An Efficient Video Steganography for Pixel Location Optimization Using Fr-WEWO Algorithm based Deep CNN Model

Full Text (PDF, 826KB), PP.14-30

Views: 0 Downloads: 0

Author(s)

Shamal Salunkhe 1,* Surendra Bhosale 2 Shubham V. Narkhede 3

1. Ramrao Adik Institute of Technology, Department of Instrumentation Engineering, Navi Mumbai, 400706, India

2. Veermata Jijabai Technological Institute, Department of Electrical Engineering, Mumbai, 400031, India

3. M. S. Data science, Stevens Institute of Technology, 1 Castle Point Terrace, Hoboken, NJ 07307, USA

* Corresponding author.

DOI: https://doi.org/10.5815/ijigsp.2023.03.02

Received: 29 Sep. 2022 / Revised: 2 Nov. 2022 / Accepted: 18 Dec. 2022 / Published: 8 Jun. 2023

Index Terms

Deep Convolutional Neural Network, Fractional Calculus, Imperceptibility, Optimization, Wavelet Transform

Abstract

Video steganography is used to conserve the confidential information in various security applications. To give advance protection to the secrete message, pixels locations are optimized using nature inspired algorithm. The input video is separated into a sequence of still image frames then key frames are extracted. The proposed Required Pixel Density (RPD) value calculation and feature extraction are carried out on the extracted frames to perform the frame classification. The frame classification is done using proposed Fractional Water-Earth Worm optimization algorithm based Deep Convolutional Neural Network (FrWEWO-Deep CNN) in order to classify the frames as high, low and medium quality. Thus pixel location prediction is carried out using trained Deep CNN then secret image is hide within high quality frame with Wavelet Transform (WT) and Inverse WT (IWT). Peak Signal to Noise Ratio (PSNR) and Correlation Coefficient (CC) are performance evaluation parameters. For efficient video steganography better imperceptibility and robustness are required. Imperceptibility is a scale of PSNR value showing similarity between original and stego video frames. The robustness of video steganography is measured by CC between embedded and extracted secret images. The proposed algorithm gives enhanced performance is compared with previous state of art such as WEWO-Deep RNN. The PSNR value is progressed from 41.8492 to 46.5728 dB and CC value improved from 0.9660 to 0.9847.

Cite This Paper

Shamal Salunkhe, Surendra Bhosale, Shubham V. Narkhede, "An Efficient Video Steganography for Pixel Location Optimization Using Fr-WEWO Algorithm based Deep CNN Model", International Journal of Image, Graphics and Signal Processing(IJIGSP), Vol.15, No.3, pp. 14-30, 2023. DOI:10.5815/ijigsp.2023.03.02

Reference

[1]Rachna Patel, Kalpesh Lad and Mukesh Patel, “Study and investigation of video steganography over uncompressed and compressed domain: a comprehensive review”, Multimedia Systems, 27:985–1024, 2021, pp. 986-1024.
[2]Wang Xiang-yang, Wang Chun-peng, Yang Hong-ying, Niu Pan-pan, “A robust blind color image watermarking in quaternion Fourier transform domain”, Journal of Systems and Software, 2013, vol. 86, no. 2, pp. 255-277.
[3]Rohit S. Malladar and Sanjeev R. Kunte, “Selective Video Encryption Using the Cross Coupling of One-dimensional Logistic Maps”, I. J. Computer Network and Information Security, 2021, 5, pp. 40-54
[4]Jan Butora and Jessica Fridrich, “Effect of JPEG Quality on Steganographic Security, IHMMSec-19, 2019, TROYES, France Association for Computing Machinery, ACM ISBN 978-1-4503-6821-6/19/06.
[5]Shumeet Baluja, “Hiding Images in Plain Sight: Deep Steganography, In Advances in Neural Information Processing Systems”, 2017, pp. 2069-2079.
[6]Ramadhan J. Mstafa, Khaled M. Elleithy and Eman Abdelfattah, “Video Steganography Techniques: Taxonomy, Challenges, and Future Directions”, In proceedings of IEEE Long Island Systems, Applications and Technology Conference (LISAT), IEEE, 2017, pp. 1-6.
[7]Yunxia Liu, Shuyang Liu, Yonghao Wang, Hongguo Zhao, and Si Liu, “Video Steganography: A Review, Neuro computing”, 2019, vol. 335, pp. 238-250.
[8]Zhili Zhou Ching, Nung Yang Cheonshik and Kim Stelvio Cimat, “Introduction to the special issue on deep learning for real-time information hiding and forensics”, Journal of Real-Time Image Processing, 2020, 17:1–5.
[9]Aayush M., Suraj Kumar, Aditya Nigam and Saiful Islam, “VStegNET: Video Steganography Network using Spatio-Temporal features and Micro-Bottleneck”, 30th British Machine Vision Conference, BMVC 2019, Cardiff, UK, 2019, pp. 274-286.
[10]Nandhini Subramanian, Ismahane Cheheb, Omar Elharrouss, Somaya Al-Maadeed and Ahmed Bouridane, “End-to-End Image Steganography Using Deep Convolutional Autoencoders”, IEEE Access, 2021, Volume 9, pp. 135585-135592
[11]Yao, Y. and Yu, N.,“Motion vector modification distortion analysis-based payload allocation for video steganography”, Journal of Visual Communication and Image Representation, 2021, vol.74.
[12]Xinyu Weng, Yongzhi Li, Lu Chi, and Yadong Mu,“Convolutional Video Steganography with Temporal Residual Modeling, Computer Science”, Proceedings of the International Conference on Multimedia Retrieval, 2019.
[13]Ke. Niu, Jun. Li, Xiao Yuan Yang, Shuo Zhang and Bo Wang,“Hybrid Adaptive Video Steganography Scheme under Game Model”, IEEE Access, 2019, vol.7, pp. 61523-61533.
[14]Ramadhan J. Mstafa, Khaled M. Elleithy, and Eman Abdelfattah,“ A Robust and Secure Video Steganography Method in DWT-DCT Domains Based on Multiple Object Tracking and ECC”, IEEE Access, 2017, vol. 5, pp. 5354-5365.
[15]Kwak, M. and Cho, Y., “A novel video steganography-based botnet communication model in telegram sns messenger”, Symmetry, 2021, vol.13, no.1, pp.84.
[16]Yao, Y. and Yu, N., “Motion vector modification distortion analysis-based payload allocation for video steganography”, Journal of Visual Communication and Image Representation, 2021, vol.74.
[17]Dalal, M. and Juneja, M., “A secure video steganography scheme using DWT based on object tracking”, Information Security Journal: A Global Perspective, 2021, pp.1-18.
[18]Zhao, H., Liu, Y., Wang, Y., Liu, S. and Feng, C., “A Video Steganography Method Based on Transform Block Decision for H. 265/HEVC”, IEEE Access, 2021, vol.9, pp.55506-55521.
[19]Zhang Y., Ye, D., Gan, J., Li, Z. and Cheng, Q., “An image steganography algorithm based on quantization index modulation resisting scaling attacks and statistical detection”, Comput. Mater. Continua, 2018, vol.56, no.1, pp.151-167.
[20]Mrdovic, S. and Perunicic, B., “Kerckhoffs' principle for intrusion detection. In Networks 2008”, The 13th International Telecommunications Network Strategy and Planning Symposium, 2008, pp. 1-8.
[21]Rubina Khongsit and P. Rangababu, "Scalable Discrete Tchebichef Transform for Image/Video Compression," International Conference on Innovations in Electronics, Signal Processing and Communication (IESC), 2017.
[22]Suresh M. and Sam I. S., “Exponential fractional cat swarm optimization for video steganography”, Multimedia Tools and Applications, 2021, vol.80, no.9, pp.13253-13270.
[23]Chakraborti T., Mc Cane, B., Mills S. and Pal, U., “Loop descriptor: Local optimal-oriented pattern”, IEEE Signal Processing Letters, 2018, vol. 25, no. 5, pp. 635-639.
[24]Sugave, S. and Jagdale, B., “Monarch-EWA: Monarch-Earthworm-Based Secure Routing Protocol in IoT”, The Computer Journal, 2020, vol.63, no.6, pp.817-831.
[25]Liu, M., Shi, J., Li, Z., Li, C., Zhu, J. and Liu, S., "Towards better analysis of deep convolutional neural networks," IEEE transactions on visualization and computer graphics, 2016, vol.23, no.1, pp.91-100.
[26]Yu-Jun Zheng, "Water wave optimization: A new nature-inspired meta heuristic", Computers and Operations Research, 2015, vol.55, pp.1-11.
[27]Gai-Ge Wang, Suash Deb, and Leandro dos Santos Coelho, "Earthworm optimization algorithm: a bio-inspired meta heuristic algorithm for global optimization problems", IJBIC, vol.12, no.1, pp.1-22, 2018.
[28]Bhaladhare, P.R. and Jinwala, D.C., "A clustering approach for the-diversity model in privacy preserving data mining using fractional calculus-bacterial foraging optimization algorithm," Advances in Computer Engineering, 2014.
[29]Shamal Salunkhe, Surendra Bhosale, “Nature Inspired Algorithm for Pixel Location Optimization in Video Steganography Using Deep RNN”, International Journal on Engineering, Science and Technology, Volume 3, Issue 2, 2021, ISSN: 2642-4088, pp. 146-154.
[30]CAVIAR database, “https://homepages.inf.ed.ac.uk/rbf/CAVIARDATA1/”
[31]Subodh Ingaleshwar, Nagraj Dharwadkar, “Water chaotic fruit fly optimization based deep convolutional neural network for image watermarking using wavelet transform”, Multimedia Tools Appl. (2020).