Skip to main content
Log in

A secure video data streaming model using modified firefly and SVD technique

  • Regular Paper
  • Published:
Multimedia Systems Aims and scope Submit manuscript

Abstract

Due to the expression of sharing information, there has been an increase in interest in safeguarding multimedia information and copyrights in recent times. Attackers are attempting to obtain sensitive information from a variety of sources, emphasizing the significance of data security. Singular value decomposition (SVD) is used to ensure data confidentiality and authenticity, and several researchers used strategies to obscure hidden information. The false-positive error problem of SVD is diminished due to the presence of an embedded watermark image and there is no possibility of counterfeit. By integrating with discrete wavelet transform (DWT), the performance is improved as well as the error is minimized. The secure watermarks has been hidden based on singular value decomposition discrete wavelet transform for 2 dimension (SVD-DWT2D). Then this secure watermark symbols are analysed using reversible data concealing alongside other watermarking techniques which are used frequently for securing the data privacy. The best threshold value is determined for evaluating the originality and the complicated frames are selected after the testing process. The video quality is predicted based on the threshold value. The UCF101 dataset is determined to validate the efficiency of the proposed method and, thus, enhanced the video quality. The proposed method achieves greater ability and video quality of 69db PSNR value and 0.362 MSE value, respectively. Based on the experimental analysis the proposed SVD-DWT2D based reversible data concealing model attained optimal results in securing the digital video by incorporating featured watermarks in the video sequence.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Algorithm1:
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

Data availability statement

The data that support the findings of this study are available from the corresponding author upon reasonable request.

References

  1. Zheng, S., Zhang, X.P., Chen, J., Kuo, Y.: A high-efficiency compressed sensing-based terminal-to-cloud video transmission system. IEEE Trans. Multimedia 21(8), 1905–1920 (2019)

    Article  Google Scholar 

  2. Ali, M., Anjum, A., Rana, O., Zamani, A.R., Balouek-Thomert, D., Parashar, M. (2020) RES: real-time video stream analytics using edge enhanced clouds. IEEE Transactions on Cloud Computing.

  3. Alarifi, A., Sankar, S., Altameem, T., Jithin, K.C., Amoon, M., El-Shafai, W.: A novel hybrid cryptosystem for secure streaming of high efficiency H. 265 compressed videos in IoT multimedia applications. IEEE Access 8, 128548–128573 (2020)

    Article  Google Scholar 

  4. Khari, M., Garg, A.K., Gandomi, A.H., Gupta, R., Patan, R., Balusamy, B.: Securing data in Internet of Things (IoT) using cryptography and steganography techniques. IEEE Trans. Syst. Man Cybernet. 50(1), 73–80 (2019)

    Article  Google Scholar 

  5. Challita, U., Ferdowsi, A., Chen, M., Saad, W.: Machine learning for wireless connectivity and security of cellular-connected UAVs. IEEE Wirel. Commun. 26(1), 28–35 (2019)

    Article  Google Scholar 

  6. Shi, H., Wang, Y., Li, Y., Ren, Y., Guo, C.: Region-based reversible medical image watermarking algorithm for privacy protection and integrity authentication. Multimedia Tools Appl. 80(16), 24631–24667 (2021)

    Article  Google Scholar 

  7. Huan W, Li S, Qian Z, Zhang X (2021) Exploring stable coefficients on joint sub-bands for robust video watermarking in DT CWT domain. IEEE Transactions on Circuits and Systems for Video Technology.

  8. Mareen, H., De Praeter, J., Wallendael, V., Lambert, P.: A novel video watermarking approach based on implicit distortions. IEEE Trans. Consum. Electron. 64(3), 250–258 (2018)

    Article  Google Scholar 

  9. Ayubi, P., Jafari Barani, M., Yousefi Valandar, M., Yosefnezhad Irani, B. and Sedagheh Maskan Sadigh, R., 2021. A new chaotic complex map for robust video watermarking. Artificial Intelligence Review54, pp.1237-1280.

  10. Li, X., Wang, Y., Wang, Q.H., Kim, S.T., Zhou, X.: Copyright protection for holographic Video using spatiotemporal consistent embedding strategy. IEEE Trans. Industr. Inf. 15(11), 6187–6197 (2019)

    Article  Google Scholar 

  11. Xu, H., Jiang, G., Yu, M., Luo, T.: A color image watermarking based on tensor analysis. IEEE Access 6, 51500–51514 (2018)

    Article  Google Scholar 

  12. Khan, M.A., Baccour, E., Chkirbene, Z., Erbad, A., Hamila, R., Hamdi, M. and Gabbouj, M., 2022. A survey on mobile edge computing for video streaming: Opportunities and challenges. IEEE Access.

  13. Mareen, H., De Praeter, J., Van Wallendael, G., Lambert, P.: A scalable architecture for uncompressed-domain watermarked videos. IEEE Trans. Inf. Forensics Secur. 14(6), 1432–1444 (2018)

    Article  Google Scholar 

  14. Singh R, Ashok A, Saraswat M (2021) Robust video watermarking in frequency domain for copyright protection. In: 2021 thirteenth international conference on contemporary computing (IC3–2021) (pp. 174–178).

  15. Astarkie MG, Gangone S, Bala B, Bharat Kumar GJ, Nagesh Y (2023) A novel approach for high authentication in digital watermarking technique. In: Proceedings of the international conference on cognitive and intelligent computing: ICCIC 2021, Volume 2 (pp. 241–246). Singapore: Springer Nature Singapore.

  16. El-Bakary, EM, El-Shafai W, El-Rabaie S, Zahran O, El-Halawany M, El-Samie FA (2023) Efficient secure optical DWT-based watermarked 3D video transmission over MC-CDMA wireless channel. J. Opt., pp.1–22.

  17. Hazim HT, Alseelawi N, ALRikabi HT (2023) A Novel Method of Invisible Video Watermarking Based on Index Mapping and Hybrid DWT-DCT. Int. J. Online Biomed. Eng., 19(4).

  18. Hosny, K.M., Darwish, M.M., Fouda, M.M.: Robust color images watermarking using new fractional order exponent moments. IEEE Access 9, 47425–47435 (2021)

    Article  Google Scholar 

  19. Hosny, K.M., Darwish, M.M.: Robust color image watermarking using multiple fractional-order moments and chaotic map. Multimedia Tools Appl. 81(17), 24347–24375 (2022)

    Article  Google Scholar 

  20. Li, X., Salehi, M.A., Joshi, Y., Darwich, M.K., Landreneau, B., Bayoumi, M.: Performance analysis and modeling of video transcoding using heterogeneous cloud services. IEEE Trans. Parallel Distrib. Syst. 30(4), 910–922 (2018)

    Article  Google Scholar 

  21. Zhou, W., Min, X., Li, H., Jiang, Q.: A brief survey on adaptive video streaming quality assessment. J. Vis. Commun. Image Represent. 86, 103526 (2022)

    Article  Google Scholar 

  22. Rashmi N, Jyothi K (2018) An improved method for reversible data hiding steganography combined with cryptography. In 2018 2nd International Conference on Inventive Systems and Control (ICISC) (pp. 81–84). IEEE.

  23. Sharma S, Sharma H, Sharma JB (2021) A new optimization based color image watermarking using non-negative matrix factorization in discrete cosine transform domain. J. Ambient Intell. Human. Comput., pp.1–23

  24. de Morais, W.G., Santos, C.E.M. and Pedroso, C.M., 2022. Application of active queue management for real-time adaptive video streaming. Telecommunication Systems, pp.1–10.

  25. Hurrah, N.N., Khan, E., Khan, U.: CADEN: cellular automata and DNA based secure framework for privacy preserving in IoT based healthcare. J. Ambient. Intell. Humaniz. Comput. 14(3), 2631–2643 (2023)

    Article  Google Scholar 

  26. Hurrah NN, Parah SA, Sheikh JA (2019). A secure medical image watermarking technique for e-healthcare applications. Handbook of Multimedia Information Security: Techniques and Applications, pp.119–141.

  27. Taha, M., Ali, A.: Smart algorithm in wireless networks for video streaming based on adaptive quantization. Concurrency Comput. 35(9), e7633 (2023)

    Article  Google Scholar 

  28. Siddique, A.A., Talha, S.M.U., Khan, M.U., Israr, A., Jilani, U. and Uddin, V., 2023. Efficient Online Lecture Platform: Design and Implementation of Optimized Temporal Masking Technique for Compressed Video Streaming. Wireless Personal Communications, pp.1–18.

  29. Agilandeeswari, L., Ganesan, K.: RST invariant robust video watermarking algorithm using quaternion curvelet transform. Multimedia Tools Appl. 77(19), 25431–25474 (2018)

    Article  Google Scholar 

  30. Arab F, Zamani M (2021) Video watermarking schemes resistance against tampering attacks. In 2021 International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME) (pp. 1–4). IEEE.

  31. Singh, A.K., Thakur, S., Jolfaei, A., Srivastava, G., Elhoseny, M.D., Mohan, A.: Joint encryption and compression-based watermarking technique for security of digital documents. ACM Trans. Internet Technol. (TOIT) 21(1), 1–20 (2021)

    Article  Google Scholar 

  32. Asikuzzaman, M., Alam, M.J., Lambert, A.J., Pickering, M.R.: Robust DT CWT-based DIBR 3D video watermarking using chrominance embedding. IEEE Trans. Multimedia 18(9), 1733–1748 (2016)

    Article  Google Scholar 

  33. Rasti, P., Samiei, S., Agoyi, M., Escalera, S., Anbarjafari, G.: Robust non-blind color video watermarking using QR decomposition and entropy analysis. J. Vis. Commun. Image Represent. 38, 838–847 (2016)

    Article  Google Scholar 

  34. Himeur, Y., Boukabou, A.: A robust and secure key-frames based video watermarking system using chaotic encryption. Multimedia Tools Appl. 77(7), 8603–8627 (2018)

    Article  Google Scholar 

  35. Zhao, J., Li, Z.: Three-dimensional histogram shifting for reversible data hiding. Multimedia Syst. 24(1), 95–109 (2018)

    Article  MathSciNet  Google Scholar 

  36. Valarmathi, K., Hemalatha, S., Perumal, P., Puthilibai, D., Abirami, M.: Shoulder surfing attack trusted verification–a survey. ECS Trans. 107(1), 16041 (2022)

    Article  Google Scholar 

  37. Wang, C., Shan, R., Zhou, X.: Anti-HEVC recompression video watermarking algorithm based on the all phase biorthogonal transform and SVD. IETE Tech. Rev. 35(sup1), 42–58 (2018)

    Article  Google Scholar 

  38. Karmakar, A., Phadikar, P.A., BS, Maity GK,: A blind video watermarking Scheme resistant to rotation and collusion attacks. J. King Saud Univ.-Comput. Inform. Sci. 28(2), 199–210 (2016)

    Google Scholar 

  39. Kumar M, Aggarwal J, Rani A, Stephan T, Shankar A, Mirjalili S (2022) Secure video communication using firefly optimization and visual cryptography. Artificial Intell. Rev., pp.1–21.

  40. Sharma, S., Sharma, H., Sharma, J.B.: An adaptive color image watermarking using RDWT-SVD and artificial bee colony based quality metric strength factor optimization. Appl. Soft Comput. 84, 105696 (2019)

    Article  Google Scholar 

  41. Sharma C, Bagga A, Singh BK, Shabaz M (2021) A novel optimized graph-based transform watermarking technique to address security issues in real-time application. Math. Prob. Eng., 2021.

  42. Sharma, S., Sharma, H., Sharma, J.B.: Artificial bee colony based perceptually tuned blind color image watermarking in hybrid LWT-DCT domain. Multimedia Tools Appl. 80, 18753–18785 (2021)

    Article  Google Scholar 

  43. Sahu, A.K., Umachandran, K., Biradar, V.D., Comfort, O., Sri Vigna Hema, V., Odimegwu, F., Saifullah, M.A.: A study on content tampering in multimedia watermarking. SN Comput. Sci. 4(3), 222 (2023)

    Article  Google Scholar 

  44. Sahu M, Padhy N, Gantayat SS, Sahu AK (2022) Performance analysis of various image steganography techniques. In 2022 Second International Conference on Computer Science, Engineering and Applications (ICCSEA) (pp. 1–6). IEEE.

  45. Kamil Khudhair S, Sahu M, KR R, Sahu AK (2023) Secure reversible data hiding using block-wise histogram shifting. Electronics, 12(5), p.1222

  46. Sahu, A.K.: A logistic map based blind and fragile watermarking for tamper detection and localization in images. J. Ambient. Intell. Humaniz. Comput. 13(8), 3869–3881 (2022)

    Article  Google Scholar 

  47. Sahu, M., Padhy, N., Gantayat, S.S., Sahu, A.K.: Shadow image based reversible data hiding using addition and subtraction logic on the LSB planes. Sens. Imaging 22(1), 7 (2021)

    Article  Google Scholar 

  48. Mallmann, J., Santin, A.O., Viegas, E.K., dos Santos, R.R., Geremias, J.: PPCensor: Architecture for real-time pornography detection in video streaming. Futur. Gener. Comput. Syst. 112, 945–955 (2020)

    Article  Google Scholar 

Download references

Acknowledgements

Not applicable.

Funding

Not applicable.

Author information

Authors and Affiliations

Authors

Contributions

KM agreed on the content of the study. KM and KV collected all the data for analysis. KM agreed on the methodology. KM and KV completed the analysis based on agreed steps. Results and conclusions are discussed and written together. All authors read and approved the final manuscript.

Corresponding author

Correspondence to K. Muthulakshmi.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Human and animal rights

This article does not contain any studies with human or animal subjects performed by any of the authors.

Informed consent

Informed consent was obtained from all individual participants included in the study.

Consent to participate

Not applicable.

Consent for publication

Not applicable.

Additional information

Communicated by Q. Shen.

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Supplementary Information

Below is the link to the electronic supplementary material.

Supplementary file1 (RAR 500 KB)

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Muthulakshmi, K., Valarmathi, K. A secure video data streaming model using modified firefly and SVD technique. Multimedia Systems 30, 86 (2024). https://doi.org/10.1007/s00530-024-01268-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s00530-024-01268-1

Keywords

Navigation