Metadata-Based Video Steganography: Development of a New Model for Secure Information Embedding
Received: 5 May 2025 | Revised: 3 July 2025 and 10 July 2025 | Accepted: 13 July 2025 | Online: 6 October 2025
Corresponding author: Dedi Darwis
Abstract
This study introduces a novel video steganography model called Video Steganography Technique in Metadata (VSTM), which embeds secret messages within the metadata of MP4 video files. By utilizing the 'comments' field in the metadata, the method ensures that the visual and audio quality of the video remains unaffected. This model offers original contributions in maintaining the integrity and resilience of digital data against common manipulations, such as cropping, rotation, and social media compression. The VSTM model combines the Advanced Encryption Standard (AES) for encryption and ZLIB for data compression, enhancing the security and optimizing the data size. The tests demonstrate that the VSTM model maintains perfect video fidelity with no detectable pixel changes and achieves a high level of robustness against various manipulations, including video cropping, rotation, resizing, and sharing through most social media platforms. The test results showed that the VSTM was able to maintain the integrity of the video files, had resistance to visible detection, and was effectively used for small-scale confidential communications. This model offers a practical and secure solution in the field of digital steganography, and has the potential to be applied to a wide range of data protection needs in sensitive digital environments. However, metadata stripping by certain platforms, such as Instagram, affects the message retrieval. The method proves effective and reliable in securing digital information within the video files while preserving quality and ensuring the message integrity.
Keywords:
Advanced Encryption Standard (AES), MP4, video steganography, Video Steganography Technique in Metadata (VSTM), ZLIBDownloads
References
T. Qiao, X. Luo, B. Pan, Y. Chen, and X. Wu, "Toward Steganographic Payload Location via Neighboring Weight Algorithm," Security and Communication Networks, vol. 2022, pp. 1–17, Feb. 2022.
A. Gupta, H. Shukla, and M. Gupta, "A secure image steganography using X86 assembly LSB," NEU Journal for Artificial Intelligence and Internet of Things, vol. 1, no. 1, pp. 38–47, 2022.
Z. Zhou et al., "Secret-to-Image Reversible Transformation for Generative Steganography," IEEE Transactions on Dependable and Secure Computing, vol. 20, no. 5, pp. 4118–4134, Sep. 2023.
B. Yamini and R. Sabitha, "Image steganalysis: real-time adaptive colour image segmentation for hidden message retrieval and Matthew’s correlation coefficient calculation," International Journal of Information and Computer Security, vol. 17, no. 1/2, p. 83, 2022.
H. G. Zaini, "Image Segmentation to Secure LSB2 Data Steganography," Engineering, Technology & Applied Science Research, vol. 11, no. 1, pp. 6632–6636, Feb. 2021.
N. Alsharari, "Integrating Blockchain Technology with Internet of things to Efficiency," International Journal of Technology, Innovation and Management (IJTIM), vol. 1, no. 2, pp. 01–13, Dec. 2021.
A. Munshi, "Randomly-based Stepwise Multi-Level Distributed Medical Image Steganography," Engineering, Technology & Applied Science Research, vol. 13, no. 3, pp. 10922–10930, Jun. 2023.
F. Al-Shaarani and A. Gutub, "Securing matrix counting-based secret-sharing involving crypto steganography," Journal of King Saud University - Computer and Information Sciences, vol. 34, no. 9, pp. 6909–6924, Oct. 2022.
T. AlKhodaidi and A. Gutub, "Refining image steganography distribution for higher security multimedia counting-based secret-sharing," Multimedia Tools and Applications, vol. 80, no. 1, pp. 1143–1173, Jan. 2021.
X. Lv and M. Li, "Application and Research of the Intelligent Management System Based on Internet of Things Technology in the Era of Big Data," Mobile Information Systems, vol. 2021, pp. 1–6, Jun. 2021.
J. Qin, Y. Luo, X. Xiang, Y. Tan, and H. Huang, "Coverless Image Steganography: A Survey," IEEE Access, vol. 7, pp. 171372–171394, 2019.
Z. Qu, H. Sun, and M. Zheng, "An efficient quantum image steganography protocol based on improved EMD algorithm," Quantum Information Processing, vol. 20, no. 2, Feb. 2021.
X. Duan, D. Guo, N. Liu, B. Li, M. Gou, and C. Qin, "A New High Capacity Image Steganography Method Combined With Image Elliptic Curve Cryptography and Deep Neural Network," IEEE Access, vol. 8, pp. 25777–25788, 2020.
D. Darwis, A. Thyo Priandika, A. Surahman, A. Ferico Octaviansyah Pasaribu, A. Junaidi, and Wamiliana, "Combination of Modified LSB Steganography and Huffman Compression for Data Security," in 2021 International Conference on Computer Science, Information Technology, and Electrical Engineering, Banyuwangi, Indonesia, Oct. 2021, pp. 218–224.
D. R. I. M. Setiadi, "PSNR vs SSIM: imperceptibility quality assessment for image steganography," Multimedia Tools and Applications, vol. 80, no. 6, pp. 8423–8444, Mar. 2021.
N. A. Taha, A. Al Saffar, A. A. Abdullatif, and F. A. Abdullatif, "Image Steganography using Dynamic Threshold based on Discrete Cosine Transform," Journal of Physics: Conference Series, vol. 1879, no. 2, May 2021, Art. no. 022087.
T. J. Siddiqui and A. Khare, "Chaos-based Video Steganography Method in Discrete Cosine Transform Domain," International Journal of Image and Graphics, vol. 21, no. 02, Apr. 2021, Art. no. 2150015.
M. Nazari and M. Mehrabian, "A novel chaotic IWT-LSB blind watermarking approach with flexible capacity for secure transmission of authenticated medical images," Multimedia Tools and Applications, vol. 80, no. 7, pp. 10615–10655, Mar. 2021.
M. Suresh and I. S. Sam, "Exponential fractional cat swarm optimization for video steganography," Multimedia Tools and Applications, vol. 80, no. 9, pp. 13253–13270, Apr. 2021.
T. T. K. Hue, N. T. Linh, M. Nguyen-Duc, and T. M. Hoang, "Data Hiding in Bit-plane Medical Image Using Chaos-based Steganography," in 2021 International Conference on Multimedia Analysis and Pattern Recognition (MAPR), Hanoi, Vietnam, Oct. 2021, pp. 1–6.
A. V. Sergeev and P. B. Khorev, "Overview on Hiding Data in Microsoft Office Documents," in 2021 3rd International Youth Conference on Radio Electronics, Electrical and Power Engineering, Moscow, Russia, Mar. 2021, pp. 1–4.
R. Wazirali, Z. Chaczko, and J. Gibbon, "Steganographic Image Sharing App," in 2017 25th International Conference on Systems Engineering (ICSEng), Las Vegas, NV, Aug. 2017, pp. 494–499.
L. Hartmann and S. Wendzel, "How Feasible are Steganographic and Stealth Attacks on TIA Project Metadata of ICS: A Case Study with Real-world Data," in European Interdisciplinary Cybersecurity Conference, Virtual Event Romania, Nov. 2021, pp. 83–84.
C. M. Kondasinghe, "A System to Preserve Metadata using Steganography," M. S. Thesis, University of Colombo School of Computing, Colombo, Sri Lanka, 2017.
H. Jain, "Constant Sound Steganography," The American Journal of Interdisciplinary Innovations and Research, vol. 03, no. 07, pp. 5–9, Jul. 2021.
S. D. Muyco and A. A. Hernandez, "A Modified Hash Based Least Significant Bits Algorithm for Steganography," in Proceedings of the 2019 4th International Conference on Big Data and Computing, Guangzhou, China, 2019, pp. 215–220.
R. Rejani, D. Murugan, and D. V. Krishnan, "Pixel Pattern Based Steganography on Images," ICTACT Journal on Image and Video Processing, vol. 5, no. 3, pp. 991–997, Feb. 2015.
N. A. Al-Juaid, A. A. Gutub, and E. A. Khan, "Enhancing PC Data Security via Combining RSA Cryptography and Video Based Steganography," Journal of Information Security and Cybercrimes Research, vol. 1, no. 1, pp. 5–13, 2018.
B. S. Shashikiran, K. Shaila, and K. R. Venugopal, "Minimal Block Knight’s Tour and Edge with LSB Pixel Replacement Based Encrypted Image Steganography," SN Computer Science, vol. 2, no. 3, May 2021, Art. no. 139.
A. Sweigart, Hacking Secret Ciphers with Python: a beginner’s guide to cryptography and computer programming with Python, 1. ed. Scotts Valley, California, US: Createspace, 2013.
H. K. Tayyeh and A. S. Ahmed AL-Jumaili, "A combination of least significant bit and deflate compression for image steganography," International Journal of Electrical and Computer Engineering (IJECE), vol. 12, no. 1, Feb. 2022, Art. no. 358.
S. Moufid, F. Z. Lachgar, C. El Ainzroudi, and A. A. Ben El Arbi, "Improving Steganography using Image Compression JPEG," in 2021 15th International Conference on Advanced Technologies, Systems and Services in Telecommunications, Nis, Serbia, Oct. 2021, pp. 405–410.
S. Roy and Md. M. Islam, "A Hybrid Secured Approach Combining LSB Steganography and AES Using Mosaic Images for Ensuring Data Security," SN Computer Science, vol. 3, no. 2, Mar. 2022, Art. no. 153.
C. A. Sari, G. Ardiansyah, D. R. I. M. Setiadi, and E. H. Rachmawanto, "An improved security and message capacity using AES and Huffman coding on image steganography," TELKOMNIKA (Telecommunication Computing Electronics and Control), vol. 17, no. 5, Oct. 2019, Art. no. 2400.
E. Hartnett, C. S. Zender, W. Fisher, and D. Heimbigner, "Quantization and Next-Generation Zlib Compression for Fully Backward-Compatible, Faster, and More Effective Data Compression in NetCDF Files," in AGU Fall Meeting 2021, New Orleans, LA, Dec. 2021, pp. IN15A-05.
A. P. Maulidina, R. A. Wijaya, K. Mazel, and M. S. Astriani, "Comparative Study of Data Compression Algorithms: Zstandard, zlib & LZ4," in Communications in Computer and Information Science, Cham: Springer Nature Switzerland, 2024, pp. 394–406.
E. S. B. Hureib and A. A. Gutub, "Enhancing Medical Data Security via Combining Elliptic Curve Cryptography with 1-LSB and 2-LSB Image Steganography," International Journal of Computer Science and Network Security, vol. 20, no. 12, pp. 232–241, Dec. 2020.
A. Gutub and F. Al-Shaarani, "Efficient Implementation of Multi-image Secret Hiding Based on LSB and DWT Steganography Comparisons," Arabian Journal for Science and Engineering, vol. 45, no. 4, pp. 2631–2644, Apr. 2020.
B. O. Al-Roithy and A. A. Gutub, "Trustworthy image security via involving binary and chaotic gravitational searching within PRNG selections," International Journal of Computer Science and Network Security, vol. 20, no. 12, pp. 167–176, Dec. 2020.
A. A.-A. Gutub, "Adopting counting-based secret-sharing for e-Video Watermarking allowing Fractional Invalidation," Multimedia Tools and Applications, vol. 81, no. 7, pp. 9527–9547, Mar. 2022.
Z. Saeidi, A. Yazdi, S. Mashhadi, M. Hadian, and A. Gutub, "High performance image steganography integrating IWT and Hamming code within secret sharing," IET Image Processing, vol. 18, no. 1, pp. 129–139, Jan. 2024.
Z. Y. Hasan and A. K. Idrees, "EDiTOK: Energy-Efficient Distributed Transmission Optimization-Based Kalman–Zlib Approaches for Monitoring Smart Farming Irrigation in Internet of Things Networks," in Lecture Notes in Networks and Systems, Singapore: Springer Nature Singapore, 2024, pp. 117–130.
J. M. Reddy, A. Voma, and P. Themdeo, "Audio Steganography Using Multi-Level DWT to Improve PSNR, Hiding Capacity and Imperceptibility," in Algorithms for Intelligent Systems, Singapore: Springer Singapore, 2021, pp. 309–314.
I. A. Sabilla, M. Meirisdiana, D. Sunaryono, and M. Husni, "Best Ratio Size of Image in Steganography using Portable Document Format with Evaluation RMSE, PSNR, and SSIM," in 2021 4th International Conference of Computer and Informatics Engineering, Depok, Indonesia, Sep. 2021, pp. 289–294.
S.M. Affiq, S. I. Shaiden, and K. Subramaniam, "Android based Digital Steganography Application using LSB and PSNR Algorithm in Mobile Environment," Evergreen, vol. 8, no. 2, pp. 421–427, Jun. 2021.
H. Paraskevov, S. Zhelezov, and B. Uzunova-Dimitrova, "Robustness of the secret message in stego file against flip and rotation attack," Annals of the Academy of Romanian Scientists: Series on Mathematics and its Applications, vol. 9, no. 1, pp. 5–16, Aug. 2025.
Downloads
How to Cite
License
Copyright (c) 2025 Dedi Darwis, Yusra Fernando, Abhishek R. Mehta, Wamiliana, Setiawansyah

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.