Skip to main content
Scientific Reports logoLink to Scientific Reports
. 2024 Aug 7;14:18301. doi: 10.1038/s41598-024-67074-x

Efficient three layer secured adaptive video steganography method using chaotic dynamic systems

D Kumar 1, V K Sudha 2, N Manikandan 3, Krishnaraj Ramaswamy 4,
PMCID: PMC11306235  PMID: 39112647

Abstract

In light of the unprecedented growth in internet usage, safeguarding data from unauthorized access has emerged as a paramount concern. Cryptography and steganography stand as pivotal methods for ensuring data security during transmission. This study introduces an innovative adaptive video steganography approach featuring three tiers of security for extracting concealed information, thereby facilitating secure communication. The embedding process operates within the spatial domain of cover video frames, enabling a remarkable hiding ratio of up to 28.125% (equivalent to 2.25 bits per pixel in payload) without compromising the quality of video frames. Users are afforded the flexibility to select between partial or full embedding capacity of CVF through the proposed adaptive control block (ACB). The chaotic key generator (CKG), which combines a logistic map and sine map, is employed to generate highly sensitive initial seeds for permutation order (PO), frame selection (FS), and random position for hiding (RPH), thereby ensuring three levels of security. Prior to transmission, both CVF and hidden data (SD) are encrypted using PO. Encrypted CVFs are then randomly selected using FS for embedding, with RPH employed during the embedding process. Subsequently, for transmitting the stego-video frame, embedded CVFs are decrypted using the same PO. Experimental results demonstrate the efficacy of the proposed approach, achieving an adaptive hiding ratio ranging from 7.1 to 28.125% (equivalent to 0.56 to 2.25 bits per pixel in payload) and maintaining a peak signal-to-noise ratio (PSNR) within the range of 50.25 to 62.05 dB.

Keywords: Adaptive video steganography, Chaotic key generator, Hiding ratio, Payload, PSNR

Subject terms: Engineering, Physics

Introduction

The significant growth of the internet has enabled users to transmit massive amounts of personal data over the network, particularly in the form of video. As a result, protecting data that is shared over the internet is critical1. Consequently, cryptographic techniques can be used to transfer data in a secured manner. It is a technique for representing data in an irrelevant and difficult-to-understand format1,2. Despite the fact that many cryptographic methods for encrypting and decrypting data have been developed, these methods are inefficient due to the rapid growth of the internet11,12. The irrelevant form of cipher text in cryptography will pique the intruder's interest. This issue can be elucidated using a technique known as steganography. Steganography is the technique of concealing secret data in order to prevent the disclosure of a hidden message13. The cover, along with the secret data, is referred to as stego data. The cover and secret data can take many forms, including text, audio, video, and image.

Three key measures of a steganography system effectiveness are PSNR, Payload, and Hiding Ratio14,15. The PSNR is used to compare the similarity of the cover frame and the stego frame16. The payload14 represents the number of bits allocated for embedding the secret data in the cover frame using the steganographic technique and the hiding ratio16 evaluates the space allocated for the secret data in the cover frame in terms of percentage. The primary goal of steganography is to avoid suspicion in the transmission of a hidden message. If there is any suspicion, the steganography algorithm is useless. The majority of researchers are drawn to image steganography12,13,15,17. It employs an image as the cover and allots more space for embedding the secret data. Video steganography is a more advanced version of image steganography that can allocate even more space than image steganography. Because of this benefit, video steganography has grown in popularity14,18.

Related works

In the Kacar et al.4 method, video frames are randomly selected using values from a 4D chaotic system to conceal secret data. This approach achieves a PSNR of 55 dB with a payload of 0.64 bpp, resulting in a hiding ratio of 8.08%. However, this method only offers single-layer security. Darani et al.5 developed an image steganography algorithm for embedding gray scale secret image into RGB color image, by employing single layer security through chaotic maps and genetic algorithm. The method achieves PSNR of 47.88Db for a payload of 0.2222bpp, corresponding to hiding ratio of 2.77%. Aparna and Madhumitha6 proposed combined image encryption and steganography algorithm based on least significant substitution (LSB) method to embed the secret data into the cover using multiple chaotic maps. The method achieves PSNR of 56.10 dB. Zakaria et al.7 proposed data hiding approach based on LSB substitution using a mapping bits’ strategy. The method achieves a PSNR of 42.15 dB for a payload of 3.24bpp, corresponding to hiding ratio of 40.5%.

Zhang and Chen18, proposed an H.264/AVC intra prediction Mode (IPM) video steganography algorithm based on (n, k) linear block code. The algorithm uses I4 video frame blocks to embed secret messages with a payload of 1.33bpp or a hiding ratio of 16.625%. Younus and Hussain13, proposed an image steganography algorithm that combines cryptography and steganography techniques. To increase the security and payload, the secret image is encrypted and compressed using the Vigenere cipher and Huffman coding. The method achieves a PSNR of 55.71 dB for a payload of 1.59bpp, corresponding to a hiding ratio of 19.875%. Narayanan et al.19, proposed a video steganography algorithm based on the least significant bit substitution (LSB) method, which uses a 3D chaotic map to select pixels in a video. To encode data to be transmitted into pixels, a 3–3–2 substitution method is used, which means that the LSB of all RGB color components is taken (3 bits of red, 3 bits of green and 2 bits of blue). Kar and Mandal16, proposed a DNA-based video steganography algorithm that uses the least significant bit substitution method. The method achieves PSNRs ranging from 46.21 to 52.24 dB for payloads ranging from 1.23 to 1.78 bpp or hiding ratios ranging from 15.375 to 22.25%. Based on a human vision region of interest and a face detection algorithm Balu et al.20, proposed a video steganography algorithm in medical imaging system. To increase security, the method embeds secret information in different levels based on human visual region of interest. It achieves a PSNR of 67.17 dB with a payload of 0.1 bpp for hiding ratio of 1.25%. Abed et al.21, proposed a two-level security-based video steganography method based on the LSB. A 1–1–0 LSB technique is used to hide secret data in video files, which means that they take the LSB of RG components (1bit of red and 1 bit of green). The method achieves a PSNR of 57.1 dB. Mstafa et al.22, proposed a video steganography algorithm based on multiple object tracking (MOT) and error correcting codes (ECC) in the transform domain, like DWT and DCT. The method achieves a PSNR of 49.01 dB for DWT and 48.67 dB for DCT with payloads of 0.27bpp and 0.28bpp, respectively and a hiding ratio of 3.4% for DWT and 3.46% for DCT. Mstafa and Elleithy23, proposed a wavelet-based video steganography algorithm based on the KLT tracking algorithm and BCH codes. The secret image is embedded in the LH, HL, and HH coefficients of all facial regions of video frames by this algorithm. The method achieves a PSNR of 41–50 dB for a payload of 0.35bpp or a hiding ratio of 4.4%. Kelash et al.24, used color histograms to directly embed data into video frames, where each pixel in each video frame is divided into two parts, and the number of bits that will be embedded in the right side part is counted in the left side part. The method achieves a PSNR of 48 dB for a payload of 0.09bpp or a hiding ratio of 0.6%. Alavianmehr et al.25, proposed a robust lossless video steganographic method based on histogram distribution constraints (HDC). The method embeds the secret data in the video frame's luminance (Y) component. It achieves a PSNR of 36.64 to 36.97 dB for a payload of 1 or a hiding ratio of 12.5%. Hu and Tak26, proposed a method for video steganography based on non-uniform rectangular partitioning. In this secret video stream, at least four significant bits of each frame of the cover video with nearly the same size are hidden. PSNR is in the 28.19—29.75 dB range. Ranjithkumar et al.14, proposed video steganography method based chaos. The method achieves PSNR of 49 dB for a payload of 2 or hiding ratio of 25%.

All of the similar methods discussed above use video as a cover. There is always tradeoff between PSNR and payload. Younus and Hussain13, achieved a PSNR of 55.71 dB for hiding ratio of 19.88%, which is less than Ranjithkumar et al.14, Kar et al.16, Hu and Tak26, Kacar et al.4, Darani et al.5, Zakaria et al.7.

Balu et al.20, achieved a PSNR of 67.12 dB for hiding ratio 1.25%, which is very less than Younus et al.13, Ranjithkumar et al.14, Kar et al.16, Mstafa et al.22, Alavianmehr et al.25, Hu et al.26 With hiding ratio of 22.25% Kar et al.16, achieved PSNR of 52.24 dB which is less than13,20. For payload of 12.5% Alavianmehr et al.25 achieves PSNR of 36.97 dB which is very less than Younus et al.13, Ranjithkumar et al.14, Kar et al.16, Balu et al.20 and Mstafa et al.22.

Mstafa et al.22, achieved PSNR of 49.01 dB for hiding ratio is 3.46%, which is less than Younus and Hussain13, Ranjithkumar et al.14, Kar et al.16, Balu et al.20, Alavianmehr et al.25 and Hu and Tak26 With hiding ratio of 50% Hu and Tak26, achieve a PSNR of 29.75 dB which is significantly lower than Younus et al.13, Ranjithkumar et al.14, Kar et al.16, Balu et al.20, Mstafa et al.22, and Alavianmehr et al.25, and so the stego degradation caused by embedding is noticeable. For a hiding ratio of 25% Ranjithkumar et al.14, achieve a PSNR of 49 dB which is less than Kar et al.16, Narayanan et al.19, Balu et al.20 and Mstafa et al.22. In all of these methods discussed above there is no adaptability with respect to the Secret data to be hidden. Choosing an optimal payload is critical in developing an efficient steganographic technique. A three level secured adaptive video steganography technique proposed in this paper resulted a PSNR of 50.2553 dB to 62.0528 dB with hiding ratio of 7.1 to 28.125% (or) payload of 0.56–2. 25 bpp.

The proposed system has the following advantages over the similar works:

  • It offers three levels of security when it comes to breaking the information carried secretly.

  • It has a combined chaotic system that maintains randomness across the entire range of control parameters.

  • The number of secret information bits embedded in each frame of the video cover can be controlled by the user.

The rest of the article is organized as follows. "Chaotic maps" Section describes the various types of chaotic maps that are employed in the scheme. The proposed approach is discussed in "Proposed method" Section, "Performance Analysis" Section provides an overview of performance analysis, while "Conclusion" Section concludes.

Chaotic maps

The logistic map, sine map, and tent map are the most well-known chaotic systems that researchers use to generate random sequence numbers. Maps are expressed mathematically as12,27

Xn+1=bXn(1-Xn)LogisticMap 1
Xn+1=bsin(πn)SineMap 2
Xn+1=bXnforXn<0.5b1-XnforXn0.5TentMap 3

Table 1 provides competent techniques that are utilizing chaotic dynamic systems for securing information. A single chaotic map13,16,19 is used to protect the secret data to be transmitted. AES20,21 and a hybrid of two 1D maps12,14 is used for encryption and. The proposed method employs a mixed chaotic system to both protect and hide the protected data at random locations. This improves the steganography's quality even further.

Table 1.

Chaotic maps and level of Security by similar works.

References Map Level of security for embedding
Younus et al.13, Vigenere Cipher ek(pi)=(pi+k(imodm))modl Two level security
Narayanan19, et al

3-D Logistic Map

xi+1=γ(1-xi)+β(yi2xi)+αzi3yi+1=γ(1-yi)+β(zi2xi)+αxi3zi+1=γ(1-zi)+β(xi2yi)+αyi3

Single level security
Kar16 , et al

Burger 2-D chaotic map

Xn+1=Xn2-Yn2+aXn+bYnYn+1=2XnYn-Yn2+cXn+dYn

Two level security
Balu20, et al Advanced Encryption Standard Two level security
Abed et al.,21 Advanced Encryption Standard Two level security
Ranjithkumar12 ,et al

Logistic Map and Tent map

Xn+1=bXn(1-Xn)Xn+1=μXnforXn<0.5μ1-XnforXn0.5

Three level security
Ranjithkumar14 , et al

Logistic Map Xn+1=bXn(1-Xn)

and Tent map

Xn+1=μXnforXn<0.5μ1-XnforXn0.5

Three level security
Proposed method CKG=mod4sinθ11-sinθ1+sinθ2,2 Three level security

Chaotic key generator

The one-dimensional chaotic maps like the logistic and sine map exhibit chaotic and non-chaotic behaviour based on the bifurcation parameter (b)32. In Fig. 1a, dark areas (b = 3.57 to 4) indicate chaotic behaviour, while solid areas (b = 0 to 3.57) represent non-chaotic behaviour. However, chaotic output is limited to a small range (0,4). Similar behaviour is observed in the sine map Fig. 1b. The proposed chaotic key generator combines logistic and sine maps, as shown in Fig. 1c. This fusion enables good chaotic behaviour across the entire bifurcation parameter range (0 < b < 1). This ensures sensitivity to initial conditions and randomness throughout the phase space (0 to 1) for secure key generation.

Figure 1.

Figure 1

Bifurcation diagram (a) logistic map (b) sine map (c) combined logistic-sine map.

Lyapunov exponent (LE)

The Lyapunov exponent (LE) is used to evaluate the behavior of any discrete time system11. The LE is expressed as

λ(x0)=nLim1ni=1lnf(x) 4

where x0 is the initial value of the map, f' (x) is the derivative of the first order differential equation, and n is the length of the sequence. According to Fig. 2a, b, the logistic map and sine map has chaotic behavior for control parameters ranging from 3.57 to 4 and 0.97 to 1. The proposed CKG- LE Fig. 2c has chaotic behavior over the entire range of control parameter (b). The coupled chaotic system is detailed below.

Figure 2.

Figure 2

Lyapunov exponent of (a) logistic map (b) sine map (c) Combined logistic-sine map.

Figure 3 depicts proposed chaotic key generator (CKG). From the Fig. 3,

IP1=bL2bs1sin(πns1-bs1sin2(πns1)] 5
IP2=XnS2+1=bs2sin(bL1XnL1(1-XnL1)) 6
IP3=bitXor5+6 7

Figure 3.

Figure 3

Proposed chaotic key generator (CKG).

Substituting bL2\;4\;,\;bs11, bs21

IP3=bitXor4\;sinπns1-4sin2πns1+\;sinπnL1

IP3 always lies between (0,1)

πnS1\;\;θ1,\;πnS2\;\;θ2
CKG=mod(4sinθ11-sinθ1+sinθ2,2 8

The key generator block (KGB) generates internal keys32 from external keys provided by authorized users32. These internal keys are utilized as kernels for frame selection (FS), permutation order (PO), and random position hiding (RPH). The KGB enhances sensitivity to the extent that a single bit change in any external key causes a significant alteration in the internal keys. This increased sensitivity is achieved through the use of chaotic maps.

Proposed method

Figure 4 depicts a diagram of the proposed adaptive video steganography algorithm. Table 2 shows the pseudocode that explains the proposed algorithm. In pseudocode, the prefix ‘##' is used to denote each block of Fig. 4. The process of each block is explained below.

Figure 4.

Figure 4

Block diagram proposed adaptive video steganography method.

Table 2.

Pseudocode for the proposed video steganography method.

graphic file with name 41598_2024_67074_Tab2a_HTML.jpg

graphic file with name 41598_2024_67074_Tab2b_HTML.jpg

Algorithm

Step 1 Get input cover video (CVF) and secret data (SD) in input block (## input block). Compute the dimensions (size_CVF, size_SD, FN) of them and verify the possibility of embedding using ACB block.

Step 2 ACB block throws the possibility of embedding (pos) and number of bits to be embedded (bits_per_frame) into each frame (bits_per_frame). (refer ## ACB block).

Step 3 If pos from ACB is True: Generate the keys (chaos_seed) from user input(ext_key) and compute the parameters (PO1, PO2, FS and RPH) using key generation block (##key_generation). These are required to encrypt SD and CVF. if pos from ACB is False: jump to Step 7.

Step 4 Encrypt the CVF using PO2 and SD using PO1 at Encryption block(##Encryption). store the results in CVFE and SDE. Permutation is carried out in encryption.

Step 5 Convert SDE into binary SDEb and slice it based on the bits_per_frame variable. The sliced SDeb, CVFE, bits_per_frame and RPH are then transferred to embedding.

Step 6 All embedded frames (CVFEm) obtained in step 5 are permuted ones. Apply reverse permutation to all using decryption block (##Decryption). The output of the block is CVFS. Combine all CVFS to get Stego video frame (Stego_video).

Step 7 exit ().

Performance analysis

The effectiveness of the proposed adaptive video steganographic method is evaluated by three key measures namely Imperceptibility, hiding ratio (HR) and payload(P)4,5,25. The proposed method has been tested on several video sequences downloaded from19 using Phycharm IDE with python 3.7, windows 10, intel(R) Core ™ i3 processor @ 2.4 GHz, with 4 GB RAM and secret data to be embedded in the cover video frame has been downloaded from USC-SPIC image database29 and ITU-T test signal for telecommunications systems30. The performance analyses are as follows.

Imperceptibility

Peak signal-to-noise ratio (PSNR)4,5,16 is used to assess the imperceptibility of the proposed method. The PSNR is calculated using Eq. (10) and measured in decibels4,5,16.

PSNR=10log10(2L)2MSE(CVF,CVFS) 10

where L is the image's depth and MSE is the mean square error, which is calculated as

MSE=1MxNi=0M-1j=0N-1(CVF,CVFS)2 11

The ideal PSNR value is greater than 30 dB22,31. The stego degradation caused by embedding is noticeable if the PSNR value is less than 30 dB22,31. Figures 5 and 6 show the original video frames as well as the stego video frames. From Figs. 5 and 6, the difference between the stego video. frame and the original video frame is indistinguishable.

Figure 5.

Figure 5

Original video frames of mobile calendar (Frame Number: 75,152 and 251).

Figure 6.

Figure 6

Stego video frames of mobile calendar (Frame Number: 75,152 and 251).

PSNR values of different video sequences are embedded with 25%, 50%, 75% and 100% embedding capacity of CVF using images and audio waves as secret data is shown in Table 3. The results show that the proposed method PSNR value is 50 to 62 dB, which is greater than the ideal value of 30 dB22,31, implying that the stego video is similar to the original cover video and has greater security than other methods.

Table 3.

PSNR of partial (or) full embedding capacity of cover frame with secret data as images and audio waves.

S. no Video file name Embedding capacity Images Audio waves
Lena Peppers Mandrill Splash Female1. wav Female2. wav Male1. wav Male2. wav
PSNR PSNR PSNR PSNR PSNR PSNR PSNR PSNR
1 Bus 100 50.2739 50.2745 50.2736 50.2776 50.0068 50.0909 50.1228 49.9860
75 52.0396 52.0398 52.0360 52.0412 51.8750 51.9436 51.9679 51.8642
50 55.0543 55.0414 55.0535 55.0478 54.8988 54.9418 54.9751 54.8931
25 62.0424 62.0634 62.0431 62.0456 59.0239 59.0316 59.0197 58.9889
2 Carphone 100 50.2826 50.2828 50.2834 50.2833 50.0360 50.1202 50.1386 50.0034
75 52.0453 52.0466 52.0424 52.0476 51.8825 51.9528 51.9799 51.8410
50 55.0527 55.0529 55.0565 55.0552 54.9328 54.9696 54.9776 54.9243
25 62.0445 62.0496 62.0472 62.0439 58.9847 58.9619 58.9612 58.9336
3 City 100 50.2802 50.2849 50.2789 50.2820 50.0514 50.1032 50.1238 50.0082
75 52.0394 52.0411 52.0445 52.0416 51.9019 51.9687 51.9731 51.8694
50 55.0536 55.0521 55.0594 55.0558 55.0101 55.0386 55.0580 54.9887
25 62.0528 62.0422 62.0442 62.0426 58.9820 59.0036 58.9834 58.9834
4 Container 100 50.2553 50.2560 50.2574 50.2553 49.8265 49.9290 49.9521 49.8136
75 52.0234 52.0239 52.0272 52.0286 51.6884 51.7804 51.8102 51.6770
50 55.0412 55.0426 55.0449 55.0413 54.7796 54.8381 54.8459 54.7473
25 62.0418 62.0481 62.0400 62.0468 58.8277 58.8324 58.8546 58.7731
5 Foreman 100 50.2737 50.2718 50.2694 50.2553 49.9160 50.0015 50.0415 49.8965
75 52.0374 52.0375 52.0354 52.0286 51.7313 51.8099 51.8627 51.7272
50 55.0448 55.0474 55.0448 55.0413 54.8427 54.8814 54.8893 54.8301
25 62.0440 62.0410 62.0520 62.0436 58.9254 58.9536 58.9764 58.9035
6 Husky 100 50.2777 50.2786 50.2782 50.2790 50.0156 50.1004 50.1591 49.9999
75 52.0425 52.0400 52.0392 52.0393 51.8479 51.9218 51.9628 51.8375
50 55.0555 55.0520 55.0501 55.0563 54.9015 54.9473 54.9608 54.8871
25 62.0445 62.0433 62.0370 62.0364 58.9467 58.9432 59.0036 58.9425
7 Miss 100 50.2704 50.2750 50.2768 50.2715 49.9605 50.0128 50.0364 49.9361
75 52.0348 52.0389 52.0385 52.0382 51.7910 51.8384 51.8707 51.7815
50 55.0489 55.0567 55.0540 55.0524 54.8558 54.8768 54.9172 54.8432
25 62.0294 62.0441 62.0438 62.0379 58.8526 58.8844 58.8688 58.8405
8 Mobile calendar 100 50.2781 50.2775 50.2761 50.2778 50.0455 50.1190 50.1491 50.0581
75 52.0379 52.0406 52.0409 52.0394 51.8946 51.9302 51.9535 51.9011
50 55.0532 55.0533 55.0532 55.0550 54.9915 54.9920 54.9818 54.9680
25 62.0449 62.0437 62.0350 62.0441 58.9785 59.0057 58.9799 58.9980
9 News 100 50.2807 50.2808 50.2812 50.2802 49.9776 50.0335 50.0849 49.9442
75 52.0461 52.0487 52.0469 52.0450 51.8173 51.8931 51.9113 51.8127
50 55.0554 55.0560 55.0537 55.0543 54.8462 54.8752 54.8609 54.8453
25 62.0443 62.0436 62.0457 62.0448 58.9151 58.9212 58.8688 58.8824
10 Soccer 100 50.2820 50.2827 50.2823 50.2813 50.0612 50.1421 50.1745 50.0449
75 52.0444 52.0438 52.0470 52.0447 51.9303 51.9657 51.9729 51.9196
50 55.0500 55.0524 55.0491 55.0517 54.9619 54.9967 54.9965 54.9512
25 62.0526 62.0441 62.0507 62.0522 58.9481 58.9584 58.9924 58.9674
Min–Max 50.255- 62.0528 50.2808- 62.0496 50.2574- 62.052 50.280- 62.0522 49.8265- 59.0239 50.0015- 59.0057 49.9521- 59.0197 49.8136- 58.9980

Table 4 shows comparison of PSNR for various embedding capacities using image and audio as secret data. PSNR below 30 dB suggests that the embedded data has caused perceptible changes in the video, potentially compromising the secrecy of the hidden information and reducing the overall effectiveness of the steganography method. Therefore, maintaining a PSNR above 30 dB is crucial for ensuring both effective data concealment and visual integrity in steganographic applications.

Table 4.

Comparison of PSNR for various embedding capacity using image and Audio as secret data.

Embedding capacity PSNR (dB)
Video Audio
25% 62.05 59
50% 55.06 54.74
75% 52.05 51.67
100% 50.25 49.81

Hiding ratio(HR)

The hiding ratio is a measurement of the percentage of space in the cover frame that can be used to embed secret data4,5,20. The following equation is used to calculate the hiding ratio.

HR=SizeofsecretdataSizeofcovervideoX100 12

The proposed method embeds the secret data using LSB, 1st ISB, and 25% of the 2nd ISB of the cover frame. As a result, the hiding ratio ranges from 7.1 to 28.125%. Table 5 compares the proposed method to other methods, and Fig. 7 show comparison in graphical format of HR, Payload and PSNR. Table 5 shows that the proposed method outperforms other methods in terms of PSNR, HR, and payload.

Table 5.

Comparison of proposed method with similar methods.

Method Payload (bpp) Hiding ratio (%) PSNR (dB)
Kacar et al.4 0.6 8.08 55
Darani et al.5 0.22 2.77 47.8
Zakaria et al.7 3.24 40.5 42.15
Setiadi8 1.25 15.62 44
Abd-El-Atty10 2 25 44.1
Taha et al.9 1.125 14.06 55.47
Ranjithkumar et al.5 2 25 49
Younus et al4 1.59 55.71
Balu et al11 0.1 67.12
Kar et al7 1.78 52.24
Mstafa et al13 3.46 49.01
Alavianmehr et al16 1.34 36.97
Hu et al17 4 29.75
Proposed method 2.25 28.12 50.25 dB to 62.05 dB

Figure 7.

Figure 7

Hiding Ratio, Payload and PSNR Comparison.

Payload

The payload represents the maximum number of bits allocated for embedding the secret data within the cover frame, which is calculated in terms of bits per pixel using the following equation (bpp)5,14.

P=SMXN 13

where S denotes the number of secret bits to be embedded in the cover frame. M and N are the cover frames’ height and width. To embed the secret data, the proposed method uses 28.125 percent of the cover data. As a result, the proposed method's payload is

P=HidingRatio100X8 14
P=28.125100X8=2.25bpp 15

The adaptive control block (ACB) allows users to choose between partial and full embedding capacities in the cover video frames based on the amount of secret data to be embedded. Specifically, the proposed method uses 28.125% of the cover data, resulting in a payload of 2.25 bits per pixel (bpp). If the number of bits required to embed the secret data is less than the payload, the ACB enables the user to select partial embedding capacity. If the number of bits exceeds the payload, the full embedding capacity is selected. Table 5 compares the proposed method to other methods in terms of payload. The proposed method's payload is observed to be greater than that of other methods.

Randomness test with SP800-22 test suite

The NIST test is one of the most important authorized standards for determining the randomness of image obtained using the suggested algorithm32. To demonstrate the randomness of the binary sequence generated by the proposed approach, we employ 16 statistical tests from the NIST test suite. The evaluation is based on the binary sequence's P-values in each test. If the P-values for each test are ≥ 0.01, it means the created binary sequence is random and evenly distributed. If the P-values are less than 0.01, the generated sequence is not random and has an uneven distribution. To confirm the uniform distribution of P-values, we evaluate the distribution for a large number of binary sequences (N = 100) for each test. The computation is as follows:

χ2=i=110Fi-N/10N/10 16

where Fi is the number of occurrences the P-value in the ith interval and N denotes the sample size (N = 100). The P-value of P values are calculated by using the following formula

Pvalue=igamc92,χ22 17

where ‘igamc’ is the incomplete Gamma function. The results of each statistical test are shown in Table 6. The results show that the embedded image has passed all tests and distribution is uniform. NIST test results prove that the embedded image is random.

Table 6.

NIST Statistical test results for encrypted image using proposed method.

Statistical test Diffusion
P-value Result
Frequency 0.1831 Pass
Block frequency 0.4380 Pass
Runs 0.7519 Pass
Statistical test 0.4803 Pass
Long runs of one’s 1.0000 Pass
Binary matrix RANK 0.7522 Pass
DFT 1.0000 Pass
Non overlapping Templates 0.5598 Pass
Overlapping templates 0.9990 Pass
Universal 0.9985 Pass
Serial P value 1 0.7550 Pass
P value 2 0.3683 Pass
Approximate entropy 0.2049 Pass
Cumulative sums 0.6383 Pass
Random excursion 0.1301 Pass
Random excursion variant 0.6394 Pass
Final result Pass

Conclusion

This paper proposes a three-layer secured adaptive video steganography based on chaotic systems. The transmitted information is hidden within the video frames' (CVF) in the spatial domain. The method allows the user to select either partial embedding capacity of the CVF or full embedding capacity of the CVF. Secret information to be transmitted is encrypted and hidden at random positions within encrypted CVF. Permutation of video frames (CVF) and secret information by PO offers the first layer of security, selection of CVFs through FS for embedding provides second layer of security and third layer of security is provided by the RPH, the positions for hiding information bits randomly. CKG is responsible for generating PO, FS and RPH. CKG structure consists of one-dimensional logistic and Sine maps, which are aligned in such a way that they increase the sensitivity of key production, enhance the randomness and thus improve the quality of the embedding procedure. The method's competence is demonstrated through evaluation methodologies such as PSNR, HR, and payload. It provides a maximum payload of 2.25 bpp, hiding ratio of 7.1% to 28.125% and PSNR of 50.25 to 62.05 dB. The evaluation results and comparisons with the similar methods show that the method proposed is better than other methods. Our future work is to generate unbreakable key structure using machine learning and implement for video steganography.

Author contributions

Conceptualization, K.D, S.V.K, N.M, and K.R.; Data curation, K.D, S.V.K, N.M, and K.R; Analysis and validation, K.D, S.V.K, N.M, and K.R; Formal analysis, K.D., S.V.K, N.M, and K.R.; Investigation methodology, K.D, S.V.K, N.M, and K.R.; Project administration, K.R.; Software, K.D, S.V.K, N.M, and K.R., Supervision, K.R.; Validation, K.D, S.V.K, N.M, and K.R.; Visualization, K.D, S.V.K, N.M, and K.R.; Writing—original draft, K.D, S.V.K, N.M, and K.R., data visualization, editing and rewriting, K.D, S.V.K, N.M, and K.R.

Data availability

The datasets used and analyzed during the current study are available from the corresponding author on request.

Competing interests

The authors declare no competing interests.

Footnotes

Publisher's note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

References:

  • 1.Khan, A. & Sarfaraz, A. Vetting the security of mobile applications. Sci. Int.29(2), 361–365 (2017). [Google Scholar]
  • 2.Khan, A. Comparative analysis of watermarking techniques. Sci. Int.27(6), 6091–6096 (2015). [Google Scholar]
  • 3.Stallings, W. Cryptography and network security: principles and practice 3rd edn. (PHI, Delhi, 2006). [Google Scholar]
  • 4.Kacar, S. et al. 4D chaotic system-based secure data hiding method to improve robustness and embedding capacity of videos. J. Inf. Secur. Appl.71, 103369. 10.1016/j.jisa.2022.103369 (2022). 10.1016/j.jisa.2022.103369 [DOI] [Google Scholar]
  • 5.Darani, A. Y. et al. Optimal location using genetic algorithms for chaotic image steganography technique based on discrete framelet transform. Digit. Signal Process.144, 104228. ISSN 1051-2004. 10.1016/j.dsp.2023.104228 (2024). 10.1016/j.dsp.2023.104228 [DOI] [Google Scholar]
  • 6.Aparna, H. & Madhumitha, J. Combined image encryption and steganography technique for enhanced security using multiple chaotic maps. Comput. Electric. Eng.110, 108824. ISSN:0045-7906. 10.1016/j.compeleceng.2023.108824 (2023). 10.1016/j.compeleceng.2023.108824 [DOI] [Google Scholar]
  • 7.Zakaria, A. A. et al. High-capacity image steganography with minimum modified bits based on data mapping and LSB substitution. Appl. Sci.8, 2199. 10.3390/app8112199 (2018). 10.3390/app8112199 [DOI] [Google Scholar]
  • 8.Setiadi, D. R. I. M. Improved payload capacity in LSB image steganography uses dilated hybrid edge detection. J. King Saud Univ. Comput. Inf. Sci.34(2), 104–114. 10.1016/j.jksuci.2019.12.007 (2022). 10.1016/j.jksuci.2019.12.007 [DOI] [Google Scholar]
  • 9.Taha, M. S. et al. High payload image steganography scheme with minimum distortion based on distinction grade value method. Multimed. Tools Appl.81, 25913–25946. 10.1007/s11042-022-12691-9 (2022). 10.1007/s11042-022-12691-9 [DOI] [Google Scholar]
  • 10.Abd-El-Atty, B. A robust medical image steganography approach based on particle swarm optimization algorithm and quantum walks. Neural Comput. Appl.35, 773–785. 10.1007/s00521-022-07830-0 (2023). 10.1007/s00521-022-07830-0 [DOI] [Google Scholar]
  • 11.Hua, Z., Zhou, B. & Zhou, Y. Sine-transform-based chaotic system with FPGA implementation. IEEE Trans. Ind. Electron.65(3), 2557–2566. 10.1109/TIE.2017.2736515 (2018). 10.1109/TIE.2017.2736515 [DOI] [Google Scholar]
  • 12.Ranjith Kumar, R., Jayasudha, S. & Pradeep, S. Efficient and secure data hiding in encrypted images: a new approach using chaos. Inf. Secur. J.25(4–6), 235–246. 10.1080/19393555.2016.1248582 (2016). 10.1080/19393555.2016.1248582 [DOI] [Google Scholar]
  • 13.Younus, Z. S. & Hussain, M. K. Image steganography using exploiting modification direction for compressed encrypted data. J. King Saud Univ.-Comput. Inf. Sci.34(6), 2951–2963. 10.1016/j.jksuci.2019.04.008 (2022). 10.1016/j.jksuci.2019.04.008 [DOI] [Google Scholar]
  • 14.Ranjithkumar, R., Ganeshkumar, D. & Senthamilarasu, S. Efficient and secure data hiding in video sequence with three-layer security: an approach using chaos. Multimed. Tools Appl.80(9), 13865–13878. 10.1007/s11042-020-10324-7 (2021). 10.1007/s11042-020-10324-7 [DOI] [Google Scholar]
  • 15.Tao, H., Chongmin, L., Jasni, M. Z. & Abdalla, A. N. Robust image watermarking theories and techniques: a review. J. Appl. Res. Technol.12(1), 122–138. 10.1016/S1665-6423(14)71612-8 (2014). 10.1016/S1665-6423(14)71612-8 [DOI] [Google Scholar]
  • 16.Kar, N., Mandal, K. & Bhattacharya, B. Improved chaos-based video steganography using DNA alphabets. ICT Express4(1), 6–13. 10.1016/j.icte.2018.01.003 (2018). 10.1016/j.icte.2018.01.003 [DOI] [Google Scholar]
  • 17.Abdulla, A. A., Sellahewa, H. & Jassim, S. A. Improving embedding efficiency for digital steganography by exploiting similarities between secret and cover images. Multimed. Tools Appl.78(13), 17799–17823. 10.1007/s11042-019-7166-7 (2019). 10.1007/s11042-019-7166-7 [DOI] [Google Scholar]
  • 18.Zhang, L. & Chen, D. The large capacity embedding algorithm for H.264/AVC intra prediction mode video steganography based on linear block code over Z4. Multimed. Tools Appl.79(17–18), 12659–12677. 10.1007/s11042-019-08528-7 (2020). 10.1007/s11042-019-08528-7 [DOI] [Google Scholar]
  • 19.Narayanan, G., Narayanan, R., Haneef, N., Chittaragi, N. B. & Kodagudi, S. G. A novel approach to video steganography using 3D chaotic map. In TENCON 2019 IEEE Region 10 Conference (TENCON) 955–959. 10.1109/TENCON.2019.8929347
  • 20.Balu, S., Babu, C. N. K. & Amudha, K. Secure and efficient data transmission by video steganography in medical imaging system. Clust. Comput.22(2), 4057–4063. 10.1007/s10586-018-2639-4 (2019). 10.1007/s10586-018-2639-4 [DOI] [Google Scholar]
  • 21.Abed, S. et al. An automated security approach of video steganography-based on LSB using FPGA implementation. J. Circuits Syst. Comput.28(05), 1950083. 10.1142/S021812661950083X (2018). 10.1142/S021812661950083X [DOI] [Google Scholar]
  • 22.Mstafa, R. J., Elleithy, K. M. & Abdelfattah, E. A robust and secure video steganography method in DWT-DCT domains based on multiple object tracking and ECC. IEEE Access5, 5354–5365. 10.1109/ACCESS.2017.2691581 (2017). 10.1109/ACCESS.2017.2691581 [DOI] [Google Scholar]
  • 23.Mstafa, R. J. & Elleithy, K. M. A novel video steganography algorithm in the wavelet domain based on the KLT tracking algorithm and BCH codes. In 2015 long island systems, applications and technology, 1–7. 10.1109/LISAT.2015.7160192.
  • 24.Kelash, H.M., Abdel Wahab, O.F., Elshakankiry, O.A. & El-sayed, H.S. Hiding data in video sequences using steganography algorithms. In 2013 International Conference on ICT Convergence (ICTC) 353–358. 10.1109/ICTC.2013.6675372 (2013).
  • 25.Alavianmehr, A., Rezaei, M., Helfroush, M. S. & Tashk, A. A lossless data hiding scheme on video raw data robust against H.264/AVC compression. In 2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE) 194–198. 10.1109/ICCKE.2012.6395377 (2012).
  • 26.Hu, S.D. & Tak, K.U. A novel video steganography based on non-uniform rectangular partition. In 2011 14th IEEE International Conference on Computational Science and Engineering. 57–61. 10.1109/CSE.2011.24 (2011).
  • 27.Kumar Patro, K. A. & Acharya, B. An efficient color image encryption scheme based on 1-D chaotic maps. J. Inf. Secur. Appl.46, 23–41. 10.1016/j.jisa.2019.02.006 (2019). 10.1016/j.jisa.2019.02.006 [DOI] [Google Scholar]
  • 28.Video Dataset: https: //media.xiph.Org/video/derf/y4m.
  • 29.“The USC-SIPI Image Database,” http://sipi.usc.edu/database Accessed 12 Jun 2017.
  • 30.Speech dataset: https://www.itu.int/net/itu-t/sigdb/genaudio/AudioForm-g.aspx?val=10000501
  • 31.Chang, C., Kieu, T.D., & Chou, Y., A high payload steganographic scheme based on (7, 4) hamming code for digital images. In 2008 International symposium on electronic commerce and security. 1pp. 6–21, 10.1109/ISECS.2008.222 (2008)
  • 32.Kumar, D., Sudha, V. K. & Ranjithkumar, R. A one-round medical image encryption algorithm based on a combined chaotic key generator. Med. Biol. Eng. Comput.61, 205–227. 10.1007/s11517-022-02703-z (2023). 10.1007/s11517-022-02703-z [DOI] [PubMed] [Google Scholar]
  • 33.Kumar, D. & Sudha, V. K. A Hybrid Image Steganography Method Based on Spectral and Spatial Domain with High Hiding Ratio. In: Abraham, A., Pllana, S., Casalino, G., Ma, K. & Bajaj, A. (eds) Intelligent systems design and applications. ISDA 2022. Lecture Notes in Networks and Systems, vol. 715. Springer, Cham. 10.1007/978-3-031-35507-3_7(2023).
  • 34.Gopalakrishnan, T. & Ramakrishnan, S. Image encryption using hyper-chaotic map for permutation and diffusion by multiple hyper-chaotic maps. Wirel. Pers Commun.109, 437–454. 10.1007/s11277-019-06573-x (2019). 10.1007/s11277-019-06573-x [DOI] [Google Scholar]

Associated Data

This section collects any data citations, data availability statements, or supplementary materials included in this article.

Data Availability Statement

The datasets used and analyzed during the current study are available from the corresponding author on request.


Articles from Scientific Reports are provided here courtesy of Nature Publishing Group

RESOURCES