Video steganography is a robust method for concealing confidential information within video files, ensuring data privacy, and safeguarding against unauthorized access. This study presents a secure video steganography technique incorporating the ChaCha20 encryption algorithm to bolster data security before embedding. ChaCha20, recognized for its agility and resilience to cryptographic threats, encrypts the hidden data before it is inserted into chosen video frames using the Least Significant Bit (LSB) method. This ensures minimal misrepresentation and preserves the perceptual quality of the video while providing a strong layer of security. In this proposed system, once input files are selected, the ChaCha20 algorithm automatically generates a key file. This key file is then used to retrieve the concealed information, ensuring a smooth and secure decryption process. The concealed data is extracted and decrypted accurately at the receiver\'s end. Experimental results demonstrate that the proposed method achieves high noiselessness, low computational overhead, and vigorous security, making it a reliable solution for secure video-based communication.
Introduction
In the digital era, protecting private information online is critical due to rising cyber threats. Traditional encryption alone is insufficient; thus, video steganography—a method of hiding data within video files—is employed for enhanced security by concealing both the message and its existence. Among steganography types, video steganography is preferred due to its high data capacity and robustness.
Conventional techniques like Least Significant Bit (LSB) substitution are simple but vulnerable to detection and compression. More advanced methods use transform domain techniques (DCT, DWT) or AI, offering better security but often with higher computational costs. Encryption combined with steganography improves security, but common algorithms like AES can be slow and resource-heavy.
The proposed system integrates the ChaCha20 stream cipher with video steganography, offering fast, efficient, and highly secure encryption that resists attacks while preserving video quality. The method encrypts secret messages with ChaCha20 before embedding them in selected video frames’ LSBs, ensuring minimal distortion and strong protection.
Performance evaluation using PSNR and SSIM metrics demonstrates that ChaCha20-based steganography maintains near-original video quality while securely hiding data, outperforming DES and LSB methods in security and video fidelity. Though ChaCha20 results in larger file sizes, it is the best choice when security and quality are priorities.
Conclusion
In conclusion, video steganography using the ChaCha20 encryption algorithm provides a secure and efficient way to hide sensitive data inside a video files. It ensures that strong data protection while keeping the video quality almost unchanged by embedding information in the least significant bits of video frames. Experimental results including PSNR and SSIM metrics confirm that this method works well with only a slight drop in video quality that’s mostly impossible to notice. This method enhances security by making sure that even if someone intercepts the video, they can’t access the hidden data without the correct key. It is also fast and efficient making it suitable for real time applications. Compared to older methods like DES and simple LSB steganography, ChaCha20 algorithm offers stronger protection against hacking and detection of secret message. However, challenges such as capacity limitations, vulnerability to lossy compression, and potential detection by steganalysis tools highlight areas for further improvement.
References
[1] Anastasiia, H., Oleksandr, K., Yuliia, N., Alla, N., Veronika, S., & Tetiana, D. (2024). Management of Strategies for Shaping the Innovative and Investment Potential of Enterprises as a Factor Ensuring Their Economic Security. Indian Journal of Information Sources and Services, 14(3), 16–22. https://doi.org/10.51983/ijiss-2024.14.3.03.
[2] Anderson, R.,Biham, E.,& Knudsen, L.(2000).Serpent and smartcards. In Smart Card Research and Applications: Third international conference, CARDIS’98, Louvain-la-Neuve, Belgium, September 14-16, 1998. Proceedings 3(pp.246-253). Springer Berlin Heidelberg. https://doi.org/10.1007/10721064_23.
[3] Arman, M.S., Al Mamun, S., & jannat, N.(2024, April). A modified AES based approach for data integrity and data origin authentication. In 2024 3rd international conference on Advancement in electrical and electronic engineering (ICAEEE) (pp. 1-6) IEEE.https://doi.org/10.1109/ICAEEE62219.2024.10561750.
[4] Azeez, R. A., Abdul-Hussein, M. K., Mahdi, M. S., & ALRikabi, H. T. S. (2021). Design a system for an approved video copyright over cloud based on biometric iris and random walk generator using watermark technique. Periodicals of Engineering and Natural Sciences (PEN), 10(1), 178-187. https://doi.org/10.21533/pen.v10i1.2577.
[5] Azeez, R. A., Jamil, A. S., & Mahdi, M. S. (2023). A Partial Face Encryption in Real World Experiences Based on Features Extraction from Edge Detection. International Journal of Interactive Mobile Technologies, 17(7), 69-81. https://doi.org/10.3991/ijim.v17i07.3875.
[6] Bashier, E., & Jabeur, T. B. (2021). An E?icient Secure Image Encryption Algorithm Based on Total Shuffling, Integer Chaotic Maps and Median Filter. Journal of Internet Services and Information Security, 11(2), 46-77. https://doi.org/10.22667/JISIS.2021.05.31.046 .
[7] Biham, E., Dunk Elman, O., & Keller, N. (2001, April). Linear cryptanalysis of reduced round serpent. In International Workshop on Fast Software Encryption (pp. 16-27). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/3-540-45473-X_2.
[8] Hassan, N. F., Al-Adhami, A., & Mahdi, M. S. (2022). Digital speech files encryption based on Hénon and gingerbread chaotic maps. Iraqi Journal of Science, 830-842. https://doi.org/10.24996/ijs.2022.63.2.36.
[9] Hoobi, M. M. (2024). Multilevel Cryptography Model using RC5, Two fish, and Modified SerpentAlgorithms. Iraqi Journal of Science, 65(6), 3434-3450. https://doi.org/10.24996/ijs.2024.65.6.37
[10] Hussein, M. K., Hassan, K. R., & Al-Mashhadi, H. M. (2020). The quality of image encryption techniques by reasoned logic. Telkomnika (Telecommunication Computing Electronics and Control), 18(6), 2992-2998. https://doi.org/10.12928/TELKOMNIKA.v18i6.14340.
[11] Kalinin, O., Gonchar, V., Abliazova, N., Filipishyna, L., Onofriichuk, O., & Maltsev, M. (2024). Enhancing Economic Security through Digital Transformation in Investment Processes: Theoretical Perspectives and Methodological Approaches Integrating Environmental Sustainability. Natural and Engineering Sciences, 9(1), 26-45. https://doi.org/10.28978/nesciences.1469858.
[12] Mahdi, M. S., Azeez, R. A., & Hassan, N. F. (2020). A proposed lightweight image encryption using ChaCha with hyperchaotic maps. Periodicals of Engineering and Natural Sciences, 8(4), 2138-2145.
[13] Mahdi, M. S., Hassan, N. F., & Abdul-Majeed, G. H. (2021). An improved chacha algorithm forsecuring data on IoT devices. SN Applied Sciences, 3(4), 429. https://doi.org/10.1007/s42452-021-04425-7.
[14] Najm, H. (2021). Data authentication for web of things (WoT) by using modified secure hash algorithm-3 (SHA-3) and Salsa20 algorithm. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 12(10), 2541-2551.
[15] Najm, H., Hoomod, H. K., & Hassan, R. (2020). A proposed hybrid cryptography algorithm based on GOST and salsa (20). Periodicals of Engineering and Natural Sciences (PEN), 8(3), 829-1835.
[16] Najm, H., Hoomod, H., & Hassan, R. (2021). A New WoT Cryptography Algorithm Based on GOST and Novel 5d Chaotic System. International Association of Online Engineering. https://www.learntechlib.org/p/218922/.
[17] Schneier, B., Kelsey, J., Whiting, D., Wagner, D., Hall, C., Ferguson, N., & Stay, M. (2000). The Twofish team’s final comments on AES Selection. AES round, 2(1), 1-13.
[18] Shah, T., Haq, T. U., & Farooq, G. (2020). Improved SERPENT algorithm: design to RGB image encryption implementation. IEEE Access, 8, 52609-52621. https://doi.org/10.1109/ACCESS.2020.2978083
[19] Tian, P., & Su, R. (2022). A Novel virtual optical image encryption scheme created by combining chaotic S-Box with double random phase encoding. Sensors, 22(14), 5325. https://doi.org/10.3390/s22145325
[20] Ullah, A., Shah, A. A., Khan, J. S., Sajjad, M., Boulila, W., Akgul, A.,& Ahmad, J. (2022). An efficient lightweight image encryption scheme using multichaos. Security and Communication Networks, 2022(1), 5680357. https://doi.org/10.1155/2022/5680357
[21] Weinstein, D., Kovah, X., & Dyer, S. (2012). SeRPEnT: Secure remote peripheral encryption tunnel. Technical Report MP120013, the MITRE Corporation.
[22] Karthikeyan, B., Raj, M.M.A., Yuvaraj, D. and Joseph Abraham Sundar, K. (2020) A Hybrid Approach for Video Steganography by Stretching the Secret Data. In: Ranganathan, G., Chen, J. and Rocha, Á. Eds., Inventive Communication and Computational Technologies, Springer, 1081-1087. https://doi.org/10.1007/978-981-15-0146-3_104.
[23] Patil, A., Keshkamat, S.M., Desai, V.V. and Arlimatti, T. (2018) Embedding of Advanced Encryption Standards Encoded Data in Video Using Least Significant Bit Algorithm. 2018 International Conference on Recent Innovations in Electrical, Electronics & Communication Engineering (ICRIEECE), Bhubaneswar, India, 27-28 July 2018, 617-621. https://doi.org/10.1109/icrieece44171.2018.9009202.
[24] Manohar, N. and Kumar, P.V. (2020). Data Encryption & Decryption Using Steganography. 2020 4th International Conference on Intelligent Computing and Control Systems (ICICCS), Madurai, India, 13-15 May 2020, 697-702. https://doi.org/10.1109/iciccs48265.2020.9120935.
[25] Qasim Ahmed Alyousuf, F., Din, R. and Qasim, A.J. (2020) Analysis Review on Spatial and Transform Domain Technique in Digital Steganography. Bulletin of Electrical Engineering and Informatics, 9, 573-581. https://doi.org/10.11591/eei.v9i2.2068.
[26] Alam, K., Nushrat, S., Patwary, A.H., Ullah, A. and Robin, K.H. (2023) An Improved Approach of Image Steganography Based on Least Significant Bit Technique for Secure Communication in Cloud. In: Woungang, I., Dhurandher, S.K., Pattanaik, K.K., Verma, A. and Verma, P., Eds., Advanced Network Technologies and Intelligent Computing, Springer, 215-233. https://doi.org/10.1007/978-3-031-28180-8_15.
[27] Canniere, C.D.; Preneel, B. TRIVIUM Specifications. ESTREAM, ECRYPT Stream Cipher Project. 2006. Volume 2006. Available online: https://www.ecrypt.eu.org/stream/e2-trivium.html (accessed on 22 February 2024).
[28] Zhang, B.; Rahmatullah, B.; Wang, S.L.; Liu, Z. A plain-image correlative semi-selective medical image encryption algorithm using enhanced 2D-logistic map. Multimed. Tools Appl. 2022, 82, 15735–15762.
[29] Elashry, I.F.; El-Shafai, W.; Hasan, E.S.; El-Rabaie, S.; Abbas, A.M.; Abd El-Samie, F.E.; El-sayed, H.S.; Faragallah, O.S. Efficient chaotic-based image cryptosystem with different modes of operation. Multimed. Tools Appl. 2020, 79, 20665–20687.
[30] Sha, Y.; Cao, Y.; Yan, H.; GAO, X.; Mou, J. An image encryption scheme based on IAVL permutation scheme and DNA operations. IEEE Access 2021, 9, 96321–96336.