Abstract
This paper presents an optimal data hiding in videos using optimization based on multi-objective constraints such as, the energy of wavelet, intensity, edge details, and energy of Local Binary Patterns (LBP). The Fractional-Cat swarm optimization (Fractional-CSO) is modelled with the inclusion of fractional calculus in Cat swarm optimization (CSO). Initially, an input video is selected from which frames are generated. The key frames are extracted from those frames using the Contourlet Transform (CT) and Structural Similarity Index (SSIM). Regions are formed on the selected key frames with the help of grid lines. Finally, the optimal region for embedding is interpreted using the proposed optimization algorithm along with multi-objective cost functions to embed the secret message. The secret data is hidden in the optimal region using the Lifting Wavelet Transform (LWT). Then the embedded video is subsequently sent across the network to its intended recipient. The experimental analysis is done using two videos which reveal the effectiveness of the proposed video steganography. The comparative analysis based on the MSE (Mean-Square Error), Peak Signal to Noise Ratio (PSNR) and correlation measure reveals the effectiveness of the method. With MSE of 0.0001, maximal PSNR of 82.273 dB and correlation of 0.9529 respectively shows increase in security of the data with a better quality embedded image. For noise free image, the correlation acquired using the proposed video steganography is 0.9934.
Similar content being viewed by others
References
Abdulla AA, Jassim SA, Sellahewa H (2013) Secure steganography technique based on bitplane indexes. 2013 IEEE international symposium on multimedia, pp 287–291. https://doi.org/10.1109/ISM.2013.55.
Abdulla AA, Sellahewa H, Jassim SA (2014) Stego quality enhancement by message size reduction and fibonacci bit-plane mapping. In: Chen L, Mitchell C (eds) Security Standardisation Research. SSR 2014. Lecture notes in computer science, vol 8893. Springer, Cham. https://doi.org/10.1007/978-3-319-14054-4_10
AlZain MA, Al-Amri JF (2018) Application of data steganographic method in video sequences using histogram shifting in the discrete wavelet transform. Int J Appl Eng Res 13(8):6380–6387
Balu S, Babu CNK, Amudha K (2019) Secure and efficient data transmission by video steganography in medical imaging system. Clust Comput 22:4057–4063. https://doi.org/10.1007/s10586-018-2639-4
Bhaladhare PR, Jinwala DC (2018) A clustering approach using fractional calculus-bacterial foraging optimization algorithm for k-anonymization in privacy preserving data mining. Censorship, Surveillance, and Privacy: Concepts, Methodologies, Tools, and Applications 2:587–608. https://doi.org/10.4018/978-1-5225-7113-1.ch031
Dalal M, Juneja M (2020) Evaluation of orthogonal and biorthogonal wavelets for video steganography. Inf Secur J Glob Perspect 29:40–50. https://doi.org/10.1080/19393555.2020.1714822
Do MN, Vetterli M (2005) The contourlet transform: an efficient directional multiresolution image representation. IEEE Trans Image Process 14:2091–2106. https://doi.org/10.1109/TIP.2005.859376
Ghamsarian N, Khademi M (2020) Undetectable video steganography by considering spatio-temporal steganalytic features in the embedding cost function. Multimed Tools Appl 79:18909–18939. https://doi.org/10.1007/s11042-020-08617-y
Gurunathan K, Rajagopalan SP (2020) A stegano - visual cryptography technique for multimedia security. Multimed Tools Appl 79:3893–3911. https://doi.org/10.1007/s11042-019-7471-1
Hashemzadeh M (2018) Hiding information in videos using motion clues of feature points. Comput Electr Eng 68:14–25. https://doi.org/10.1016/j.compeleceng.2018.03.046
Jackson ES, Haff RP (2006) X-ray detection and sorting of olives damaged by fruit fly. In: 2006 ASAE Annual Meeting. American Society of Agricultural and Biological Engineers, p 1
Jain M, Kumar A (2017) RGB channel based decision tree grey-alpha medical image steganography with RSA cryptosystem. Int J Mach Learn Cyber 8:1695–1705. https://doi.org/10.1007/s13042-016-0542-y
Jain M, Kumar A, Choudhary RC (2017) Improved diagonal queue medical image steganography using Chaos theory, LFSR, and Rabin cryptosystem. Brain Inf 4:95–106. https://doi.org/10.1007/s40708-016-0057-z
Kakde Y, Gonnade P, Dahiwale P (2015) Audio-video steganography. ICIIECS 2015–2015 IEEE International Conference on Innovations in Information, Embedded and Communication Systems https://doi.org/10.1109/ICIIECS.2015.7192885
Kaur R, Pooja V (2016) A hybrid approach for video steganography using edge detection and identical match techniques. Proceedings of the 2016 IEEE International Conference on Wireless Communications, Signal Processing and Networking, WiSPNET 2016 867–871. https://doi.org/10.1109/WiSPNET.2016.7566255
Khare R, Mishra R, Arya I (2014) Video steganography using LSB technique by neural network. Proceedings - 2014 6th international conference on computational intelligence and communication networks, CICN 2014 898–902. https://doi.org/10.1109/CICN.2014.189
Khupse S, Patil NN (2014) An adaptive steganography technique for videos using Steganoflage. Proceedings of the 2014 International Conference on Issues and Challenges in Intelligent Computing Techniques, ICICT 2014 811–815. https://doi.org/10.1109/ICICICT.2014.6781384
Lima R, Gramacho W, Henrique A (2017) Optimizing image steganography using particle swarm optimization algorithm. IJCA 164:1–5. https://doi.org/10.5120/ijca2017913686
Mahdi Bahrami OB-H, Chu X (2018) Cat swarm optimization (CSO) algorithm. Adv Optim Nat-Inspired Algorithm 720:143–149. https://doi.org/10.1007/978-981-10-5221-7
Mallick, P., Seth, P., Ghosh, A., & Poray, J. (2017). A lung cancer diagnostic framework using gene prediction graph. 2017 international conference on intelligent communication and computational techniques (ICCT). https://doi.org/10.1109/intelcct.2017.8324020
Miri A, Faez K (2017) Adaptive image steganography based on transform domain via genetic algorithm. Optik 145:158–168. https://doi.org/10.1016/j.ijleo.2017.07.043
Montes de Oca MA, Stutzle T, Birattari M, Dorigo M (2009) Frankenstein’s PSO: a composite particle swarm optimization algorithm. IEEE Trans Evol Computat 13:1120–1132. https://doi.org/10.1109/TEVC.2009.2021465
Mstafa RJ, Elleithy KM (2017) Compressed and raw video steganography techniques: a comprehensive survey and analysis. Multimed Tools Appl 76:21749–21786. https://doi.org/10.1007/s11042-016-4055-1
Mstafa RJ, Elleithy KM, Abdelfattah E (2017) Video steganography techniques: Taxonomy, challenges, and future directions. 2017 IEEE Long Island Systems, Applications and Technology Conference, LISAT 2017. https://doi.org/10.1109/LISAT.2017.8001965
Mstafa RJ, Elleithy KM, Abdelfattah E (2017) A robust and secure video steganography method in DWT-DCT domains based on multiple object tracking and ECC. IEEE Access 5:5354–5365. https://doi.org/10.1109/ACCESS.2017.2691581
Mstafa RJ, Younis YM, Hussein HI, Atto M (2020) A new video steganography scheme based on Shi-Tomasi corner detector. IEEE Access 8:161825–161837. https://doi.org/10.1109/ACCESS.2020.3021356
Nguyen D-C, Nguyen T-S, Hsu F-R, Hsien H-Y (2019) A novel steganography scheme for video H.264/AVC without distortion drift. Multimed Tools Appl 78:16033–16052. https://doi.org/10.1007/s11042-018-6976-3
Nyo HL, Oo AW (2019) Secure data transmission of video steganography using arnold scrambling and DWT. Int J Comput Netw Inf Secur 9(6):45
Pezzella F, Morganti G, Ciaschetti G (2008) A genetic algorithm for the flexible job-shop scheduling problem. Comput Oper Res 35:3202–3212. https://doi.org/10.1016/j.cor.2007.02.014
Pradhan PM, Panda G (2012) Solving multiobjective problems using cat swarm optimization. Expert Syst Appl 39:2956–2964. https://doi.org/10.1016/j.eswa.2011.08.157
Rajalakshmi K, Mahesh K (2018) Robust secure video steganography using reversible patch-wise code-based embedding. Multimed Tools Appl 77:27427–27445. https://doi.org/10.1007/s11042-018-5930-8
Rajpreetha C, Haripriya C, M VL (2015) A secured video steganography by linear feedback shift register method 1(4):56–59
Raju R, Philip FM (2018) Video steganography in Haar wavelet domain based on multiple object tracking and error correction codes. Int Res J Eng Technol (IRJET) 5(4):e-ISSN: 2395–0056
Ramalingam M, Mat Isa NA, Puviarasi R (2020) A secured data hiding using affine transformation in video steganography. Procedia Comput Sci 171:1147–1156. https://doi.org/10.1016/j.procs.2020.04.123
Rana S, Kamra R, Sur A (2020) Motion vector based video steganography using homogeneous block selection. Multimed Tools Appl 79:5881–5896. https://doi.org/10.1007/s11042-019-08525-w
Roselin Kiruba R, Sree Sharmila T (2020) Secure data hiding by fruit fly optimization improved hybridized seeker algorithm. Multidim Syst Sign Process 32:405–430. https://doi.org/10.1007/s11045-019-00697-w
Sadek MM, Khalifa AS, Mostafa MGM (2017) Robust video steganography algorithm using adaptive skin-tone detection. Multimed Tools Appl 76:3065–3085. https://doi.org/10.1007/s11042-015-3170-8
Sethy PK, Pradhan K, Behera SK (2017) A security enhanced approach for video steganography using K-means clustering and direct mapping. International Conference on Automatic Control and Dynamic Optimization Techniques, ICACDOT 2016 618–622. https://doi.org/10.1109/ICACDOT.2016.7877660
Shanableh T (2012) Data hiding in MPEG video files using multivariate regression and flexible macroblock ordering. IEEE Trans Inf Forensic Secur 7:455–464. https://doi.org/10.1109/TIFS.2011.2177087
Sushmitha MC, Suresh HN, Manikandan J (2018) An approach towards novel video steganography for consumer electronics. 2017 IEEE International Conference on Consumer Electronics-Asia, ICCE-Asia 2017 2018-Janua:72–76. https://doi.org/10.1109/ICCE-ASIA.2017.8307831
Thakur V, Saikia M (2013) Hiding secret image in video. 2013 international conference on intelligent systems and signal processing, ISSP 2013 150–153. https://doi.org/10.1109/ISSP.2013.6526892
Video Watermarking using DWT - File Exchange - MATLAB Central. https://in.mathworks.com/matlabcentral/fileexchange/52225-video-watermarking-using-dwt?s_tid=prof_contriblnk. Accessed 23 Dec 2019
Wagdarikar AMU, Senapati RK (2019) Design and development of a multiobjective cost function for robust video watermarking using wavelet transform. J Intell Syst 28:873–891. https://doi.org/10.1515/jisys-2017-0264
Wang W, Farid H (2009) Exposing digital forgeries in video by detecting double quantization. MMandSec’09 - Proceedings of the 11th ACM Multimedia Security Workshop 39–47. https://doi.org/10.1145/1597817.1597826
Wang R-Z, Lin C-F, Lin J-C (2001) Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recogn 34:671–683. https://doi.org/10.1016/S0031-3203(00)00015-7
Xiph.org: Derf’s Test Media Collection. https://media.xiph.org/video/derf/. Accessed 24 Mar 2020
Yao Y (2021) Motion vector modification distortion analysis-based payload allocation for video steganography. J Vis Commun Image Represent 74:102986
Zhang Y, Zhang M, Yang X, Guo D, Liu L (2017) Novel video steganography algorithm based on secret sharing and error-correcting code for H.264/AVC. Tsinghua Sci Technol 22:198–209. https://doi.org/10.23919/TST.2017.7889641
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interests
No Conflict of Interests.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Suresh, M., Sam, I.S. Optimized interesting region identification for video steganography using multi-objective cost function. Multimed Tools Appl 82, 31373–31396 (2023). https://doi.org/10.1007/s11042-023-14821-3
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-023-14821-3