Skip to main content
Log in

An efficient Sheep Flock Optimization-based hybrid deep RaNN for secure and enhanced video transmission quality

  • Original Article
  • Published:
Neural Computing and Applications Aims and scope Submit manuscript

Abstract

Video communication gained wide popularity since it offers a more real-time mode of face-to-face interaction. This paper mainly aims to enhance the video transmission quality of multimedia applications via communication network security improvement and an adaptive resource allocation strategy. The main aim of the resource allocation strategy is to achieve efficient usage of spectrum resources since video communication utilizes the orthogonal subcarriers for data transmission and the need for conversion of non-flat channels to flat. An optimized Hybrid Deep Random Neural Network (HDRaNN) architecture is used to overcome the adaptive spectrum resource allocation problem in the single-frequency network transmission by taking into account the different time–frequency resources and regions for overlapping areas and the same time–frequency for non-overlapping areas. The Sheep Flock Optimization algorithm is used to minimize the network error rate of the HDRaNN architecture by optimizing the weights and biases. The basic purpose of communication network security in this paper is to ensure that data communicated over a network connection are safe and secure. The network security protocol offers protection from unauthorized data retrieval and attempts to obtain data. The protocols utilized for secure communication in the proposed technique are Secure Hypertext Transfer Protocol, Secure Socket Layer, Simple Network Management Protocol, and Secure File Transfer Protocol. This protocol also assures that unauthorized users, devices, or services do not have access to your network data and works on all network mediums and data types. The extensive experiments conducted using the proposed methodology show improvements in the video transmission quality in terms of high diversity gain, security, increased throughput, and minimized bit error rate.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

Availability of data and materials

Data sharing is not applicable to this article as no new data were created or analyzed in this study.

Code availability

Not applicable.

References

  1. Kagita MK, Thilakarathne N, Gadekallu TR, Maddikunta PKR (2022) A review on security and privacy of internet of medical things. In: Intelligent Internet of Things for Healthcare and Industry. Springer, Cham, pp 171–187

  2. Moslehi S, Aubrey-Jones D, Knowles M, Obeney-Williams J, Leveson S, Aref-Adib G (2021) Cyberpsychiatry versus COVID-19: using video consultation to improve clinical care in an in-patient psychiatric unit. BJPsych Int. https://doi.org/10.1192/bji.2021.19

    Article  Google Scholar 

  3. Gilbert AW, Booth G, Betts T, Goldberg A (2021) A mixed-methods survey to explore issues with virtual consultations for musculoskeletal care during the COVID-19 pandemic. BMC Musculoskelet Disord 22(1):1–10

    Article  Google Scholar 

  4. Dar K, Bakhouya M, Gaber J, Wack M, Lorenz P (2010) Wireless communication technologies for ITS applications [Topics in Automotive Networking]. IEEE Commun Mag 48(5):156–162

    Article  Google Scholar 

  5. Qiao J, He Y, Shen XS (2018) Improving video streaming quality in 5G enabled vehicular networks. IEEE Wirel Commun 25(2):133–139

    Article  Google Scholar 

  6. Park C, Kim DG, Cho S, Han HJ (2019) Adoption of multimedia technology for learning and gender difference. Comput Hum Behav 92:288–296

    Article  Google Scholar 

  7. Naseer Y, Shah D, Shah T (2019) A novel approach to improve multimedia security utilizing 3D mixed chaotic map. Microprocess Microsyst 65:1–6

    Article  Google Scholar 

  8. Ma S, Zhang T, Wu A, Zhao X (2019) Lightweight and privacy-preserving data aggregation for mobile multimedia security. IEEE Access 7:114131–114140

    Article  Google Scholar 

  9. Stooke A, Achiam J, Abbeel P (2020) Responsive safety in reinforcement learning by pid lagrangian methods. In: International Conference on Machine Learning. PMLR, pp 9133–9143

  10. Guangzhi W (2021) Application of adaptive resource allocation algorithm and communication network security in improving educational video transmission quality. Alex Eng J 60(5):4231–4241

    Article  Google Scholar 

  11. Comşa IS, Molnar A, Tal I, Bergamin P, Muntean GM, Muntean CH, Trestian R (2021) A machine learning resource allocation solution to improve video quality in remote education. IEEE Trans Broadcast 67(3):664–684

    Article  Google Scholar 

  12. Chen J, Wu H, Lyu F, Yang P, Li Q, Shen X (2021) Adaptive resource allocation for diverse safety message transmissions in vehicular networks. IEEE Trans Intell Transp Syst. https://doi.org/10.1109/TITS.2021.3124752

    Article  Google Scholar 

  13. Yu J, Ye X, Li H (2022) A high precision intrusion detection system for network security communication based on multi-scale convolutional neural network. Futur Gener Comput Syst 129:399–406

    Article  Google Scholar 

  14. Li Q, Deng X, Liu Z, Yang Y, Zou X, Wang Q, Xu M, Wu J (2022) Dynamic network security function enforcement via joint flow and function scheduling. IEEE Trans Inf Forensics Secur. https://doi.org/10.1109/TIFS.2022.3142995

    Article  Google Scholar 

  15. Jothi S, Chandrasekar A (2022) An efficient modified dragonfly optimization based MIMO-OFDM for enhancing QoS in wireless multimedia communication. Wirel Pers Commun 122(2):1043–1065

    Article  Google Scholar 

  16. Madarasingha C, Muramudalige SR, Jourjon G, Jayasumana A, Thilakarathna K (2022) VideoTrain++: GAN-based adaptive framework for synthetic video traffic generation. Comput Netw 206:108785

    Article  Google Scholar 

  17. Pérez-Bueno F, García L, Maciá-Fernández G, Molina R (2022) Leveraging a probabilistic PCA model to understand the multivariate statistical network monitoring framework for network security anomaly detection. IEEE/ACM Trans Netw. https://doi.org/10.1109/TNET.2021.3138536

    Article  Google Scholar 

  18. Reyes RR, Bauschert T (2017) Adaptive and state-dependent online resource allocation in dynamic optical networks. J Opt Commun Netw 9(3):B64–B77

    Article  Google Scholar 

  19. Kwon T, Cho DH (2008) Adaptive-modulation-and-coding-based transmission of control messages for resource allocation in mobile communication systems. IEEE Trans Veh Technol 58(6):2769–2782

    Article  Google Scholar 

  20. Hadi M, Pakravan MR, Agrell E (2019) Dynamic resource allocation in metro elastic optical networks using Lyapunov drift optimization. J Opt Commun Netw 11(6):250–259

    Article  Google Scholar 

  21. Tang L, Tan QI, Shi Y, Wang C, Chen Q (2018) Adaptive virtual resource allocation in 5G network slicing using constrained Markov decision process. IEEE Access 6:61184–61195

    Article  Google Scholar 

  22. Tang L, He X, Yang X, Wei Y, Wang X, Chen Q (2019) ARMA-prediction-based online adaptive dynamic resource allocation in wireless virtualized network. IEEE Access 7:130438–130450

    Article  Google Scholar 

  23. Singkibud P, Mukdasai K (2022) Robust passivity analysis of uncertain neutral-type neural networks with distributed interval time-varying delay under the effects of leakage delay. Int J Math Comput Sci 26:269–290

    Google Scholar 

  24. Kumar P, Panwar V (2022) Wavelet neural network based controller design for non-affine nonlinear systems. J Math Comput Sci 24(1):49–58

    Article  Google Scholar 

  25. Mahmood K, Akram W, Shafiq A, Altaf I, Lodhi MA, Islam SH (2020) An enhanced and provably secure multi-factor authentication scheme for Internet-of-Multimedia-Things environments. Comput Electr Eng 88:106888

    Article  Google Scholar 

  26. Almasalha F, Naït-Abdesselam F, Trajcevski G, Khokhar A (2018) Secure transmission of multimedia contents over low-power mobile devices. J Inf Secur Appl 40:183–192

    Google Scholar 

  27. Xiao K (2021) Construction of embedded secure terminal and multimedia database based on trusted computing technology and wireless network. Alex Eng J 60(5):4223–4230

    Article  Google Scholar 

  28. Mishra D, Rana S (2021) A provably secure content distribution framework for portable DRM systems. J Inf Secur Appl 61:102928

    Google Scholar 

  29. Abunadi I, Abdullah Mengash HS, Alotaibi S, Asiri MM, Ahmed Hamza M, Zamani AS, Motwakel A, Yaseen I (2022) Optimal multikey homomorphic encryption with steganography approach for multimedia security in internet of everything environment. Appl Sci 12(8):4026

    Article  Google Scholar 

  30. Nassar SS, El-Bendary MA (2022) Confidentiality considerations: multimedia signals transmission over different wireless channels utilized efficient secured model. Multimed Tools Appl. https://doi.org/10.1007/s11042-022-12297-1

    Article  Google Scholar 

  31. Sharma N, Chakraborty C, Kumar R (2022) Optimized multimedia data through computationally intelligent algorithms. Multimed Syst. https://doi.org/10.1007/s00530-022-00918-6

    Article  Google Scholar 

  32. Huma ZE, Latif S, Ahmad J, Idrees Z, Ibrar A, Zou Z, Alqahtani F, Baothman F (2021) A hybrid deep random neural network for cyberattack detection in the industrial internet of things. IEEE Access 9:55595–55605

    Article  Google Scholar 

  33. Suresh S, Dong K, Kim HJ (2010) A sequential learning algorithm for self-adaptive resource allocation network classifier. Neurocomputing 73(16–18):3012–3019

    Article  Google Scholar 

  34. Kivi ME, Majidnezhad V (2022) A novel swarm intelligence algorithm inspired by the grazing of sheep. J Ambient Intell Humaniz Comput 13(2):1201–1213

    Article  Google Scholar 

  35. Radley S (2020) Programmed routing in the direction of MST by virtue of port dependent decision device. i-Manager’s J Commun Eng Syst 9(1):8

    Google Scholar 

  36. Banerjee S, Patil A, Jadhav D, Borkar G (2022) Digital forensics as a service: analysis for forensic knowledge. In: Cyber security and digital forensics, pp127–162

  37. Bitton R, Shabtai A (2019) A machine learning-based intrusion detection system for securing remote desktop connections to electronic flight bag servers. IEEE Trans Dependable Secure Comput 18(3):1164–1181

    Article  Google Scholar 

  38. Li J, Jia Y, Liu L, Wo T (2013) CyberLiveApp: a secure sharing and migration approach for live virtual desktop applications in a cloud environment. Futur Gener Comput Syst 29(1):330–340

    Article  Google Scholar 

  39. Zhang Y, Li P, Wang D, Zheng W (2006) Seamless peripherals integration for network computers based on the reversed server message block protocol. In: International conference on Networking and Services (ICNS'06). IEEE, pp 112–112

Download references

Funding

Not applicable.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to R. B. Benisha.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Consent to participate

Not applicable.

Consent for publication

Not applicable.

Human and animal rights

This article does not contain any studies with human or animal subjects performed by any of the authors.

Informed consent

Informed consent was obtained from all individual participants included in the study.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Benisha, R.B. An efficient Sheep Flock Optimization-based hybrid deep RaNN for secure and enhanced video transmission quality. Neural Comput & Applic 35, 8065–8080 (2023). https://doi.org/10.1007/s00521-022-08083-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00521-022-08083-7

Keywords