INTELLIGENT METHODS OF VIDEO STREAM ANALYSIS FOR DETECTING HIDDEN MESSAGES

Authors

DOI:

https://doi.org/10.35546/kntu2078-4481.2025.3.2.57

Keywords:

steganography, cybersecurity, computer vision, multimodal analysis, deep learning, artificial intelligence, information security

Abstract

The relevance of this study is determined by the rapid growth of video data volumes and the increasing sophistication of steganographic methods, which pose significant risks to information security and undermine the effectiveness of traditional monitoring tools. Conventional digital signal processing algorithms fail to provide sufficient accuracy and robustness in detecting hidden messages, particularly in the presence of noise interference and dynamically changing data streams. This necessitates the implementation of intelligent approaches that integrate methods of computer vision, machine learning, and multimodal analysis.The purpose of the article is to substantiate and develop intelligent methods of video stream analysis for detecting hidden messages, thereby enhancing the protection of the information environment and improving the efficiency of modern artificial intelligence algorithms under growing cyber threats.The research methodology is based on the integration of system analysis of video streams, machine learning techniques, deep neural networks, and multimodal data processing approaches. It applies principles of combining computer vision algorithms with classification models, including convolutional and recurrent networks, as well as transformer-based attention mechanisms. A comparative analysis of the effectiveness of different architectures was carried out, along with real-time system modeling and assessment of their resistance to manipulations.The results demonstrate the applicability of both traditional and intelligent methods for identifying hidden signals.The study confirms that deep learning and multimodal systems provide significantly higher accuracy and adaptability compared to traditional approaches. It was established that integrated architectures analyze spatial, temporal, and contextual video characteristics, creating prerequisites for improving the detection of hidden messages in cybersecurity, border control, and critical infrastructure monitoring.The conclusions confirm that the application of intelligent video stream analysis methods overcomes the limitations of traditional solutions and significantly strengthens information security. At the same time, key implementation challenges were identified, including high computational costs, a shortage of annotated multimodal data, low interpretability of results, and vulnerability to adversarial attacks.Future research prospects are linked to the development of adaptive architectures based on continual learning and federated learning, model optimization for energy-efficient functioning, the introduction of explainable AI to increase algorithm transparency, and the creation of unified protocols for integration with other cybersecurity tools. These advancements are expected to shape a new generation of intelligent video analysis systems capable of effectively responding to current and future information threats.

References

Horbenko Y. Confidential Computing in Front-End: Enhancing Data Security with Secure Enclaves and Homomorphic Encryption. International Journal of Advanced Multidisciplinary Research and Studies. 2025. Vol. 5, № 3. P. 308-321. URL: https://www.multiresearchjournal.com/admin/uploads/archives/archive-1747130538.pdf (date of access: 27.09.2025).

Wan S., Xu X., Wang T., Gu Z. An Intelligent Video Analysis Method for Abnormal Event Detection in Intelligent Transportation Systems. IEEE Transactions on Intelligent Transportation Systems. 2021. Vol. 22, № 7. P. 4487–4495. DOI: https://doi.org/10.1109/TITS.2020.3017505

Meghanathan N., Nayak L. Steganalysis algorithms for detecting the hidden information in image, audio and video cover media. International Journal of Network Security & Its Application (IJNSA). 2010. Vol. 2, № 1. P. 43–55. DOI: https://doi.org/10.5121/ijnsa.2010.2104

Dalal M., Juneja M. A survey on information hiding using video steganography. Artificial Intelligence Review. 2021. Vol. 54. P. 5831–5895. DOI: https://doi.org/10.1007/s10462-021-09988-9

Aberna P., Agilandeeswari L. Survey of Digital Video Watermarking Techniques and Attacks. Wireless Personal Communications. 2021. Vol. 121. P. 3049–3082. DOI: https://doi.org/10.1007/s11277-021-08430-8

Nazah S., Huda S., Abawajy J., Hassan M. M. Evolution of Dark Web Threats: Social Engineering, Phishing and Cybercrime. IEEE Access. 2019. Vol. 7. P. 102021–102029. DOI: https://doi.org/10.1109/ACCESS.2019.2931097

Song L., Licoppe C. A multimodal approach to the sequential analysis of video streams closures. Social Interaction. Video-Based Studies of Human Sociality. 2020. Vol. 3, № 3. P. 1–24. DOI: https://doi.org/10.7146/si.v3i3.120547

Dhawan S., Gupta R. Steganography: An Overview. International Journal of Advanced Research in Computer Science and Software Engineering. 2012. Vol. 2, № 10. P. 237–240. DOI: https://doi.org/10.1007/s10462-021-09968-0

Huang R., Wu H., Wang X., Cheng G., Hu X. Security Analysis of Video Identification Protocols for Instant Messaging Systems. Security and Communication Networks. 2018. Vol. 2018. P. 1–11. DOI: https://doi.org/10.1155/2018/3071247

Dalal M., Juneja M. Information Hiding Techniques for Steganography and Steganalysis. Multimedia Tools and Applications. 2022. Vol. 81. P. 37953–37989. DOI: https://doi.org/10.1007/s11042-022-12722-2.

Subramanian N., Elharrouss O., Al-Maadeed S., Bouridane A. Image Steganography: A Review of the Recent Advances. IEEE Access. 2021. Vol. 9. P. 23409–23423. DOI: https://doi.org/10.1109/ACCESS.2021.3053998

Wahab O. F. A., Khalaf A. A. M., Hussein A. I., Hamed H. F. A. A Secure and High Capacity RSA-Based Video Steganography Technique Using Lempel–Ziv–Welch Algorithm. Multimedia Tools and Applications. 2022. Vol. 81. P. 1637–1662. DOI: https://doi.org/10.1007/s11042-021-11693-7

Sun Z., Sarma P., Sethares W., Liang Y. Learning Relationships between Text, Audio, and Video via Deep Canonical Correlation for Multimodal Clustering. Proceedings of the AAAI Conference on Artificial Intelligence. 2021. Vol. 35, № 5. P. 4596–4604. DOI: https://doi.org/10.1609/aaai.v35i5.16539

Yu C., Zhang X., Zhang X., Li G., Tang Z. Reversible Data Hiding in Encrypted Images Based on Multi- Level Hierarchical Embedding. Signal Processing. 2021. Vol. 178. Article 107794. DOI: https://doi.org/10.1016/j.sigpro.2020.107794

Xiao P., Xiao M., Cai N., Qiu B., Zhou S., Wang H. Adaptive Hybrid Framework for Multiscale Void Inspection of Chip Resistor Solder Joints. IEEE Transactions on Instrumentation and Measurement. 2023. Vol. 72. P. 1–12. DOI: https://doi.org/10.1109/TIM.2023.3235435

Published

2025-11-28