Skip to main content
Log in

Optimized interesting region identification for video steganography using multi-objective cost function

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

This paper presents an optimal data hiding in videos using optimization based on multi-objective constraints such as, the energy of wavelet, intensity, edge details, and energy of Local Binary Patterns (LBP). The Fractional-Cat swarm optimization (Fractional-CSO) is modelled with the inclusion of fractional calculus in Cat swarm optimization (CSO). Initially, an input video is selected from which frames are generated. The key frames are extracted from those frames using the Contourlet Transform (CT) and Structural Similarity Index (SSIM). Regions are formed on the selected key frames with the help of grid lines. Finally, the optimal region for embedding is interpreted using the proposed optimization algorithm along with multi-objective cost functions to embed the secret message. The secret data is hidden in the optimal region using the Lifting Wavelet Transform (LWT). Then the embedded video is subsequently sent across the network to its intended recipient. The experimental analysis is done using two videos which reveal the effectiveness of the proposed video steganography. The comparative analysis based on the MSE (Mean-Square Error), Peak Signal to Noise Ratio (PSNR) and correlation measure reveals the effectiveness of the method. With MSE of 0.0001, maximal PSNR of 82.273 dB and correlation of 0.9529 respectively shows increase in security of the data with a better quality embedded image. For noise free image, the correlation acquired using the proposed video steganography is 0.9934.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Algorithm 1
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Abdulla AA, Jassim SA, Sellahewa H (2013) Secure steganography technique based on bitplane indexes. 2013 IEEE international symposium on multimedia, pp 287–291. https://doi.org/10.1109/ISM.2013.55.

  2. Abdulla AA, Sellahewa H, Jassim SA (2014) Stego quality enhancement by message size reduction and fibonacci bit-plane mapping. In: Chen L, Mitchell C (eds) Security Standardisation Research. SSR 2014. Lecture notes in computer science, vol 8893. Springer, Cham. https://doi.org/10.1007/978-3-319-14054-4_10

    Chapter  Google Scholar 

  3. AlZain MA, Al-Amri JF (2018) Application of data steganographic method in video sequences using histogram shifting in the discrete wavelet transform. Int J Appl Eng Res 13(8):6380–6387

    Google Scholar 

  4. Balu S, Babu CNK, Amudha K (2019) Secure and efficient data transmission by video steganography in medical imaging system. Clust Comput 22:4057–4063. https://doi.org/10.1007/s10586-018-2639-4

    Article  Google Scholar 

  5. Bhaladhare PR, Jinwala DC (2018) A clustering approach using fractional calculus-bacterial foraging optimization algorithm for k-anonymization in privacy preserving data mining. Censorship, Surveillance, and Privacy: Concepts, Methodologies, Tools, and Applications 2:587–608. https://doi.org/10.4018/978-1-5225-7113-1.ch031

  6. Dalal M, Juneja M (2020) Evaluation of orthogonal and biorthogonal wavelets for video steganography. Inf Secur J Glob Perspect 29:40–50. https://doi.org/10.1080/19393555.2020.1714822

    Article  Google Scholar 

  7. Do MN, Vetterli M (2005) The contourlet transform: an efficient directional multiresolution image representation. IEEE Trans Image Process 14:2091–2106. https://doi.org/10.1109/TIP.2005.859376

    Article  Google Scholar 

  8. Ghamsarian N, Khademi M (2020) Undetectable video steganography by considering spatio-temporal steganalytic features in the embedding cost function. Multimed Tools Appl 79:18909–18939. https://doi.org/10.1007/s11042-020-08617-y

    Article  Google Scholar 

  9. Gurunathan K, Rajagopalan SP (2020) A stegano - visual cryptography technique for multimedia security. Multimed Tools Appl 79:3893–3911. https://doi.org/10.1007/s11042-019-7471-1

    Article  Google Scholar 

  10. Hashemzadeh M (2018) Hiding information in videos using motion clues of feature points. Comput Electr Eng 68:14–25. https://doi.org/10.1016/j.compeleceng.2018.03.046

    Article  Google Scholar 

  11. Jackson ES, Haff RP (2006) X-ray detection and sorting of olives damaged by fruit fly. In: 2006 ASAE Annual Meeting. American Society of Agricultural and Biological Engineers, p 1

  12. Jain M, Kumar A (2017) RGB channel based decision tree grey-alpha medical image steganography with RSA cryptosystem. Int J Mach Learn Cyber 8:1695–1705. https://doi.org/10.1007/s13042-016-0542-y

    Article  Google Scholar 

  13. Jain M, Kumar A, Choudhary RC (2017) Improved diagonal queue medical image steganography using Chaos theory, LFSR, and Rabin cryptosystem. Brain Inf 4:95–106. https://doi.org/10.1007/s40708-016-0057-z

    Article  Google Scholar 

  14. Kakde Y, Gonnade P, Dahiwale P (2015) Audio-video steganography. ICIIECS 2015–2015 IEEE International Conference on Innovations in Information, Embedded and Communication Systems https://doi.org/10.1109/ICIIECS.2015.7192885

  15. Kaur R, Pooja V (2016) A hybrid approach for video steganography using edge detection and identical match techniques. Proceedings of the 2016 IEEE International Conference on Wireless Communications, Signal Processing and Networking, WiSPNET 2016 867–871. https://doi.org/10.1109/WiSPNET.2016.7566255

  16. Khare R, Mishra R, Arya I (2014) Video steganography using LSB technique by neural network. Proceedings - 2014 6th international conference on computational intelligence and communication networks, CICN 2014 898–902. https://doi.org/10.1109/CICN.2014.189

  17. Khupse S, Patil NN (2014) An adaptive steganography technique for videos using Steganoflage. Proceedings of the 2014 International Conference on Issues and Challenges in Intelligent Computing Techniques, ICICT 2014 811–815. https://doi.org/10.1109/ICICICT.2014.6781384

  18. Lima R, Gramacho W, Henrique A (2017) Optimizing image steganography using particle swarm optimization algorithm. IJCA 164:1–5. https://doi.org/10.5120/ijca2017913686

    Article  Google Scholar 

  19. Mahdi Bahrami OB-H, Chu X (2018) Cat swarm optimization (CSO) algorithm. Adv Optim Nat-Inspired Algorithm 720:143–149. https://doi.org/10.1007/978-981-10-5221-7

    Article  Google Scholar 

  20. Mallick, P., Seth, P., Ghosh, A., & Poray, J. (2017). A lung cancer diagnostic framework using gene prediction graph. 2017 international conference on intelligent communication and computational techniques (ICCT). https://doi.org/10.1109/intelcct.2017.8324020

  21. Miri A, Faez K (2017) Adaptive image steganography based on transform domain via genetic algorithm. Optik 145:158–168. https://doi.org/10.1016/j.ijleo.2017.07.043

    Article  Google Scholar 

  22. Montes de Oca MA, Stutzle T, Birattari M, Dorigo M (2009) Frankenstein’s PSO: a composite particle swarm optimization algorithm. IEEE Trans Evol Computat 13:1120–1132. https://doi.org/10.1109/TEVC.2009.2021465

    Article  Google Scholar 

  23. Mstafa RJ, Elleithy KM (2017) Compressed and raw video steganography techniques: a comprehensive survey and analysis. Multimed Tools Appl 76:21749–21786. https://doi.org/10.1007/s11042-016-4055-1

    Article  Google Scholar 

  24. Mstafa RJ, Elleithy KM, Abdelfattah E (2017) Video steganography techniques: Taxonomy, challenges, and future directions. 2017 IEEE Long Island Systems, Applications and Technology Conference, LISAT 2017. https://doi.org/10.1109/LISAT.2017.8001965

  25. Mstafa RJ, Elleithy KM, Abdelfattah E (2017) A robust and secure video steganography method in DWT-DCT domains based on multiple object tracking and ECC. IEEE Access 5:5354–5365. https://doi.org/10.1109/ACCESS.2017.2691581

    Article  Google Scholar 

  26. Mstafa RJ, Younis YM, Hussein HI, Atto M (2020) A new video steganography scheme based on Shi-Tomasi corner detector. IEEE Access 8:161825–161837. https://doi.org/10.1109/ACCESS.2020.3021356

    Article  Google Scholar 

  27. Nguyen D-C, Nguyen T-S, Hsu F-R, Hsien H-Y (2019) A novel steganography scheme for video H.264/AVC without distortion drift. Multimed Tools Appl 78:16033–16052. https://doi.org/10.1007/s11042-018-6976-3

    Article  Google Scholar 

  28. Nyo HL, Oo AW (2019) Secure data transmission of video steganography using arnold scrambling and DWT. Int J Comput Netw Inf Secur 9(6):45

    Google Scholar 

  29. Pezzella F, Morganti G, Ciaschetti G (2008) A genetic algorithm for the flexible job-shop scheduling problem. Comput Oper Res 35:3202–3212. https://doi.org/10.1016/j.cor.2007.02.014

    Article  MATH  Google Scholar 

  30. Pradhan PM, Panda G (2012) Solving multiobjective problems using cat swarm optimization. Expert Syst Appl 39:2956–2964. https://doi.org/10.1016/j.eswa.2011.08.157

    Article  Google Scholar 

  31. Rajalakshmi K, Mahesh K (2018) Robust secure video steganography using reversible patch-wise code-based embedding. Multimed Tools Appl 77:27427–27445. https://doi.org/10.1007/s11042-018-5930-8

    Article  Google Scholar 

  32.  Rajpreetha C, Haripriya C, M VL (2015) A secured video steganography by linear feedback shift register method 1(4):56–59

  33. Raju R, Philip FM (2018) Video steganography in Haar wavelet domain based on multiple object tracking and error correction codes. Int Res J Eng Technol (IRJET) 5(4):e-ISSN: 2395–0056

  34. Ramalingam M, Mat Isa NA, Puviarasi R (2020) A secured data hiding using affine transformation in video steganography. Procedia Comput Sci 171:1147–1156. https://doi.org/10.1016/j.procs.2020.04.123

    Article  Google Scholar 

  35. Rana S, Kamra R, Sur A (2020) Motion vector based video steganography using homogeneous block selection. Multimed Tools Appl 79:5881–5896. https://doi.org/10.1007/s11042-019-08525-w

    Article  Google Scholar 

  36. Roselin Kiruba R, Sree Sharmila T (2020) Secure data hiding by fruit fly optimization improved hybridized seeker algorithm. Multidim Syst Sign Process 32:405–430. https://doi.org/10.1007/s11045-019-00697-w

    Article  MathSciNet  MATH  Google Scholar 

  37. Sadek MM, Khalifa AS, Mostafa MGM (2017) Robust video steganography algorithm using adaptive skin-tone detection. Multimed Tools Appl 76:3065–3085. https://doi.org/10.1007/s11042-015-3170-8

    Article  Google Scholar 

  38. Sethy PK, Pradhan K, Behera SK (2017) A security enhanced approach for video steganography using K-means clustering and direct mapping. International Conference on Automatic Control and Dynamic Optimization Techniques, ICACDOT 2016 618–622. https://doi.org/10.1109/ICACDOT.2016.7877660

  39. Shanableh T (2012) Data hiding in MPEG video files using multivariate regression and flexible macroblock ordering. IEEE Trans Inf Forensic Secur 7:455–464. https://doi.org/10.1109/TIFS.2011.2177087

    Article  Google Scholar 

  40. Sushmitha MC, Suresh HN, Manikandan J (2018) An approach towards novel video steganography for consumer electronics. 2017 IEEE International Conference on Consumer Electronics-Asia, ICCE-Asia 2017 2018-Janua:72–76. https://doi.org/10.1109/ICCE-ASIA.2017.8307831

  41. Thakur V, Saikia M (2013) Hiding secret image in video. 2013 international conference on intelligent systems and signal processing, ISSP 2013 150–153. https://doi.org/10.1109/ISSP.2013.6526892

  42. Video Watermarking using DWT - File Exchange - MATLAB Central. https://in.mathworks.com/matlabcentral/fileexchange/52225-video-watermarking-using-dwt?s_tid=prof_contriblnk. Accessed 23 Dec 2019

  43. Wagdarikar AMU, Senapati RK (2019) Design and development of a multiobjective cost function for robust video watermarking using wavelet transform. J Intell Syst 28:873–891. https://doi.org/10.1515/jisys-2017-0264

    Article  Google Scholar 

  44. Wang W, Farid H (2009) Exposing digital forgeries in video by detecting double quantization. MMandSec’09 - Proceedings of the 11th ACM Multimedia Security Workshop 39–47. https://doi.org/10.1145/1597817.1597826

  45. Wang R-Z, Lin C-F, Lin J-C (2001) Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recogn 34:671–683. https://doi.org/10.1016/S0031-3203(00)00015-7

    Article  MATH  Google Scholar 

  46. Xiph.org: Derf’s Test Media Collection. https://media.xiph.org/video/derf/. Accessed 24 Mar 2020

  47. Yao Y (2021) Motion vector modification distortion analysis-based payload allocation for video steganography. J Vis Commun Image Represent 74:102986

    Article  Google Scholar 

  48. Zhang Y, Zhang M, Yang X, Guo D, Liu L (2017) Novel video steganography algorithm based on secret sharing and error-correcting code for H.264/AVC. Tsinghua Sci Technol 22:198–209. https://doi.org/10.23919/TST.2017.7889641

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Meenu Suresh.

Ethics declarations

Conflict of interests

No Conflict of Interests.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Suresh, M., Sam, I.S. Optimized interesting region identification for video steganography using multi-objective cost function. Multimed Tools Appl 82, 31373–31396 (2023). https://doi.org/10.1007/s11042-023-14821-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-14821-3

Keywords

Navigation