The development of technology in the era of data transfer technologies over the internet has increased interest in data preservation. This data can contain sensitive and personal data such as medical data, personal photos, and bank information. However, the data is always at risk, it can be used to steal, blackmail, or even threaten safety. Video steganography is the most interesting hiding method to conserve data by hiding secret information in video frames. The video has a complex structure and can have a large amount of confidential data, making it better than other hiding techniques such as text and images. Moreover, data protection will double if this data is encrypted before the merge with video steganography. This paper focuses on comparing various video steganography and cryptography techniques. Also, an analysis of the evaluation parameters for cryptography and steganography techniques. Overall, this paper gives a comprehensive understanding of data protection techniques.

1.
A. A.
Bahaddad
,
K. A.
Almarhabi
, and
S. A.
Khalek
. "
Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption
."
Alexandria Engineering Journal
75
(
2023
):
41
54
.
2.
A.
Jan
,
S.A.
Parah
,
M.
Hassan
, and
B.A.
Malik
” Double layer security using crypto-stego techniques: a comprehensive review.
"
Health and Technology
12
.
1
(
2022
):
9
31
.
3.
S.
Abidin
,
V. R.
Vadi
, and
A.
Rana
.
"On Confidentiality, Integrity, Authenticity, and Freshness (CIAF) in WSN." Advances in Computer
,
Communication and Computational Sciences: Proceedings of IC4S 2019
. Springer Singapore,
2021
.
4.
M. S.
Keyvan
,
G.
Ali
,
B.
sina
, and
A.
Hamed
. "
Security of Internet of things based on cryptographic algorithms: a survey
."
Wireless Networks
27
(
2021
):
1515
1555
.
5.
R.
Qumsieh
,
M.
Farajallah
, and
R.
Hamamreh
. "
Joint block and stream cipher based on a modified skew tent map
."
Multimedia Tools and Applications
78
(
2019
):
33527
33547
.
6.
M.
Almazrooie
,
A.
Samsudin
,
A. A.
Gutb
,
M.
Salleh
,
M.
Omar
, and S.
Hassan "Integrity verification for digital Holy Quran verses using a cryptographic hash function and compression."
Journal of King Saud University-Computer and Information Sciences
32
.
1
(
2020
):
24
34
.
7.
A.
Jan
,
S. A.
Parah
, and
B. A.
Malik
.
"A novel Laplacian of Gaussian (LoG) and chaotic encryption based image steganography technique."
2020 International Conference for Emerging Technology (INCET).
IEEE,
2020
.
8.
K. C.
Jithin
, and
S.
Sankar
. "
Colour image encryption algorithm combining Arnold map, DNA sequence operation, and a Mandelbrot set
."
Journal of Information Security and Applications
50
(
2020
):
102428
.
9.
C.
Li
,
B.
Feng
,
S.
Li
,
J.
Kurths
, and
G.
Chen
. "
Dynamic analysis of digital chaotic maps via state-mapping networks
."
IEEE Transactions on Circuits and Systems I: Regular Papers
66
.
6
(
2019
):
2322
2335
.
10.
R. B.
Naik
, and
U.
Singh
. "
A review on applications of chaotic maps in pseudo-random number generators and encryption
."
Annals of Data Science
(
2022
):
1
26
.
11.
D. S.
Malik
, and
T.
Shah
. "
Color multiple image encryption scheme based on 3D-chaotic maps
."
Mathematics and Computers in Simulation
178
(
2020
):
646
666
.
12.
D.
Lambic
. "
A new discrete-space chaotic map based on the multiplication of integer numbers and its application in S-box design
."
Nonlinear Dynamics
100
.
1
(
2020
):
699
711
.
13.
K.
Jiao
,
G.
Ye
,
Y.
Dong
, and
J.
He
.
"Image encryption scheme based on a generalized Arnold map and RSA algorithm."
Security and Communication Networks 2020
(
2020
):
1
14
.
14.
F. S.
Hassan
, and
M. A.
Saffo
. "
FPGA hardware co-simulation of image encryption using stream cipher based on chaotic maps
."
Sensing and Imaging
21
.
1
(
2020
):
35
.
15.
E. Z.
Zefreh
. "
An image encryption scheme based on a hybrid model of DNA computing, chaotic systems, and hash functions
."
Multimedia Tools and Applications
79
.
33–34
(
2020
):
24993
25022
.
16.
B.
Idress
,
S.
Zafar
,
T.
Rashid
, and
W.
Gao
"Image encryption algorithm using S-box and dynamic Hénon bit-level permutation."
Multimedia Tools and Applications
79
(
2020
):
6135
6162
.
17.
L.
Lidong
,
D.
Jiang
,
X.
Wangz
,
L.
Zhang
, and
X.
Rong
"A dynamic triple-image encryption scheme based on chaos, S-box and image compressing."
IEEE Access
8
(
2020
):
210382
210399
.
18.
Q.
Lu
,
C.
Zhu
, and
X.
Deng
. "
An efficient image encryption scheme based on the LSS chaotic map and single S-box
."
IEEE Access
8
(
2020
):
25664
25678
.
19.
N.
Iqbal
,
R. A.
Naqvi
,
M.
Atif
,
M. A
Khan
,
M.
Hanif
, and
S.
Abbas
"On the image encryption algorithm based on the chaotic system, DNA encoding, and castle."
IEEE Access
9
(
2021
):
118253
118270
.
20.
T.
Sajjad
, and
R.
Ali
. "
A novel color image encryption scheme based on a new dynamic compound chaotic map and S-box
."
Multimedia Tools and Applications
81
.
15
(
2022
):
20585
20609
.
21.
P. N.
Lone
,
D.
Singh
, and
U. H.
Mir
. "
Image encryption using DNA coding and three-dimensional chaotic systems
."
Multimedia Tools and Applications
81
.
4
(
2022
):
5669
5693
.
22.
B.
Jasara
and
A. H.
Moon
.
"Color image encryption and authentication using dynamic DNA encoding and hyperchaotic system."
Expert Systems with Applications
206
(
2022
):
117861
.
23.
A. H.
Alrubaie
,
M. A.
Khodher
, and
A. T.
Abdulameer
. "
Image encryption based on 2DNA encoding and chaotic 2D logistic map
."
Journal of Engineering and Applied Science
70
.
1
(
2023
):
1
21
.
24.
M. R.
Abdulla
,
M. ’A.
Khodher
, and
A.
Alabaichi
. "
A novel lightweight image encryption scheme
."
CMC-COMPUTERS MATERIALS & CONTINUA
75
.
1
(
2023
):
2137
2153
.
25.
M.
Abid
,
M.
Nadeem
, and
M. W.
Rasheed
. "
A study of the text-theoretical approach to S-box construction with image encryption applications
."
Scientific Reports
13
.
1
(
2023
):
21081
.
26.
B.
Rajib
,
I.
Mukherjee
, and
S. K.
Bandyopadhyay
. "
Image feature based high capacity steganographic algorithm
."
Multimedia Tools and Applications
78
(
2019
):
20019
20036
.
27.
P.
Rachna
,
K.
Lad
, and
M.
Patel
. "
Study and investigation of video steganography over uncompressed and compressed domain: a comprehensive review
."
Multimedia Systems
27
(
2021
):
985
1024
.
28.
P.
Rachna
,
L.
Kalpesh
,
P.
Mukesh
, and
D.
Madhavi
. "
A hybrid DST-SBPNRM approach for compressed video steganography
."
Multimedia S]ystems
27
.
3
(
2021
):
417
428
.
29.
D.
Mukesh
, and
M.
Juneja
. "
A secure and robust video steganography scheme for covert communication in H. 264/AVC
."
Multimedia Tools and Applications
80
(
2021
):
14383
14407
.
30.
Y.
Liu
,
S.
Liu
,
Y.
Wang
,
H.
Zhao
, and
S.
Liu
. "
Video steganography: A review
."
Neurocomputing
335
(
2019
):
238
250
.
31.
V.Y.
Milad
,
A.
Peyman
,
B. J.
Milad
, and
I.Y.
Behzad
. "
A chaotic video steganography technique for carrying different types of secret messages
."
Journal of Information Security and Applications
66
(
2022
):
103160
.
32.
K.
Jayakanth
,
S.
Nandhini
,
A.
Somaya
,
B.
Ahmed
. "
Video steganography: recent advances and challenges
."
Multimedia Tools and Applications
(
2023
):
1
43
.
33.
R.
Supriadi
,
A.
Syukur
, and
P. N.
Andono
. "
Inverted LSB image steganography using an adaptive pattern to improve imperceptibility
."
Journal of King Saud University-Computer and Information Sciences
34
.
6
(
2022
):
3559
3568
.
34.
G. B.
Ajay
,
G. B.
Vijay
,
K.
Krishan
, and
G. M.
Mangesh
. "
Multimode approach of data encryption in images through quantum steganography
."
Multidisciplinary approach to modern digital steganography. IGI Global
,
2021
.
99
124
.
35.
D.
Mukesh
, and
M.
Juneja
. "
A robust and imperceptible steganography technique for SD and HD videos
."
Multimedia Tools and Applications
78
(
2019
):
5769
5789
.
36.
D.
Mukesh
, and
M.
Juneja
. "
Evaluation of orthogonal and biorthogonal wavelets for video steganography
."
Information Security Journal: A Global Perspective
29
.
1
(
2020
):
40
50
.1
37.
K. R.
Krishna
, and
K.
Kumar
. "
P-MEC: polynomial congruence-based multimedia encryption technique over the cloud
."
IEEE Consumer Electronics Magazine
10
.
5
(
2020
):
41
46
.
38.
D.
Mukesh
, and
M.
Juneja
. "
A survey on information hiding using video steganography
."
Artificial Intelligence Review
(
2021
):
1
65
.
39.
N. d.
Chien
,
N. T.
Son
,
H. R.
Fang
, and
H. H.
Yung
. "
A novel steganography scheme for video H. 264/AVC without distortion drift
."
Multimedia Tools and Applications
78
(
2019
):
16033
16052
.
40.
W. Y.
Yun Cao
, and
X.
Zhao
. "
Minimizing embedding impact for H. 264 steganography by progressive trellis coding
."
IEEE Transactions on Information Forensics and Security
16
(
2020
):
333
345
.
41.
J.
Wang
,
X.
Jia
,
X.
Kang
,
Y.
Shi
"
A cover selection HEVC video steganography based on intra-prediction mode."
IEEE Access
7
(
2019
):
119393
119402
.
42.
H.
Zhao
,
M.
Pang
, and
Y.
Liu
.
"Intra-frame adaptive transform size for video steganography in H. 265/HEVC bitstreams."
Intelligent Computing Methodologies: 16th International Conference, ICIC 2020
,
Bari, Italy
,
October 2–5, 2020
, Proceedings, Part III 16. Springer International Publishing,
2020
.
43.
H.
Zhao
,
M.
Pang
, and
Y.
Liu
.
"An efficient video steganography scheme for data protection in H. 265/HEVC."
Intelligent Computing Theories and Application: 17th International Conference, ICIC 2021
,
Shenzhen, China
,
August 12–15, 2021
, Proceedings, Part I 17. Springer International Publishing, 2021.
44.
L.
Yunxia
,
L.
Shuyang
,
W.
Yonghao
, and
Z.
Hongguo
"Video steganography: A review."
Neurocomputing
335
(
2019
):
238
250
.
45.
Yang
,
Jie
, and
Songbin
Li
. "
An efficient information hiding method based on motion vector space encoding for HEVC
."
Multimedia Tools and Applications
77
(
2018
):
11979
12001
.
46.
X.
Dawen
,
R.
Wang
, and
Y.
Zhu
. "
Tunable data hiding in partially encrypted H. 264/AVC videos
."
Journal of Visual Communication and Image Representation
45
(
2017
):
34
45
.
47.
R. J.
Mustafa
,
Y. M.
Younis
,
H. I.
Hussein
. "
A new video steganography scheme based on Shi-Tomasi corner detector
."
IEEE Access
8
(
2020
):
161825
161837
.
48.
L.
Shuyang
.
"A Robust Lossless Steganography Method Based on H. 264/AVC."
Intelligent Computing Theories and Application: 17th International Conference, ICIC 2021
,
Shenzhen, China
,
August 12–15, 2021
, Proceedings, Part I 17. Springer International Publishing, 2021.
49.
H.
Zhao
,
Y.
Liu
,
Y.
Wang
,
S.
Liu
. "
A video steganography method based on transform block decision for H. 265/HEVC
."
IEEE Access
9
(
2021
):
55506
55521
50.
S. Y.
Liu
,
C.
Feng
, and
H.
Zaho
.
"An efficient video steganography method based on HEVC."
Intelligent Computing Theories and Application: 17th International Conference, ICIC 2021
,
Shenzhen, China
,
August 12– 15, 2021
, Proceedings, Part I 17. Springer International Publishing,
2021
.
51.
D.
Mukesh
, and
M.
Juneja
. "
A secure video steganography scheme using DWT based on object tracking
."
Information Security Journal: A Global Perspective
31
.
2
(
2022
):
196
213
.
52.
F.
Pingan
,
H.
Zhang
, and
X.
Zhao
. "
Robust video steganography for social media sharing based on principal component analysis
."
EURASIP Journal on Information Security 2022.1
(
2022
):
4
.
53.
S. V.
Kumar
,
R. N.
Mir
, and
Ranjeet Kumar
Rout
.
"Towards secured image steganography based on content-adaptive adversarial perturbation."
Computers and Electrical Engineering
105
(
2023
):
108484
.
54.
J.
Zhang
,
K.
Chen
,
W.
Li
,
W.
Zhang
, and
N.
Yu
.
"Steganography With Generated Images: Leveraging Volatility to Enhance Security."
IEEE Transactions on Dependable and Secure Computing
(
2023
).
55.
S. Y.
Liu
, and
R.
Zhang
.
"Generative Image Steganography based on Guidance Feature Distribution." ACM Transactions on Multimedia Computing
,
Communications and Applications
(
2023
).
56.
L.
Meng
,
X.
Liang
, and T.
Sun "A robust coverless video steganography based on maximum DC coefficients against video attacks."
Multimedia Tools and Applications
(
2023
):
1
35
.
57.
X. H.
Tian
, and
C.
Li
. "
A high capacity video steganography based on intra luma and chroma modes
."
Multimedia Tools and Applications
(
2023
):
1
24
.
58.
S.
Dawood
, and
T.
Shah
. "
A novel discrete image encryption algorithm based on finite algebraic structures
."
Multimedia Tools and Applications
79
(
2020
):
28023
28042
59.
P. S
Sneha
,
S.
Sankar
, and
A. S.
Kumar
. "
A chaotic color image encryption scheme combining Walsh–Hadamard transform and Arnold–Tent maps
."
Journal of Ambient Intelligence and Humanized Computing
11
(
2020
):
1289
1308
.
60.
K. J.
Sher
, and
J.
Ahmad
. "
Chaos-based efficient selective image encryption
."
Multidimensional Systems and Signal Processing
30
(
2019
):
943
961
.
61.
A.
Benlashram
,
M.
al_Ghamdi
,
R.
Altalhi
, and
P.
Laabidi
. "
A novel approach of image encryption using pixel shuffling and 3D chaotic map
."
Journal of Physics: Conference Series
. Vol.
1447
. No.
1
. IOP Publishing, 2020.
62.
K. M.
Fahad
,
A.
Ahmed
, and
K.
Saleem
. "
A novel cryptographic substitution box design using Gaussian distribution
."
IEEE Access
7
(
2019
):
15999
16007
.
63.
A.
Bhatti
,
Z.
Yu
,
J.
Li
,
S. A.
Nawaz
,
A.
Mehmood
,
K.
Zhang
, and
L.
Yuan
."
Hybrid watermarking algorithm using Clifford algebra with Arnold scrambling and chaotic encryption
."
IEEE Access
8
(
2020
):
76386
76398
.
64.
A.
Sukumar
,
V.
Subramainyaswamy
,
v.
Vijayakumar
,
L.
Ravi
 
"A secure multimedia steganography scheme using hybrid transform and support vector machine for cloud-based storage."
Multimedia Tools and Applications
79
(
2020
):
10825
10849
.
65.
S.
Amandeep
,
P.
Agarwal
, and
M.
Chand
.
"Image encryption and analysis using dynamic AES."
2019 5th international conference on optimization and applications (ICOA).
IEEE,
2019
.
66.
R.
Saidi
,
N.
Cherrid
,
T.
Bentahar
,
H.
Mayache
, and
A.
Bentahar
. "
Number of Pixel Change Rate and Unified Average Changing Intensity for Sensitivity Analysis of Encrypted inSAR Interferogram
."
Ingénierie des Systèmes d Inf
.
25
.
5
(
2020
):
601
607
.
67.
M.
Aljohani
,
I.
Ahmad
,
M.
Basheri
,
M. O.
Alassafi
. "
Performance analysis of cryptographic pseudorandom number generators
."
IEEE Access
7
(
2019
):
39794
39805
.
68.
I.
Saleh
, and
A.
Alharbi
. "
Efficient image encryption scheme using Henon map, dynamic S-boxes and elliptic curve cryptography
."
IEEE Access
8
(
2020
):
194289
194302
.
69.
X.
Wang
,
S.
Gao
,
L.
Yu
,
Y.
Sun
, and
H.
Sun
."
Chaotic image encryption algorithm based on bit-combination scrambling in the decimal system and dynamic diffusion
."
IEEE Access
7
(
2019
):
103662
103677
.
70.
Z.
Abduljabbar
,
I. Q.
Abduljaleel
,
J.
Ma
,
M. A.
Sibahee
,
V. O.
Nyangaresi
,
D. G.
Honi
,
A. I.
Abdulsada
, and
X.
Jiao
. "
Provably secure and fast color image encryption algorithm based on s-boxes and hyperchaotic map
."
IEEE Access
10
(
2022
):
26257
26270
.
71.
Y.
Sha
,
Y.
Cao
,
H.
Yan
,
X.
Gao
, and
Mou
. "
An image encryption scheme based on IAVL permutation scheme and DNA operations
."
IEEE Access
9
(
2021
):
96321
96336
.
72.
J.
Hao
,
H.
Li
,
H.
Yan
, and
Jun
Mou
. "
A new fractional chaotic system and its application in image encryption with DNA mutation
."
IEEE Access
9
(
2021
):
52364
52377
.
73.
L.
Tao
,
D.
Baoxiang
, and
X.
Liang
. "
Image encryption algorithm based on logistic and two-dimensional Lorenz
."
Ieee Access
8
(
2020
):
13792
13805
.
74.
A.R.
Ismail
. "
Secure image transmission using chaotic-enhanced elliptic curve cryptography
."
IEEE Access
8
(
2019
):
3875
3890
.
75.
K. J.
Sher
, and
J.
Ahmad
. "
Chaos-based efficient selective image encryption
."
Multidimensional Systems and Signal Processing
30
(
2019
):
943
961
.
76.
S. T.
Kamal
,
K. M.
Hosny
,
T. M.
Elgindy
,
M. M.
Darwish
, and
M.M.
Fouda
."
A new image encryption algorithm for grey and color medical images
."
IEEE Access
9
(
2021
):
37855
37865
.
77.
Z.
Gan
,
X.
Chai
,
D.
Han
, and
Y.
Chen
. "
A chaotic image encryption algorithm based on 3-D bit-plane permutation
."
Neural Computing and Applications
31
(
2019
):
7111
7130
.
78.
K.
Noura
,
A.
Sarhan
, and
M.
Alshewimy
.
"An efficient color/grayscale image encryption scheme based on hybrid chaotic maps."
Optics & Laser Technology
143
(
2021
):
107326
.
79.
K.
Gurpreet
,
R.
Agarwal
, and
V.
Patidar
. "
Chaos-based multiple order optical transform for 2D image encryption
."
Engineering Science and Technology, an International Journal
23
.
5
(
2020
):
998
1014
.
80.
F.
ElAzzaby
,
K. H.
Sabour
,
N.
Elakkad
,
W.
Elakkad
,
W.
El-Shafai
,
A.
Torki
, and
S. R.
Rajkumar
.
"Color image encryption using a Zigzag Transformation and sine-cosine maps."
Scientific African
(
2023
):
e01955
.
81.
E.
Winarno
,
K.
Nugroho
, and
P. W.
Adi
. "
Integrated dual hyperchaotic and Josephus traversing based 3D confusion-diffusion pattern for image encryption
."
Journal of King Saud University-Computer and Information Sciences
35
.
9
(
2023
):
101790
.
82.
A.
Alireza
,
M. J
Rostami
, and
B.
Ghavami
. "
An image encryption method based on chaos system and AES algorithm
."
The Journal of Supercomputing
75
(
2019
):
6663
6682
.
83.
R.
Atta
,
M.
Ghanbari
, and
L.
Fellow
IEEE.
"A high payload data hiding scheme based on dual-tree complex wavelet transform."
Optik
226
(
2021
):
165786
.
84.
R.
Biswas
,
I.
Mukherjee
, and
S. K.
Bandyopadhyay
. "
Image feature based high capacity steganographic algorithm
."
Multimedia Tools and Applications
78
(
2019
):
20019
20036
.
85.
X.
Li
,
Y.
Luo
, and
W.
Bian
. "
Retracing extended sudoku matrix for high-capacity image steganography
."
Multimedia Tools and Applications
80
(
2021
):
18627
18651
.
86.
A.
AbdelRaouf
. "
A new data hiding approach for image steganography based on visual color sensitivity
."
Multimedia Tools and Applications
80
.
15
(
2021
):
23393
23417
.
87.
M.
Hussain
,
Q.
Riaz
,
S.
Saleem
,
A.
Ghafoor
, and
K. H.
Jung
. "
Enhanced adaptive data hiding method using LSB and pixel value differencing
."
Multimedia Tools and Applications
80
(
2021
):
20381
20401
.
88.
S.
Saha
,
A.
Chakraborty
,
A.
Chatterjee
,
S.
Dasgupta
,
S. K.
Chosal
, and
R.
Sarkar
. "
Extended exploiting modification direction based steganography using a hashed-weightage array
."
Multimedia Tools and Applications
79
(
2020
):
20973
20993
.
89.
F.S.
Hassan
, and
A.
Gutub
. "
Efficient image reversible data hiding technique based on interpolation optimization
."
Arabian Journal for Science and Engineering
46
(
2021
):
8441
8456
.
90.
K. S.
Ghosal
,
A.
Chatterjee
, and
R.
Sarkar
. "
Image steganography based on Kirsch edge detection
."
Multimedia Systems
27
.
1
(
2021
):
73
87
.
91.
G.V.
Murugan
, and
R. U.
Subramaniyam
. "
Performance analysis of image steganography using wavelet transform for the safe and secured transaction
."
Multimedia Tools and Applications
79
(
2020
):
9101
9115
.
92.
A. A.
Eyssa
,
F. E.
Abdelsamie
, and
A. E.
Abdelnaiem
. "
An efficient image steganography approach over the wireless communication system
."
Wireless personal communications
110
(
2020
):
321
337
.
93.
R.
Kaur
, and
B.
Singh
. "
A hybrid algorithm for robust image steganography
."
Multidimensional Systems and Signal Processing
32
(
2021
):
1
23
.
94.
J.
Sharafi
,
Y.
Khedmati
, and
M. M.
Shabani
.
"Image steganography based on a new hybrid chaos map and discrete transforms."
Optik
226
(
2021
):
165492
.
95.
A. A.
Bahaddad
,
K. A.
Almarhabi
, and
S.
Abdel-Khalek
. "
Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption
."
Alexandria Engineering Journal
75
(
2023
):
41
54
.
96.
R. O.
Ogundokun
, and
O. C.
Abikoye
.
"A safe and secured medical textual information using an improved LSB image steganography."
International Journal of Digital Multimedia Broadcasting 2021
(
2021
):
1
8
.
97.
N. A
Mawla
, and
H. K.
Khafaji
. "
Enhancing Data Security: A Cutting-Edge Approach Utilizing Protein Chains in Cryptography and Steganography
."
Computers
12
.
8
(
2023
):
166
.
98.
M.
Alanzy
,
R.
Alomrani
,
B.
Alqaruni
, and
S.
Almutairi
. "
Image Steganography Using LSB and Hybrid Encryption Algorithms
."
Applied Sciences
13
.
21
(
2023
):
11771
.
This content is only available via PDF.
You do not currently have access to this content.