Robust video data security using hybrid cryptography-steganography technique

Faten H.Mohammed Sediq Al-Kadei


The interest in the digital videos confidentiality in the current electronic and interrelated world has increased. Thus, this paper aimed at making a video steganography scheme for an acceptable security with high speed of calculation by embedding data (video frames) in other video frames. The techniques of embedding and encrypting video frames in a cover video file were done through two ways. Firstly, two keys and XOR bit operation were employed to create a large range of different keys for encryption. Secondly, a modified method of Least Significant Bit (LSB) technique was used for hiding high resolution video frames (bitmap color) in selective cover video frames, offering two security layers. The procedures of encrypting and hiding video data were successfully tested on many secret videos such ad Eye Video, Secret Medicine Video and Traffic Video. All experiments were conducted using MATLAB-GUI software, representing an efficient and easy tool for video management supported by powerful testing tools as histograms and mathematics for video quality. Experimental result demonstrated a good performance with low correlation and very high PSNR of the Stego video frames.

Full Text:



S. S. Ghazoul, Y. H. Ali, A. T. J. E. Hashim, and T. Journal, "Developed method of information hiding in video AVI file based on hybrid encryption and steganography," vol. 29, no. 2, pp. 359-373, 2011.

S. P. Sahu and S. Verma, "Secured and authentic communication by combined approach of digital watermarking and steganography," in International Conference on Advances in Communication, Network, and Computing, 2011, pp. 595-599: Springer.

G. P. Rajkumar, V. J. I. J. o. C. N. Malemath, and I. Security, "Video Steganography: Secure Data Hiding Technique," vol. 9, no. 9, 2017.

M. E. Saleh, A. A. Aly, and F. A. Omara, "Data security using cryptography and steganography techniques," ed: IJACSA) International Journal of Advanced Computer Science and Applications, 2016.

O. H. Yahya, H. Alrikabi, I. A. J. I. J. o. O. Aljazaery, and B. Engineering, "Reducing the Data Rate in Internet of Things Applications by Using Wireless Sensor Network," vol. 16, no. 03, pp. 107-116, 2020.

M. K. I. Rahmani, K. Arora, N. J. I. J. o. A. C. S. Pal, and Application, "A crypto-steganography: A survey," vol. 5, pp. 149-154, 2014.

A. A. J. Altaay, S. B. Sahib, and M. Zamani, "An introduction to image steganography techniques," in 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT), 2012, pp. 122-126: IEEE.

F. H. M. J. I. J. o. E. E. Al-Kadei and C. Science, "Two-level hiding an encrypted image," vol. 18, no. 2, pp. 961-969, 2020.

D. Socek, H. Kalva, S. S. Magliveras, O. Marques, D. Culibrk, and B. J. M. S. Furht, "New approaches to encryption and steganography for digital videos," vol. 13, no. 3, pp. 191-204, 2007.

M. A. a. Roa'a, I. A. Aljazaery, S. K. Al_Dulaimi, H. T. S. J. B. o. E. E. Alrikabi, and Informatics, "Generation of High Dynamic Range for Enhancing the Panorama Environment," vol. 10, no. 1, 2020.

K. N. Jassim et al., "Hybrid cryptography and steganography method to embed encrypted text message within image," in Journal of Physics: Conference Series, 2019, vol. 1339, no. 1, p. 012061: IOP Publishing.

H. T. S. Al-Rikabi, Enhancement of the MIMO-OFDM Technologies. California State University, Fullerton, 2013.

I. A. Aljazaery, H. T. S. Alrikabi, and M. R. J. i. Aziz, "Combination of Hiding and Encryption for Data Security," vol. 14, no. 9, p. 35, 2020.

A. H. M. Alaidi and A. Mahmood, "Distributed hybrid method to solve multiple traveling salesman problems," in 2018 International Conference on Advance of Sustainable Engineering and its Application (ICASEA), 2018, pp. 74-78: IEEE.

S. R. Ratna, J. S. Loret, D. M. Gethsy, P. P. Krishnan, and P. A. Prabu, "A Review on Various Approaches in Video Steganography," in Intelligent Communication Technologies and Virtual Mobile Networks, 2019, pp. 626-632: Springer.

N. S. Alseelawi, E. K. Adnan, H. T. Hazim, H. Alrikabi, and K. Nasser, "Design and Implementation of an E-learning Platform Using N-Tier Architecture," 2020.

E. Najafi, K. J. J. o. i. s. Loukhaoukha, and applications, "Hybrid secure and robust image watermarking scheme based on SVD and sharp frequency localized contourlet transform," vol. 44, pp. 144-156, 2019.

M. J. W. A. o. S. Ramalingam, Engineering and Technology, "Stego machine–video steganography using modified LSB algorithm," vol. 74, pp. 502-505, 2011.

O. H. Yahya, H. T. ALRikabi, R. a. M. Al_airaji, and M. J. I. J. o. I. M. T. Faezipour, "Using Internet of Things Application for Disposing of Solid Waste," vol. 14, no. 13, 2020.

N. A. Minas, F. H. MohammedSediq, and A. I. J. k. u. j. f. s. s. Salih, "Color Image Encryption Using Hybrid Method of Fractal-Based Key and Private XOR Key," vol. 13, no. 1, pp. 104-117, 2018.

N. A. Hussiena, A. H. M. Alaidib, T. A. Alquraishc, and G. F. Smaisim, "Improvement the Route Discovery Mechanism of Dynamic Source Routing Protocol in MANET."

N. Sharma, J. Bhatia, and D. N. J. P. Gupta, Chandigarh, "An encrypto-stego technique based secure data transmission system," 2005.

N. K. Jain, R. Saini, and P. Mittal, "A Review on Traffic Monitoring System Techniques," in Soft Computing: Theories and Applications: Springer, 2019, pp. 569-577.

S. Arunkumar, V. Subramaniyaswamy, R. J. E. E. T. o. P. H. Logesh, and Technology, "Hybrid Robust Image Steganography approach for the secure transmission of biomedical images in Cloud," vol. 5, no. 18, 2019.

O. Salman, I. H. Elhajj, A. Kayssi, and A. J. A. o. T. Chehab, "A review on machine learning–based approaches for Internet traffic classification," pp. 1-38, 2020.

A. Arya, S. J. I. J. o. F. R. i. C. S. Soni, and C. Engineering, "A literature review on various recent steganography techniques," vol. 4, no. 1, pp. 143-149, 2018.

S. Pal, S. K. J. I. J. o. I. R. Bandyopadhyay, and Review, "Various Methods of Video Steganography," vol. 3, no. 6, pp. 2569-2573, 2016.

S. J. Indrabi, N. Saini, M. J. I. J. o. P. Mohan, and A. Mathematics, "Secure data transmission based on combined effect of cryptography and steganography using visible light spectrum," vol. 118, no. 20, pp. 2851-2860, 2018.

I. Al-Barazanchi, S. A. Shawkat, M. H. Hameed, and K. S. L. Al-Badri, “Modified RSA-based algorithm: A double secure approach,” Telkomnika (Telecommunication Comput. Electron. Control., vol. 17, no. 6, pp. 2818–2825, 2019.

N. J. Qasim and I. Barazanchi, “Unconstrained Joint Face Detection and Recognition in Video Surveillance System,” Jour Adv Res. Dyn. Control Syst., vol. 11, no. 1, pp. 1855–1862, 2019.

H. K. Silman and A. E. Ali, “Breast cancer identification based on artificial intelligent system”, Sustainable Engineering and Innovation, vol. 2, no. 2, pp. 41-49, 2020.



  • There are currently no refbacks.

Copyright (c) 2020 Faten H.Mohammed Sediq Al-Kadei

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

ISSN: 2303-4521

Digital Object Identifier DOI: 10.21533/pen

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License