Optimizing Region of Interest Selection for Effective Embedding in Video Steganography Based on Genetic Algorithms
- URL: http://arxiv.org/abs/2508.13710v1
- Date: Tue, 19 Aug 2025 10:16:45 GMT
- Title: Optimizing Region of Interest Selection for Effective Embedding in Video Steganography Based on Genetic Algorithms
- Authors: Nizheen A. Ali, Ramadhan J. Mstafa,
- Abstract summary: This paper proposes a new method to video steganography, which involves utilizing a Genetic Algorithm (GA) for identifying the Region of Interest (ROI) in the cover video.<n>The secret data is encrypted using the Advanced Encryption Standard (AES), which is a widely accepted encryption standard, before being embedded into the cover video.<n>The proposed method has a high embedding capacity and efficiency, with a PSNR ranging between 64 and 75 dBs, which indicates that the embedded data is almost indistinguishable from the original video.
- Score: 1.6114012813668932
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: With the widespread use of the internet, there is an increasing need to ensure the security and privacy of transmitted data. This has led to an intensified focus on the study of video steganography, which is a technique that hides data within a video cover to avoid detection. The effectiveness of any steganography method depends on its ability to embed data without altering the original video quality while maintaining high efficiency. This paper proposes a new method to video steganography, which involves utilizing a Genetic Algorithm (GA) for identifying the Region of Interest (ROI) in the cover video. The ROI is the area in the video that is the most suitable for data embedding. The secret data is encrypted using the Advanced Encryption Standard (AES), which is a widely accepted encryption standard, before being embedded into the cover video, utilizing up to 10% of the cover video. This process ensures the security and confidentiality of the embedded data. The performance metrics for assessing the proposed method are the Peak Signal to Noise Ratio (PSNR) and the encoding and decoding time. The results show that the proposed method has a high embedding capacity and efficiency, with a PSNR ranging between 64 and 75 dBs, which indicates that the embedded data is almost indistinguishable from the original video. Additionally, the method can encode and decode data quickly, making it efficient for real time applications.
Related papers
- InfoTok: Adaptive Discrete Video Tokenizer via Information-Theoretic Compression [114.03378443007074]
Current tokenizers rigidly compress all content at a fixed rate, leading to redundancy or information loss.<n>This paper introduces InfoTok, a principled framework for adaptive video tokenization.<n>We develop a transformer-based adaptive compressor that enables adaptive tokenization.
arXiv Detail & Related papers (2025-12-18T17:13:59Z) - Reversible Video Steganography Using Quick Response Codes and Modified ElGamal Cryptosystem [1.90365714903665]
A novel solution to reversible video steganography based on DWT and QR codes is proposed.<n>The visual imperceptibility, robustness, and embedding capacity of these approaches are all challenges that must be addressed.<n>Aside from visual imperceptibility, the suggested method exceeds current methods in terms of PSNR average of 52.143 dB, and embedding capacity 1 bpp.
arXiv Detail & Related papers (2025-08-10T10:56:10Z) - Leveraging Pre-Trained Visual Models for AI-Generated Video Detection [54.88903878778194]
The field of video generation has advanced beyond DeepFakes, creating an urgent need for methods capable of detecting AI-generated videos with generic content.<n>We propose a novel approach that leverages pre-trained visual models to distinguish between real and generated videos.<n>Our method achieves high detection accuracy, above 90% on average, underscoring its effectiveness.
arXiv Detail & Related papers (2025-07-17T15:36:39Z) - Securing Immersive 360 Video Streams through Attribute-Based Selective Encryption [1.6768151308423365]
This paper proposes a novel framework integrating Attribute-Based Encryption (ABE) with selective encryption techniques tailored specifically for tiled 360deg video streaming.<n>Our approach employs selective encryption of frames at varying levels to reduce computational overhead while ensuring robust protection against unauthorized access.<n>We deploy and evaluate our proposed approach using the CloudLab testbed, comparing its performance against traditional HTTPS streaming.
arXiv Detail & Related papers (2025-05-07T14:37:13Z) - Secure Information Embedding in Images with Hybrid Firefly Algorithm [2.9182357325967145]
This research introduces a novel steganographic approach for concealing a confidential portable document format (PDF) document within a host image.
The purpose of this search is to accomplish two main goals: increasing the host image's capacity and reducing distortion.
The findings indicate a decrease in image distortion and an accelerated rate of convergence in the search process.
arXiv Detail & Related papers (2023-12-21T01:50:02Z) - EmbAu: A Novel Technique to Embed Audio Data Using Shuffled Frog Leaping
Algorithm [0.7673339435080445]
The aim of steganographic algorithms is to identify the appropriate pixel positions in the host or cover image, where bits of sensitive information can be concealed for data encryption.
Work is being done to improve the capacity to integrate sensitive information and to maintain the visual appearance of the steganographic image.
We use the Shuffled Frog Leaping Algorithm (SFLA) to determine the order of pixels by which sensitive information can be placed in the cover image.
arXiv Detail & Related papers (2023-12-13T17:34:08Z) - Vehicle Detection and Classification without Residual Calculation:
Accelerating HEVC Image Decoding with Random Perturbation Injection [0.0]
This study introduces a novel random perturbation-based compressed domain method for reconstructing images from HEVC bitstreams.
We demonstrate a significant increase in the reconstruction speed compared to the traditional full decoding approach.
We achieve a detection accuracy of 99.9%, on par with the pixel domain method, and a classification accuracy of 96.84%, only 0.98% lower than the pixel domain method.
arXiv Detail & Related papers (2023-05-14T22:04:00Z) - Perfectly Secure Steganography Using Minimum Entropy Coupling [60.154855689780796]
We show that a steganography procedure is perfectly secure under Cachin 1998's information-theoretic model of steganography.
We also show that, among perfectly secure procedures, a procedure maximizes information throughput if and only if it is induced by a minimum entropy coupling.
arXiv Detail & Related papers (2022-10-24T17:40:07Z) - Deep Video Prior for Video Consistency and Propagation [58.250209011891904]
We present a novel and general approach for blind video temporal consistency.
Our method is only trained on a pair of original and processed videos directly instead of a large dataset.
We show that temporal consistency can be achieved by training a convolutional neural network on a video with Deep Video Prior.
arXiv Detail & Related papers (2022-01-27T16:38:52Z) - Shot boundary detection method based on a new extensive dataset and
mixed features [68.8204255655161]
Shot boundary detection in video is one of the key stages of video data processing.
New method for shot boundary detection based on several video features, such as color histograms and object boundaries, has been proposed.
arXiv Detail & Related papers (2021-09-02T16:19:24Z) - Robust Unsupervised Video Anomaly Detection by Multi-Path Frame
Prediction [61.17654438176999]
We propose a novel and robust unsupervised video anomaly detection method by frame prediction with proper design.
Our proposed method obtains the frame-level AUROC score of 88.3% on the CUHK Avenue dataset.
arXiv Detail & Related papers (2020-11-05T11:34:12Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.