An Adaptive LSB-Based Video Steganography Framework with Blockchain-Enabled Verification for Secure Multimedia Communication
Received: 5 November 2025 | Revised: 20 December 2025 and 10 January 2026 | Accepted: 12 January 2026 | Online: 4 March 2026
Corresponding author: S. G. Shaila
Abstract
Digital communication systems face an ongoing major challenge to protect video information from unauthorized access, tampering, and eavesdropping operations. Standalone steganographic methods face two major drawbacks: restricted data storage capabilities and decreased ability to remain undetectable. This study presents an integrated video security framework that unites adaptive video steganography with hybrid cryptographic encryption and blockchain-enabled verification to protect data confidentiality, robustness, and integrity. The proposed framework consists of three separate modules that work together: StegoVision, Robust Video Steganography with Decoy Extraction, and Blockchain-Enabled Encryption. The StegoVision module uses an adaptive Least-Significant Bit (LSB) based embedding scheme with multi-stage compression to enable high-capacity covert communication. The system uses AES-CBC encryption with Knight's Tour-based adaptive embedding and deception techniques to protect unauthorized extractors from detecting hidden data. The system uses hybrid AES-RSA encryption with IPFS-based decentralized storage to achieve tamper-proof authentication and traceability. The proposed method was tested on the HMDB51 (Human Motion DataBase) benchmark dataset. The StegoVision system achieved 94.1% accuracy through its visual quality preservation during compression and format conversion processes. The decoy-based model achieved 42.6 dB PSNR and 0.981 SSIM during compression and format conversion processes. The blockchain module achieved encryption speeds up to 320 MB/s with near-lossless reconstruction (PSNR > 51.4 dB, SSIM ≈ 0.999) and integrity verification accuracy exceeding 99.9%. A comparative analysis demonstrates that the proposed framework achieves an optimal balance between capacity, imperceptibility, robustness, and verifiability.
Keywords:
video steganography, blockchain, AES–RSA encryption, IPFS, adaptive LSB, knight’s tour embedding, decoy extraction, data securityDownloads
References
M. ud Din et al., "Randomized Frame Selection Based Video Steganography Method for Secure Embedding of Secret Data," Journal of Computing & Biomedical Informatics, vol. 8, no. 02, Mar. 2025.
C. Han and T. Xue, "Adaptive network steganography using deep learning and multimedia video analysis for enhanced security and fidelity," PLOS One, vol. 20, no. 6, June 2025, Art. no. e0318795. DOI: https://doi.org/10.1371/journal.pone.0318795
S. Roy and J. Howlader, "Design and Analysis of a Novel Video Steganography Technique with Enhanced Resilience," Journal of The Institution of Engineers (India): Series B, Aug. 2025. DOI: https://doi.org/10.1007/s40031-025-01260-x
D. Darwis, Y. Fernando, A. R. Mehta, Wamiliana, and Setiawansyah, "Metadata-Based Video Steganography: Development of a New Model for Secure Information Embedding," Engineering, Technology & Applied Science Research, vol. 15, no. 5, pp. 27076–27088, Oct. 2025. DOI: https://doi.org/10.48084/etasr.11937
X. Mao et al., "From Covert Hiding To Visual Editing: Robust Generative Video Steganography," in Proceedings of the 32nd ACM International Conference on Multimedia, Melbourne, Australia, July 2024, pp. 2757–2765. DOI: https://doi.org/10.1145/3664647.3681149
F. Zhang, Y. Dong, and H. Sun, "Research on Key Technologies of Image Steganography Based on Simultaneous Deception of Vision and Deep Learning Models," Applied Sciences, vol. 14, no. 22, Nov. 2024, Art. no. 10458. DOI: https://doi.org/10.3390/app142210458
N. A. Ali and R. J. Mstafa, "Optimizing Region of Interest Selection for Effective Embedding in Video Steganography Based on Genetic Algorithms," Computer Systems Science and Engineering, vol. 47, no. 2, pp. 1451–1469, 2023. DOI: https://doi.org/10.32604/csse.2023.039957
S. Rathor, V. Rawal, and K. Chhavi, "A Payload Scrambling Technique for Secure Image Steganography," in Advances in Data and Information Sciences, Singapore, 2022, pp. 573–582. DOI: https://doi.org/10.1007/978-981-16-5689-7_50
N. Subramanian, O. Elharrouss, S. Al-Maadeed, and A. Bouridane, "Image Steganography: A Review of the Recent Advances," IEEE Access, vol. 9, pp. 23409–23423, 2021. DOI: https://doi.org/10.1109/ACCESS.2021.3053998
S. Thakkar, K. Shivdikar, and C. Warty, "Video steganography using encrypted payload for satellite communication," in 2017 IEEE Aerospace Conference, Big Sky, MT, USA, Mar. 2017, pp. 1–11. DOI: https://doi.org/10.1109/AERO.2017.7943978
W. Saqer and T. Barhoom, "Steganography and Hiding Data with Indicators-based LSB Using a Secret Key," Engineering, Technology & Applied Science Research, vol. 6, no. 3, pp. 1013–1017, June 2016. DOI: https://doi.org/10.48084/etasr.649
Z. Wang and A. C. Bovik, "Mean squared error: Love it or leave it? A new look at Signal Fidelity Measures," IEEE Signal Processing Magazine, vol. 26, no. 1, pp. 98–117, Jan. 2009. DOI: https://doi.org/10.1109/MSP.2008.930649
N. F. Johnson, Z. Duric, and S. Jajodia, Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking : Attacks and Countermeasures. Springer Science & Business Media, 2001. DOI: https://doi.org/10.1007/978-1-4615-4375-6
J. Ceron, C. Tinipuclla, P. Shiguihara, J. Ceron, C. Tinipuclla, and P. Shiguihara, "A Survey of Blockchain for Video Integrity," Engineering Proceedings, vol. 42, no. 1, Aug. 2023. DOI: https://doi.org/10.3390/engproc2023042004
A. Qureshi, D. M. Jiménez, A. Qureshi, and D. M. Jiménez, "Blockchain-Based Multimedia Content Protection: Review and Open Challenges," Applied Sciences, vol. 11, no. 1, Dec. 2020. DOI: https://doi.org/10.3390/app11010001
S. Ghimire, J. Y. Choi, and B. Lee, "Using Blockchain for Improved Video Integrity Verification," IEEE Transactions on Multimedia, vol. 22, no. 1, pp. 108–121, Jan. 2020. DOI: https://doi.org/10.1109/TMM.2019.2925961
A. Kanungo, A. Srivastava, S. Anklesaria, and P. Churi, "A systematic review on video encryption algorithms: A future research," Journal of Autonomous Intelligence, vol. 6, no. 2, Aug. 2023, Art. no. 665. DOI: https://doi.org/10.32629/jai.v6i2.665
Z. Zhao, Y. Liu, H. Zhao, and Y. Wang, "A Video Security Verification Method Based on Blockchain," in 2023 IEEE International Conference on Blockchain (Blockchain), Danzhou, China, Sept. 2023, pp. 105–108. DOI: https://doi.org/10.1109/Blockchain60715.2023.00026
D. K.G.Revathi, U. C. Devi, and S. G. H. Rose, "Security And Preservation For Video Data Transmission Using Blockchain Technology For Cloud Storage On Internet Of Things (Iot)," NVEO – Natural Volatiles & Essential Oils Journal, pp. 6003–6016, 2021.
P. W. Khan, Y. Byun, P. W. Khan, and Y. Byun, "A Blockchain-Based Secure Image Encryption Scheme for the Industrial Internet of Things," Entropy, vol. 22, no. 2, Feb. 2020. DOI: https://doi.org/10.3390/e22020175
A. Fitwi and Y. Chen, "Secure and Privacy-Preserving Stored Surveillance Video Sharing atop Permissioned Blockchain," in 2021 International Conference on Computer Communications and Networks (ICCCN), Athens, Greece, July 2021, pp. 1–8. DOI: https://doi.org/10.1109/ICCCN52240.2021.9522199
M. Awais et al., "Deep learning based enhanced secure emergency video streaming approach by leveraging blockchain technology for Vehicular AdHoc 5G Networks," Journal of Cloud Computing, vol. 13, no. 1, Aug. 2024, Art. no. 130. DOI: https://doi.org/10.1186/s13677-024-00665-1
Z. Chen, F. Liu, D. Li, Y. Liu, X. Yang, and H. Zhu, "Video security in logistics monitoring systems: a blockchain based secure storage and access control scheme," Cluster Computing, vol. 27, no. 8, pp. 10245–10264, Nov. 2024. DOI: https://doi.org/10.1007/s10586-024-04667-1
M. M. Sabri, H. K. Hoommod, and K. A. Hussein, "Security surveillance systems based on deep learning and Blockchain techniques: a review," Mustansiriyah Journal of Pure and Applied Sciences, vol. 3, no. 3, pp. 173–193, June 2025. DOI: https://doi.org/10.47831/mjpas.v3i3.326
J. C. Kurniawan, A. Nugraha, A. I. Prayogo, and T. N. Fandy, "Improving Data Embedding Capacity in LSB Steganography Utilizing LSB2 and Zlib Compression," Sinkron, vol. 9, no. 1, pp. 174–181, Jan. 2024. DOI: https://doi.org/10.33395/sinkron.v9i1.13185
B. Kallapu et al., "Multi-Layered Security Framework Combining Steganography and DNA Coding," Systems, vol. 13, no. 5, May 2025, Art. no. 341. DOI: https://doi.org/10.3390/systems13050341
"HMDB51." Kaggle, [Online]. Available: https://www.kaggle.com/datasets/easonlll/hmdb51.
Downloads
How to Cite
License
Copyright (c) 2026 S. G. Sumana, T. M. Rajesh, S. G. Shaila

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.
