Design of optimal metaheuristics based pixel selection with homomorphic encryption technique for video steganography | International Journal of Information Technology Skip to main content
Log in

Design of optimal metaheuristics based pixel selection with homomorphic encryption technique for video steganography

  • Original Research
  • Published:
International Journal of Information Technology Aims and scope Submit manuscript

Abstract

Presently, the technological advancements in electronics and networking fields have resulted in the massive rise in the communication of digital information, especially videos. Since users access Internet in an open channel, the digital data can be altered or tampered with easily. Therefore, encryption and steganography techniques have been developed to ensure secure communication. In video steganography technique, the optimal pixels in the cover video are chosen and the encrypted secret message can be embedded into the chosen pixels, resulting in the generation of stego video. Keeping this in mind, this paper introduces an optimal metaheuristics based pixel selection with homomorphic encryption technique for video steganography (OMPS-HEVS) technique. The proposed OMPS-HEVS technique initially performs frame conversion process and applies a two-dimensional discrete wavelet decomposition (2D-DWT) process. Besides, the optimal pixel selection process takes place using the glowworm swarm optimization (GSO) algorithm. Moreover, Optimal Homomorphic encryption (OHE) with Jaya Optimization Algorithm (JOA) is applied to encode the secret message. The design of optimal key generation process of OHE using JOA helps to accomplish improved security. The experimental validation of the OMPS-HEVS technique on the benchmark test video exhibited the superior performance of the OMPS-HEVS technique over the other existing techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Japan)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

References

  1. Niu K, Li J, Yang X, Zhang S, Wang B (2019) Hybrid adaptive video steganography scheme under game model. IEEE Access 7:61523–61533

    Article  Google Scholar 

  2. Aljarf A, Amin S, Al-Jarrah MM (2018) Steganalysis system for colour steganographic images using three different techniques. In: Proceedings of the 2018 11th International Conference on Developments in eSystems Engineering (DeSE), Cambridge, UK, 2–5 September 2018; pp. 346–353.

  3. Saito T, Zhao Q, Naito H (2019) Second level steganalysis-embeding location detection using machine learning. In: Proceedings of the 2019 IEEE 10th International Conference on Awareness Science and Technology (iCAST), Morioka, Japan, 23–25 October 2019; pp. 1–6.

  4. Xiang Z, Sang J, Zhang Q, Cai B, Xia X, Wu W (2020) A new convolutional neural network-based steganalysis method for content-adaptive image steganography in the spatial domain. IEEE Access 8:47013–47020

    Article  Google Scholar 

  5. Zhang L, Hu X, Rasheed W, Huang T, Zhao C (2019) An enhanced steganographic code and its application in voice-over-ip steganography. IEEE Access 7:97187–97195

    Article  Google Scholar 

  6. Chen X, Wang S, Shi C, Wu H, Zhao J, Fu J (2019) Robust ship tracking via multi-view learning and sparse representation. J Navig 72:176–192

    Article  Google Scholar 

  7. Zhang L, Chen D (2020) The large capacity embedding algorithm for H.264/AVC intra-prediction mode video steganography based on linear block code over Z4. Multimed Tools Appl 79:12659–12677

    Article  Google Scholar 

  8. Konyar MZ, Akbulut O, Öztürk S (2020) Matrix encoding-based high-capacity and high-fidelity reversible data hiding in HEVC. Signal Image Video Process 14:897–905

    Article  Google Scholar 

  9. Zhu B, Ni J (2018) Uniform embedding for efficient steganography of H.264 video. In: Proceedings of the 2018 25th IEEE International Conference on Image Processing (ICIP), Athens, Greece, 7–10 October 2018; pp. 1678–1682.

  10. Lee W, Sun W (2019) Reversible steganography scheme based on position-recording in DCT coefficients. In: Proceedings of the 2019 15th International Conference on Computational Intelligence and Security (CIS), Macao, Macao, 13–16 December 2019; pp. 424–428

  11. Yao Y, Yu N (2021) Motion vector modification distortion analysis-based payload allocation for video steganography. J Vis Commun Image Represent 74:102986

    Article  Google Scholar 

  12. Liu S, Xu D (2020) A robust steganography method for HEVC based on secret sharing. Cogn Syst Res 59:207–220

    Article  Google Scholar 

  13. Varuikhin V, Levina A (2021) Continuous wavelet transform applications in steganography. Proc Comput Sci 186:580–587

    Article  Google Scholar 

  14. Ramalingam M, Isa NAM (2015) Fast retrieval of hidden data using enhanced hidden Markov model in video steganography. Appl Soft Comput 34:744–757

    Article  Google Scholar 

  15. Ramalingam M, Isa NAM (2016) A data-hiding technique using scene-change detection for video steganography. Comput Electr Eng 54:423–434

    Article  Google Scholar 

  16. Kar N, Mandal K, Bhattacharya B (2018) Improved chaos-based video steganography using DNA alphabets. ICT Express 4(1):6–13

    Article  Google Scholar 

  17. Ramalingam M, Isa NAM, Puviarasi R (2020) A secured data hiding using affine transformation in video steganography. Proc Comput Sci 171:1147–1156

    Article  Google Scholar 

  18. Mstafa RJ, Elleithy KM, Abdelfattah E (2017) A robust and secure video steganography method in DWT-DCT domains based on multiple object tracking and ECC. IEEE access 5:5354–5365

    Google Scholar 

  19. Ouyang Z, Zhou YQ (2011) Self-adaptive step glowworm swarm optimization algorithm. JisuanjiYingyong/J Comput Appl 31(7):1804–1807

    Google Scholar 

  20. Rao R (2016) Jaya: a simple and new optimization algorithm for solving constrained and unconstrained optimization problems. Int J Ind Eng Comput 7(1):19–34

    Google Scholar 

  21. Dhawan KK (2007) Fault tolerance-genetic algorithm for grid task scheduling using check point In: Sixth International Conference on Grid and Cooperative Computing. IEEE, pp.676–680. https://doi.org/10.1109/GCC.2007.67

  22. Zhang Y, Yang X, Cattani C, Rao RV, Wang S, Phillips P (2016) Tea category identification using a novel fractional Fourier entropy and Jaya algorithm. Entropy 18(3):77

    Article  Google Scholar 

  23. Suresh M, Sam IS (2020) Optimized interesting region identification for video steganography using Fractional Grey Wolf Optimization along with multi-objective cost function. J King Saud Univ Comput Inform Sci. https://doi.org/10.1016/j.jksuci.2020.08.007

    Article  Google Scholar 

  24. Sharath MN, Rajesh TM, Patil M (2019) Analysis of secure multimedia communication in cloud computing. In: 2019 2nd International Conference on analysis Intelligent Computing, Instrumentation and Control Technologies (ICICICT), Kannur, India, pp. 136–144. https://doi.org/10.1109/ICICICT46008.2019.8993352.

  25. Yu XY, Wang CY, Zhou X (1891) A survey on robust video watermarking algorithms for copyright protection. Appl Sci 2018:8

    Google Scholar 

  26. Niu K, Li J, Yang X, Zhang S, Wang B (2019) Hybrid adaptive video steganography scheme under game model. IEEE Access 7:61523–61533

    Article  Google Scholar 

  27. Denemark TD, Boroumand M, Fridrich J (2016) Steganalysis features for content-adaptive JPEG steganography. IEEE Trans Inform Foren Secur 11(8):1736–1746

    Article  Google Scholar 

  28. Fridrich J, Kodovsky J (2012) Rich models for steganalysis of digital images. IEEE Trans Inform Foren Secur 7(3):868–882

    Article  Google Scholar 

  29. Jangid S, Sharma S (2017) High PSNR based video steganography by MLC(multi-level clustering) algorithm. In: Proc. ICICCS, Madurai, India

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. N. Sharath.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sharath, M.N., Rajesh, T.M. & Patil, M. Design of optimal metaheuristics based pixel selection with homomorphic encryption technique for video steganography. Int. j. inf. tecnol. 14, 2265–2274 (2022). https://doi.org/10.1007/s41870-022-01005-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s41870-022-01005-9

Keywords

Navigation