The proposed work addresses the imperative of safeguarding sensitive information through a dual-security approach of encryption and steganography. Employing the Advanced Encryption Standard (AES) for the first level, and bitmap graphics as video frames with steganography techniques in the second, it achieves heightened data protection and imperceptibility, validated through superior statistical quality assessments. It advocates combining AES encryption with Fisher-Yates-based randomization for heightened data security. The paper introduces automated processes for recovery, decryption, concealment, and encryption, utilizing XOR, 1 bit LSB, and spiral pixel selection to optimize payload capacity and quality metrics in films. The research suggests implementing the Advanced Encryption Standard (AES) algorithm for secure video steganography. The proposed method involves AES encryption, Fisher-Yates frame shuffle, Prewitt edge detection, and triple XOR embedding, enhancing data security and imperceptibility. The algorithm employs a dynamic frame selection technique and pixel filtering using Prewitt edge detection, contributing to a robust video steganography system. The embedding and retrieval processes ensure secure communication, demonstrating the methodology’s effectiveness in concealing and extracting information within video frames.
Cite this paper
Hossain, M. A. , Noor, N. U. , Ullah, A. , Noman, M. S. H. , Pranta, S. D. , Bristy, L. M. and Bashar, M. M. (2024). Enhancing Video Steganography Techniques Using Hybrid Algorithms. Open Access Library Journal, 11, e1489. doi: http://dx.doi.org/10.4236/oalib.1111489.
Karthikeyan, B., Raj, M.M.A., Yuvaraj, D. and Joseph Abraham Sundar, K. (2020) A Hybrid Approach for Video Steganography by Stretching the Secret Data. In: Ranganathan, G., Chen, J. and Rocha, á., Eds., Inventive Communication and Computational Technologies, Springer, 1081-1087. https://doi.org/10.1007/978-981-15-0146-3_104
Patil, A., Keshkamat, S.M., Desai, V.V. and Arlimatti, T. (2018) Embedding of Advanced Encryption Standards Encoded Data in Video Using Least Significant Bit Algorithm. 2018 International Conference on Re-cent Innovations in Electrical, Electronics & Communication Engineering (ICRIEECE), Bhu-baneswar, India, 27-28 July 2018, 617-621. https://doi.org/10.1109/icrieece44171.2018.9009202
Manohar, N. and Kumar, P.V. (2020). Data Encryption & Decryption Using Steganography. 2020 4th International Confer-ence on Intelligent Computing and Control Systems (ICICCS), Madurai, India, 13-15 May 2020, 697-702. https://doi.org/10.1109/iciccs48265.2020.9120935
Singh, N. (2019) XOR Encryption Techniques of Video Steganography: A Comparative Analysis. In: Abra-ham, A., Cherukuri, A.K., Melin, P. and Gandhi, N., Eds., Intelligent Systems Design and Ap-plications, Springer, 203-214. https://doi.org/10.1007/978-3-030-16657-1_19
Ajmera, A., Divecha, M., Ghosh, S.S., Raval, I. and Chaturvedi, R. (2019) Video Steganography: Us-ing Scrambling-AES Encryption and DCT, DST Steganography. 2019 IEEE Pune Section In-ternational Conference (PuneCon), Pune, India, 18-20 December 2019, 1-7. https://doi.org/10.1109/punecon46936.2019.9105666
Hashim, J., Hameed, A., Abbas, M.J., Awais, M., Qazi, H.A. and Abbas, S. (2018) LSB Modification Based Audio Ste-ganography Using Advanced Encryption Standard (AES-256) Technique. 2018 12th Interna-tional Conference on Mathematics, Actuarial Science, Computer Science and Statistics (MACS), Karachi, Pakistan, 24-25 November 2018, 1-6. https://doi.org/10.1109/macs.2018.8628458
Karthikeyan, B., Deepak, A., Subalakshmi, K.S., Anishin Raj, M.M. and Vaithiyanathan, V. (2017) A Combined Approach of Steganog-raphy with LSB Encoding Technique and DES Algorithm. 2017 Third International Confer-ence on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB), Chennai, India, 27-28 February 2017. https://doi.org/10.1109/aeeicb.2017.7972388
Qasim Ahmed Alyousuf, F., Din, R. and Qasim, A.J. (2020) Analysis Review on Spatial and Transform Domain Technique in Digital Steganography. Bulletin of Electrical Engineering and Informatics, 9, 573-581. https://doi.org/10.11591/eei.v9i2.2068
Alam, K., Nushrat, S., Patwary, A.H., Ullah, A. and Robin, K.H. (2023) An Improved Approach of Image Steganography Based on Least Significant Bit Technique for Secure Communication in Cloud. In: Woungang, I., Dhurandher, S.K., Pattanaik, K.K., Verma, A. and Verma, P., Eds., Advanced Network Technologies and Intelligent Computing, Springer, 215-233. https://doi.org/10.1007/978-3-031-28180-8_15
Hossain, M.A., Ullah, A., Khan, N.I. and Alam, M.F. (2019) Design and Development of a Novel Symmetric Algorithm for En-hancing Data Security in Cloud Computing. Journal of Information Security, 10, 199-236. https://doi.org/10.4236/jis.2019.104012