stanco, F., Battiato, S. (2022). Introducing AV1 Codec-Level Video Steganography. In: Sclaroff, S., Distante, C., Leo, M., Farinella, G.M., Tombari, F. (eds) Image Analysis and Processing – ICIAP 2022. ICIAP 2022. Lecture Notes in Computer Science, vol 13231. Springer, Cham. https://doi.org/10.1007/978-3-031-06427-2_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-06427-2_24

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-06426-5

  • Online ISBN: 978-3-031-06427-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics