Abstract
In the digital era, security is a challenging problem due to the drastic increase in the utilization of the Internet, personal computers, smartphones, etc. for communication purposes. A major issue in the data hiding process lies in the way of embedding the secure data by maintaining the quality of a cover object that necessitates complex techniques that conceal a massive quantity of payload and the robustness of these approaches over hackers. Video steganography is considered an effective way of securing data transmission, which encompasses two processes namely embedding and extraction. Several existing video steganography techniques hide the secret message with no selection of optimal pixels where the proper choice of pixels to hide data helps to improve quality and robustness. Therefore, this article introduces novel encryption with bacterial foraging optimization algorithm-based pixel selection scheme for video steganography (EBFOA-PSVS) technique. The hidden message will be successfully concealed in the cover video utilizing the proposed EBFOA-PSVS technique, which also uses the best possible BFOA pixel selection. The best pixels are then chosen using BFOA to produce the highest peak signal-to-noise ratio (PSNR). Finally, the cover video contains the hidden image that has been encrypted. The EBFOA-PSVS approach has improved in terms of various parameters, according to a thorough comparison investigation of the findings on benchmark test movies.
Similar content being viewed by others
Data availability
Data sharing is not applicable to this article as no datasets were generated or analyzed during the current study.
References
Beenish M, Faruqui RA (2008) A steganography implementation. In: IEEE international symposium biometrics and security technologies; p. 1–5
Berlin MA, Tripathi S et al (2021) IoT-based traffic prediction and traffic signal control system for smart city. Soft Comput 25:12241–12248. https://doi.org/10.1007/s00500-021-05896-x
Beulah JR, Subramani N, Mohan P, Harshavardhan A, Sivabalaselvamani D (2021) An automated learning model for sentiment analysis and data classification of Twitter data using balanced CA-SVM. Concurr Eng 29:386–339. https://doi.org/10.1177/1063293X211031485
Bharadwaj R, Sharma V (2016) Image steganography based on complemented message and inverted bit LSB substitution. Procedia Comput Sci 93:832–838
Celik M, Sharma G, Tekalp AM, Saber E (2002) Reversible data hiding. In: International conference on image processing, New York
Chaudhary A, Chaube MK (2018) Hiding MP3 in colour image using whale optimization. ACM Int. Conf. Proceeding Ser., https://doi.org/10.1145/3271553.3271588
Chen H, Zhang Q, Luo J, Xu Y, Zhang X (2020) An enhanced bacterial foraging optimization and its application for training kernel extreme learning machine. Appl Soft Comput 86:105884
Dixit M, Bhide N, Khankhoje S, Ukarande R, (2015, January) Video steganography. In: 2015 international conference on pervasive computing (ICPC). IEEE. pp. 1-4
Gowshika U, ShaloomImmulicate D, SathiyaPriya S (2015) Analysis of Defect in Dental Using Image Processing. Int J Appl Eng Res, ISSN: 0973–4562 10(9):8125–8129
Ibrahim A, Anayi F, Packianather M, Alomari OA (2022) New Hybrid Invasive Weed Optimization and Machine Learning Approach for Fault Detection. Energies 15(4). https://doi.org/10.3390/en15041488
Jose A, Subramaniam K (2020) DNA based SHA512-ECC cryptography and CM-CSA based steganography for data security. Materials Today: Proceedings
Liao X, Shu C (2015) Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels. J Vis Commun Image Represent 28:21–27. https://doi.org/10.1016/j.jvcir.2014.12.007
Liao X, Li K, Yin J (2017) Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform. Multimed Tools Appl 76(20):20739–20753. https://doi.org/10.1007/s11042-016-3971-4
Liao X, Qin Z, Ding L (2017) Data embedding in digital images using critical functions. Signal Process Image Commun 58:146–156. https://doi.org/10.1016/j.image.2017.07.006
Liu Y, Liu S, Wang Y, Zhao H, Liu S (2019) Video steganography: a review. Neurocomputing 335:238–250
Manisha S, Sharmila TS (2019) A two-level secure data hiding algorithm for video steganography. Multidim Syst Sign Process 30(2):529–542
Mstafa RJ, Elleithy KM (2014, May) A highly secure video steganography using hamming code (7, 4). In: IEEE Long Island systems, applications and technology (LISAT) conference 2014. IEEE. pp. 1-6
Nipanikar SI, Deepthi VH, Kulkarni N (2017) A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria Eng J 77:26135–26172
Ntalianis K, Tsapatsoulis N (2016) Remote authentication via biometrics: a robust video object steganographic mechanism over wireless networks. IEEE Trans Emerg Top Comput 4(1):156–174
Ozcan C, Kemal T (2017) Comparison of LSB image steganography technique in different color spaces. In: 2017 international artificial intelligence and data processing symposium (IDAP). IEEE. pp. 1–6
Passino KM (2010) Bacterial foraging optimization. Int J Swarm Intell Res (IJSIR) 1(1):1–16
Paulraj D (2020, April 2020) An Automated Exploring And Learning Model For Data Prediction Using Balanced CA-SVM. J Ambient Intell Humaniz Comput 12(5). https://doi.org/10.1007/s12652-020-01937-9
Rajalakshmi K, Mahesh K (2018) Robust secure video steganography using reversible patch-wise code-based embedding. Multimed Tools Appl 77(20):27427–27445
Ramalingam M, Isa NAM (2016) A data-hiding technique using scene-change detection for video steganography. Comput Electr Eng 54:423–434
Roselinkiruba R, Sharmila TS (2021) Performance evaluation of encryption algorithm using fruit fly optimization improved hybridized seeker and PVD algorithm. Int J Inf Technol 13(5):1797–1803
Shabir A, Parah JA, Abdul MH, Bhat G (2014) Data hiding in scrambled images: a new double layer security data hiding technique. Comput Electr Eng 40(1):70–82
Sharath MN, Rajesh TM, Patil M (2022) Design of optimal metaheuristics based pixel selection with homomorphic encryption technique for video steganography. Int J Inf Tecnol 14:2265–2274. https://doi.org/10.1007/s41870-022-01005-9
Suresh M, Sam IS (2020) Optimized interesting region identification for video steganography using fractional Grey wolf optimization along with multi-objective cost function. J King Saud Univ - Comput Inf Sci 34:3489–3496
Suresh M, Shatheesh Sam I (2020) Optimized interesting region identification for video steganography using fractional Grey wolf optimization along with multi-objective cost function. J King Saud Univ - Comput Inf Sci. https://doi.org/10.1016/j.jksuci.2020.08.007
Vital-Soto A, Azab A, Baki MF (2020) Mathematical modeling and a hybridized bacterial foraging optimization algorithm for the flexible job-shop scheduling problem with sequencing flexibility. J Manuf Syst 54:74–93
Younus ZS, Younus GT (2020) Video steganography using knight tour algorithm and LSB method for encrypted data. J Intell Syst 29(1):1216–1225
Acknowledgements
We thank the anonymous referees for their useful suggestions.
Funding
This work has no funding resource.
Author information
Authors and Affiliations
Contributions
All authors contributed to the study conception and design. Material preparation, data collection and analysis were performed by *1Sharath M N, 2Dr. Rajesh T M, 3Dr.Mallanagouda Patil. The first draft of the manuscript was written by *1Sharath M N and all authors commented on previous versions of the manuscript.
All authors read and approved the final manuscript.
Corresponding author
Ethics declarations
Ethics approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Consent of publication
Not applicable.
Conflict of interest
The authors declare that they have no conflict of interest.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Sharath, M.N., Rajesh, T.M. & Patil, M. A novel encryption with bacterial foraging optimization algorithm based pixel selection scheme for video steganography. Multimed Tools Appl 82, 25197–25216 (2023). https://doi.org/10.1007/s11042-023-14420-2
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-023-14420-2