Skip to main content

Advertisement

Log in

A novel encryption with bacterial foraging optimization algorithm based pixel selection scheme for video steganography

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

    We’re sorry, something doesn't seem to be working properly.

    Please try refreshing the page. If that doesn't work, please contact support so we can address the problem.

Abstract

In the digital era, security is a challenging problem due to the drastic increase in the utilization of the Internet, personal computers, smartphones, etc. for communication purposes. A major issue in the data hiding process lies in the way of embedding the secure data by maintaining the quality of a cover object that necessitates complex techniques that conceal a massive quantity of payload and the robustness of these approaches over hackers. Video steganography is considered an effective way of securing data transmission, which encompasses two processes namely embedding and extraction. Several existing video steganography techniques hide the secret message with no selection of optimal pixels where the proper choice of pixels to hide data helps to improve quality and robustness. Therefore, this article introduces novel encryption with bacterial foraging optimization algorithm-based pixel selection scheme for video steganography (EBFOA-PSVS) technique. The hidden message will be successfully concealed in the cover video utilizing the proposed EBFOA-PSVS technique, which also uses the best possible BFOA pixel selection. The best pixels are then chosen using BFOA to produce the highest peak signal-to-noise ratio (PSNR). Finally, the cover video contains the hidden image that has been encrypted. The EBFOA-PSVS approach has improved in terms of various parameters, according to a thorough comparison investigation of the findings on benchmark test movies.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Flowchart 1
Flowchart 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

Data availability

Data sharing is not applicable to this article as no datasets were generated or analyzed during the current study.

References

  1. Beenish M, Faruqui RA (2008) A steganography implementation. In: IEEE international symposium biometrics and security technologies; p. 1–5

  2. Berlin MA, Tripathi S et al (2021) IoT-based traffic prediction and traffic signal control system for smart city. Soft Comput 25:12241–12248. https://doi.org/10.1007/s00500-021-05896-x

    Article  Google Scholar 

  3. Beulah JR, Subramani N, Mohan P, Harshavardhan A, Sivabalaselvamani D (2021) An automated learning model for sentiment analysis and data classification of Twitter data using balanced CA-SVM. Concurr Eng 29:386–339. https://doi.org/10.1177/1063293X211031485

    Article  Google Scholar 

  4. Bharadwaj R, Sharma V (2016) Image steganography based on complemented message and inverted bit LSB substitution. Procedia Comput Sci 93:832–838

    Article  Google Scholar 

  5. Celik M, Sharma G, Tekalp AM, Saber E (2002) Reversible data hiding. In: International conference on image processing, New York

  6. Chaudhary A, Chaube MK (2018) Hiding MP3 in colour image using whale optimization. ACM Int. Conf. Proceeding Ser., https://doi.org/10.1145/3271553.3271588

  7. Chen H, Zhang Q, Luo J, Xu Y, Zhang X (2020) An enhanced bacterial foraging optimization and its application for training kernel extreme learning machine. Appl Soft Comput 86:105884

    Article  Google Scholar 

  8. Dixit M, Bhide N, Khankhoje S, Ukarande R, (2015, January) Video steganography. In: 2015 international conference on pervasive computing (ICPC). IEEE. pp. 1-4

  9. Gowshika U, ShaloomImmulicate D, SathiyaPriya S (2015) Analysis of Defect in Dental Using Image Processing. Int J Appl Eng Res, ISSN: 0973–4562 10(9):8125–8129

    Google Scholar 

  10. http://cvlab.hanyang.ac.kr/tracker_benchmark/datasets.html

  11. Ibrahim A, Anayi F, Packianather M, Alomari OA (2022) New Hybrid Invasive Weed Optimization and Machine Learning Approach for Fault Detection. Energies 15(4). https://doi.org/10.3390/en15041488

  12. Jose A, Subramaniam K (2020) DNA based SHA512-ECC cryptography and CM-CSA based steganography for data security. Materials Today: Proceedings

  13. Liao X, Shu C (2015) Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels. J Vis Commun Image Represent 28:21–27. https://doi.org/10.1016/j.jvcir.2014.12.007

    Article  Google Scholar 

  14. Liao X, Li K, Yin J (2017) Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform. Multimed Tools Appl 76(20):20739–20753. https://doi.org/10.1007/s11042-016-3971-4

    Article  Google Scholar 

  15. Liao X, Qin Z, Ding L (2017) Data embedding in digital images using critical functions. Signal Process Image Commun 58:146–156. https://doi.org/10.1016/j.image.2017.07.006

    Article  Google Scholar 

  16. Liu Y, Liu S, Wang Y, Zhao H, Liu S (2019) Video steganography: a review. Neurocomputing 335:238–250

    Article  Google Scholar 

  17. Manisha S, Sharmila TS (2019) A two-level secure data hiding algorithm for video steganography. Multidim Syst Sign Process 30(2):529–542

    Article  MATH  Google Scholar 

  18. Mstafa RJ, Elleithy KM (2014, May) A highly secure video steganography using hamming code (7, 4). In: IEEE Long Island systems, applications and technology (LISAT) conference 2014. IEEE. pp. 1-6

  19. Nipanikar SI, Deepthi VH, Kulkarni N (2017) A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria Eng J 77:26135–26172

    Google Scholar 

  20. Ntalianis K, Tsapatsoulis N (2016) Remote authentication via biometrics: a robust video object steganographic mechanism over wireless networks. IEEE Trans Emerg Top Comput 4(1):156–174

    Article  Google Scholar 

  21. Ozcan C, Kemal T (2017) Comparison of LSB image steganography technique in different color spaces. In: 2017 international artificial intelligence and data processing symposium (IDAP). IEEE. pp. 1–6

  22. Passino KM (2010) Bacterial foraging optimization. Int J Swarm Intell Res (IJSIR) 1(1):1–16

    Article  MathSciNet  Google Scholar 

  23. Paulraj D (2020, April 2020) An Automated Exploring And Learning Model For Data Prediction Using Balanced CA-SVM. J Ambient Intell Humaniz Comput 12(5). https://doi.org/10.1007/s12652-020-01937-9

  24. Rajalakshmi K, Mahesh K (2018) Robust secure video steganography using reversible patch-wise code-based embedding. Multimed Tools Appl 77(20):27427–27445

    Article  Google Scholar 

  25. Ramalingam M, Isa NAM (2016) A data-hiding technique using scene-change detection for video steganography. Comput Electr Eng 54:423–434

    Article  Google Scholar 

  26. Roselinkiruba R, Sharmila TS (2021) Performance evaluation of encryption algorithm using fruit fly optimization improved hybridized seeker and PVD algorithm. Int J Inf Technol 13(5):1797–1803

    Google Scholar 

  27. Shabir A, Parah JA, Abdul MH, Bhat G (2014) Data hiding in scrambled images: a new double layer security data hiding technique. Comput Electr Eng 40(1):70–82

    Article  Google Scholar 

  28. Sharath MN, Rajesh TM, Patil M (2022) Design of optimal metaheuristics based pixel selection with homomorphic encryption technique for video steganography. Int J Inf Tecnol 14:2265–2274. https://doi.org/10.1007/s41870-022-01005-9

    Article  Google Scholar 

  29. Suresh M, Sam IS (2020) Optimized interesting region identification for video steganography using fractional Grey wolf optimization along with multi-objective cost function. J King Saud Univ - Comput Inf Sci 34:3489–3496

    Google Scholar 

  30. Suresh M, Shatheesh Sam I (2020) Optimized interesting region identification for video steganography using fractional Grey wolf optimization along with multi-objective cost function. J King Saud Univ - Comput Inf Sci. https://doi.org/10.1016/j.jksuci.2020.08.007

  31. Vital-Soto A, Azab A, Baki MF (2020) Mathematical modeling and a hybridized bacterial foraging optimization algorithm for the flexible job-shop scheduling problem with sequencing flexibility. J Manuf Syst 54:74–93

    Article  Google Scholar 

  32. Younus ZS, Younus GT (2020) Video steganography using knight tour algorithm and LSB method for encrypted data. J Intell Syst 29(1):1216–1225

    MathSciNet  Google Scholar 

Download references

Acknowledgements

We thank the anonymous referees for their useful suggestions.

Funding

This work has no funding resource.

Author information

Authors and Affiliations

Authors

Contributions

All authors contributed to the study conception and design. Material preparation, data collection and analysis were performed by *1Sharath M N, 2Dr. Rajesh T M, 3Dr.Mallanagouda Patil. The first draft of the manuscript was written by *1Sharath M N and all authors commented on previous versions of the manuscript.

All authors read and approved the final manuscript.

Corresponding author

Correspondence to M N Sharath.

Ethics declarations

Ethics approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Consent of publication

Not applicable.

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sharath, M.N., Rajesh, T.M. & Patil, M. A novel encryption with bacterial foraging optimization algorithm based pixel selection scheme for video steganography. Multimed Tools Appl 82, 25197–25216 (2023). https://doi.org/10.1007/s11042-023-14420-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-14420-2

Keywords

Navigation