Salwan F. Salman Al-Rubaie, Maher K. Mahmoud Al-Azawi
{"title":"High payload H.266/Versatile Video Coding (VVC) steganography based on affine motion estimation and chaotic maps","authors":"Salwan F. Salman Al-Rubaie, Maher K. Mahmoud Al-Azawi","doi":"10.1016/j.jisa.2025.104212","DOIUrl":null,"url":null,"abstract":"<div><div>The widespread data breaches across the internet, along with the vast usage of high-definition and ultra-high-definition video applications, have prompted institutions to focus on developing steganography techniques for the next-generation video codec standard, H.266/Versatile Video Coding (VVC). This focus is attributed to VVC's superior technological capabilities, which offer a 50 % reduction in bitrate while allowing for a greater data embedding capacity. All while preserving comparable visual quality to its predecessor, H.265/High Efficiency Video Coding (HEVC). This paper proposes a video steganographic technique for the VVC standard that utilizes Motion Vectors (MVs) based on Affine Motion Estimation (AME) as confidential information carriers, where four novel chaotic maps are adopted to ensure a high level of system security. The paper’s contributions include a large payload approach based on MVs for the H.266 standard, along with the use of four novel chaotic maps to enhance system security. Simulation results proved that the proposed technique achieves an average hiding capacity of 73.760 Kbits per frame, significantly surpassing state-of-the-art methods accomplished in 1920 × 1080 video resolution with a difference Peak Signal to Noise Ratio (ΔPSNR) of -0.097 dB, a Bit Rate Increase (BRI) of 4.120 %, and at a Quantization Parameter (QP) of 32. Furthermore, the integration of four highly complex chaotic maps, featuring a large key space size of 2<sup>797</sup>, elevates the security of the suggested technique, rendering it nearly unbreakable against all types of brute-force cyberattacks.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"94 ","pages":"Article 104212"},"PeriodicalIF":3.7000,"publicationDate":"2025-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information Security and Applications","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2214212625002492","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
The widespread data breaches across the internet, along with the vast usage of high-definition and ultra-high-definition video applications, have prompted institutions to focus on developing steganography techniques for the next-generation video codec standard, H.266/Versatile Video Coding (VVC). This focus is attributed to VVC's superior technological capabilities, which offer a 50 % reduction in bitrate while allowing for a greater data embedding capacity. All while preserving comparable visual quality to its predecessor, H.265/High Efficiency Video Coding (HEVC). This paper proposes a video steganographic technique for the VVC standard that utilizes Motion Vectors (MVs) based on Affine Motion Estimation (AME) as confidential information carriers, where four novel chaotic maps are adopted to ensure a high level of system security. The paper’s contributions include a large payload approach based on MVs for the H.266 standard, along with the use of four novel chaotic maps to enhance system security. Simulation results proved that the proposed technique achieves an average hiding capacity of 73.760 Kbits per frame, significantly surpassing state-of-the-art methods accomplished in 1920 × 1080 video resolution with a difference Peak Signal to Noise Ratio (ΔPSNR) of -0.097 dB, a Bit Rate Increase (BRI) of 4.120 %, and at a Quantization Parameter (QP) of 32. Furthermore, the integration of four highly complex chaotic maps, featuring a large key space size of 2797, elevates the security of the suggested technique, rendering it nearly unbreakable against all types of brute-force cyberattacks.
期刊介绍:
Journal of Information Security and Applications (JISA) focuses on the original research and practice-driven applications with relevance to information security and applications. JISA provides a common linkage between a vibrant scientific and research community and industry professionals by offering a clear view on modern problems and challenges in information security, as well as identifying promising scientific and "best-practice" solutions. JISA issues offer a balance between original research work and innovative industrial approaches by internationally renowned information security experts and researchers.