Skip to main content
Top
Published in: Neural Computing and Applications 11/2023

06-01-2023 | Original Article

An efficient Sheep Flock Optimization-based hybrid deep RaNN for secure and enhanced video transmission quality

Author: R. B. Benisha

Published in: Neural Computing and Applications | Issue 11/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Video communication gained wide popularity since it offers a more real-time mode of face-to-face interaction. This paper mainly aims to enhance the video transmission quality of multimedia applications via communication network security improvement and an adaptive resource allocation strategy. The main aim of the resource allocation strategy is to achieve efficient usage of spectrum resources since video communication utilizes the orthogonal subcarriers for data transmission and the need for conversion of non-flat channels to flat. An optimized Hybrid Deep Random Neural Network (HDRaNN) architecture is used to overcome the adaptive spectrum resource allocation problem in the single-frequency network transmission by taking into account the different time–frequency resources and regions for overlapping areas and the same time–frequency for non-overlapping areas. The Sheep Flock Optimization algorithm is used to minimize the network error rate of the HDRaNN architecture by optimizing the weights and biases. The basic purpose of communication network security in this paper is to ensure that data communicated over a network connection are safe and secure. The network security protocol offers protection from unauthorized data retrieval and attempts to obtain data. The protocols utilized for secure communication in the proposed technique are Secure Hypertext Transfer Protocol, Secure Socket Layer, Simple Network Management Protocol, and Secure File Transfer Protocol. This protocol also assures that unauthorized users, devices, or services do not have access to your network data and works on all network mediums and data types. The extensive experiments conducted using the proposed methodology show improvements in the video transmission quality in terms of high diversity gain, security, increased throughput, and minimized bit error rate.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Kagita MK, Thilakarathne N, Gadekallu TR, Maddikunta PKR (2022) A review on security and privacy of internet of medical things. In: Intelligent Internet of Things for Healthcare and Industry. Springer, Cham, pp 171–187 Kagita MK, Thilakarathne N, Gadekallu TR, Maddikunta PKR (2022) A review on security and privacy of internet of medical things. In: Intelligent Internet of Things for Healthcare and Industry. Springer, Cham, pp 171–187
3.
go back to reference Gilbert AW, Booth G, Betts T, Goldberg A (2021) A mixed-methods survey to explore issues with virtual consultations for musculoskeletal care during the COVID-19 pandemic. BMC Musculoskelet Disord 22(1):1–10CrossRef Gilbert AW, Booth G, Betts T, Goldberg A (2021) A mixed-methods survey to explore issues with virtual consultations for musculoskeletal care during the COVID-19 pandemic. BMC Musculoskelet Disord 22(1):1–10CrossRef
4.
go back to reference Dar K, Bakhouya M, Gaber J, Wack M, Lorenz P (2010) Wireless communication technologies for ITS applications [Topics in Automotive Networking]. IEEE Commun Mag 48(5):156–162CrossRef Dar K, Bakhouya M, Gaber J, Wack M, Lorenz P (2010) Wireless communication technologies for ITS applications [Topics in Automotive Networking]. IEEE Commun Mag 48(5):156–162CrossRef
5.
go back to reference Qiao J, He Y, Shen XS (2018) Improving video streaming quality in 5G enabled vehicular networks. IEEE Wirel Commun 25(2):133–139CrossRef Qiao J, He Y, Shen XS (2018) Improving video streaming quality in 5G enabled vehicular networks. IEEE Wirel Commun 25(2):133–139CrossRef
6.
go back to reference Park C, Kim DG, Cho S, Han HJ (2019) Adoption of multimedia technology for learning and gender difference. Comput Hum Behav 92:288–296CrossRef Park C, Kim DG, Cho S, Han HJ (2019) Adoption of multimedia technology for learning and gender difference. Comput Hum Behav 92:288–296CrossRef
7.
go back to reference Naseer Y, Shah D, Shah T (2019) A novel approach to improve multimedia security utilizing 3D mixed chaotic map. Microprocess Microsyst 65:1–6CrossRef Naseer Y, Shah D, Shah T (2019) A novel approach to improve multimedia security utilizing 3D mixed chaotic map. Microprocess Microsyst 65:1–6CrossRef
8.
go back to reference Ma S, Zhang T, Wu A, Zhao X (2019) Lightweight and privacy-preserving data aggregation for mobile multimedia security. IEEE Access 7:114131–114140CrossRef Ma S, Zhang T, Wu A, Zhao X (2019) Lightweight and privacy-preserving data aggregation for mobile multimedia security. IEEE Access 7:114131–114140CrossRef
9.
go back to reference Stooke A, Achiam J, Abbeel P (2020) Responsive safety in reinforcement learning by pid lagrangian methods. In: International Conference on Machine Learning. PMLR, pp 9133–9143 Stooke A, Achiam J, Abbeel P (2020) Responsive safety in reinforcement learning by pid lagrangian methods. In: International Conference on Machine Learning. PMLR, pp 9133–9143
10.
go back to reference Guangzhi W (2021) Application of adaptive resource allocation algorithm and communication network security in improving educational video transmission quality. Alex Eng J 60(5):4231–4241CrossRef Guangzhi W (2021) Application of adaptive resource allocation algorithm and communication network security in improving educational video transmission quality. Alex Eng J 60(5):4231–4241CrossRef
11.
go back to reference Comşa IS, Molnar A, Tal I, Bergamin P, Muntean GM, Muntean CH, Trestian R (2021) A machine learning resource allocation solution to improve video quality in remote education. IEEE Trans Broadcast 67(3):664–684CrossRef Comşa IS, Molnar A, Tal I, Bergamin P, Muntean GM, Muntean CH, Trestian R (2021) A machine learning resource allocation solution to improve video quality in remote education. IEEE Trans Broadcast 67(3):664–684CrossRef
13.
go back to reference Yu J, Ye X, Li H (2022) A high precision intrusion detection system for network security communication based on multi-scale convolutional neural network. Futur Gener Comput Syst 129:399–406CrossRef Yu J, Ye X, Li H (2022) A high precision intrusion detection system for network security communication based on multi-scale convolutional neural network. Futur Gener Comput Syst 129:399–406CrossRef
15.
go back to reference Jothi S, Chandrasekar A (2022) An efficient modified dragonfly optimization based MIMO-OFDM for enhancing QoS in wireless multimedia communication. Wirel Pers Commun 122(2):1043–1065CrossRef Jothi S, Chandrasekar A (2022) An efficient modified dragonfly optimization based MIMO-OFDM for enhancing QoS in wireless multimedia communication. Wirel Pers Commun 122(2):1043–1065CrossRef
16.
go back to reference Madarasingha C, Muramudalige SR, Jourjon G, Jayasumana A, Thilakarathna K (2022) VideoTrain++: GAN-based adaptive framework for synthetic video traffic generation. Comput Netw 206:108785CrossRef Madarasingha C, Muramudalige SR, Jourjon G, Jayasumana A, Thilakarathna K (2022) VideoTrain++: GAN-based adaptive framework for synthetic video traffic generation. Comput Netw 206:108785CrossRef
18.
go back to reference Reyes RR, Bauschert T (2017) Adaptive and state-dependent online resource allocation in dynamic optical networks. J Opt Commun Netw 9(3):B64–B77CrossRef Reyes RR, Bauschert T (2017) Adaptive and state-dependent online resource allocation in dynamic optical networks. J Opt Commun Netw 9(3):B64–B77CrossRef
19.
go back to reference Kwon T, Cho DH (2008) Adaptive-modulation-and-coding-based transmission of control messages for resource allocation in mobile communication systems. IEEE Trans Veh Technol 58(6):2769–2782CrossRef Kwon T, Cho DH (2008) Adaptive-modulation-and-coding-based transmission of control messages for resource allocation in mobile communication systems. IEEE Trans Veh Technol 58(6):2769–2782CrossRef
20.
go back to reference Hadi M, Pakravan MR, Agrell E (2019) Dynamic resource allocation in metro elastic optical networks using Lyapunov drift optimization. J Opt Commun Netw 11(6):250–259CrossRef Hadi M, Pakravan MR, Agrell E (2019) Dynamic resource allocation in metro elastic optical networks using Lyapunov drift optimization. J Opt Commun Netw 11(6):250–259CrossRef
21.
go back to reference Tang L, Tan QI, Shi Y, Wang C, Chen Q (2018) Adaptive virtual resource allocation in 5G network slicing using constrained Markov decision process. IEEE Access 6:61184–61195CrossRef Tang L, Tan QI, Shi Y, Wang C, Chen Q (2018) Adaptive virtual resource allocation in 5G network slicing using constrained Markov decision process. IEEE Access 6:61184–61195CrossRef
22.
go back to reference Tang L, He X, Yang X, Wei Y, Wang X, Chen Q (2019) ARMA-prediction-based online adaptive dynamic resource allocation in wireless virtualized network. IEEE Access 7:130438–130450CrossRef Tang L, He X, Yang X, Wei Y, Wang X, Chen Q (2019) ARMA-prediction-based online adaptive dynamic resource allocation in wireless virtualized network. IEEE Access 7:130438–130450CrossRef
23.
go back to reference Singkibud P, Mukdasai K (2022) Robust passivity analysis of uncertain neutral-type neural networks with distributed interval time-varying delay under the effects of leakage delay. Int J Math Comput Sci 26:269–290 Singkibud P, Mukdasai K (2022) Robust passivity analysis of uncertain neutral-type neural networks with distributed interval time-varying delay under the effects of leakage delay. Int J Math Comput Sci 26:269–290
24.
go back to reference Kumar P, Panwar V (2022) Wavelet neural network based controller design for non-affine nonlinear systems. J Math Comput Sci 24(1):49–58CrossRef Kumar P, Panwar V (2022) Wavelet neural network based controller design for non-affine nonlinear systems. J Math Comput Sci 24(1):49–58CrossRef
25.
go back to reference Mahmood K, Akram W, Shafiq A, Altaf I, Lodhi MA, Islam SH (2020) An enhanced and provably secure multi-factor authentication scheme for Internet-of-Multimedia-Things environments. Comput Electr Eng 88:106888CrossRef Mahmood K, Akram W, Shafiq A, Altaf I, Lodhi MA, Islam SH (2020) An enhanced and provably secure multi-factor authentication scheme for Internet-of-Multimedia-Things environments. Comput Electr Eng 88:106888CrossRef
26.
go back to reference Almasalha F, Naït-Abdesselam F, Trajcevski G, Khokhar A (2018) Secure transmission of multimedia contents over low-power mobile devices. J Inf Secur Appl 40:183–192 Almasalha F, Naït-Abdesselam F, Trajcevski G, Khokhar A (2018) Secure transmission of multimedia contents over low-power mobile devices. J Inf Secur Appl 40:183–192
27.
go back to reference Xiao K (2021) Construction of embedded secure terminal and multimedia database based on trusted computing technology and wireless network. Alex Eng J 60(5):4223–4230CrossRef Xiao K (2021) Construction of embedded secure terminal and multimedia database based on trusted computing technology and wireless network. Alex Eng J 60(5):4223–4230CrossRef
28.
go back to reference Mishra D, Rana S (2021) A provably secure content distribution framework for portable DRM systems. J Inf Secur Appl 61:102928 Mishra D, Rana S (2021) A provably secure content distribution framework for portable DRM systems. J Inf Secur Appl 61:102928
29.
go back to reference Abunadi I, Abdullah Mengash HS, Alotaibi S, Asiri MM, Ahmed Hamza M, Zamani AS, Motwakel A, Yaseen I (2022) Optimal multikey homomorphic encryption with steganography approach for multimedia security in internet of everything environment. Appl Sci 12(8):4026CrossRef Abunadi I, Abdullah Mengash HS, Alotaibi S, Asiri MM, Ahmed Hamza M, Zamani AS, Motwakel A, Yaseen I (2022) Optimal multikey homomorphic encryption with steganography approach for multimedia security in internet of everything environment. Appl Sci 12(8):4026CrossRef
32.
go back to reference Huma ZE, Latif S, Ahmad J, Idrees Z, Ibrar A, Zou Z, Alqahtani F, Baothman F (2021) A hybrid deep random neural network for cyberattack detection in the industrial internet of things. IEEE Access 9:55595–55605CrossRef Huma ZE, Latif S, Ahmad J, Idrees Z, Ibrar A, Zou Z, Alqahtani F, Baothman F (2021) A hybrid deep random neural network for cyberattack detection in the industrial internet of things. IEEE Access 9:55595–55605CrossRef
33.
go back to reference Suresh S, Dong K, Kim HJ (2010) A sequential learning algorithm for self-adaptive resource allocation network classifier. Neurocomputing 73(16–18):3012–3019CrossRef Suresh S, Dong K, Kim HJ (2010) A sequential learning algorithm for self-adaptive resource allocation network classifier. Neurocomputing 73(16–18):3012–3019CrossRef
34.
go back to reference Kivi ME, Majidnezhad V (2022) A novel swarm intelligence algorithm inspired by the grazing of sheep. J Ambient Intell Humaniz Comput 13(2):1201–1213CrossRef Kivi ME, Majidnezhad V (2022) A novel swarm intelligence algorithm inspired by the grazing of sheep. J Ambient Intell Humaniz Comput 13(2):1201–1213CrossRef
35.
go back to reference Radley S (2020) Programmed routing in the direction of MST by virtue of port dependent decision device. i-Manager’s J Commun Eng Syst 9(1):8 Radley S (2020) Programmed routing in the direction of MST by virtue of port dependent decision device. i-Manager’s J Commun Eng Syst 9(1):8
36.
go back to reference Banerjee S, Patil A, Jadhav D, Borkar G (2022) Digital forensics as a service: analysis for forensic knowledge. In: Cyber security and digital forensics, pp127–162 Banerjee S, Patil A, Jadhav D, Borkar G (2022) Digital forensics as a service: analysis for forensic knowledge. In: Cyber security and digital forensics, pp127–162
37.
go back to reference Bitton R, Shabtai A (2019) A machine learning-based intrusion detection system for securing remote desktop connections to electronic flight bag servers. IEEE Trans Dependable Secure Comput 18(3):1164–1181CrossRef Bitton R, Shabtai A (2019) A machine learning-based intrusion detection system for securing remote desktop connections to electronic flight bag servers. IEEE Trans Dependable Secure Comput 18(3):1164–1181CrossRef
38.
go back to reference Li J, Jia Y, Liu L, Wo T (2013) CyberLiveApp: a secure sharing and migration approach for live virtual desktop applications in a cloud environment. Futur Gener Comput Syst 29(1):330–340CrossRef Li J, Jia Y, Liu L, Wo T (2013) CyberLiveApp: a secure sharing and migration approach for live virtual desktop applications in a cloud environment. Futur Gener Comput Syst 29(1):330–340CrossRef
39.
go back to reference Zhang Y, Li P, Wang D, Zheng W (2006) Seamless peripherals integration for network computers based on the reversed server message block protocol. In: International conference on Networking and Services (ICNS'06). IEEE, pp 112–112 Zhang Y, Li P, Wang D, Zheng W (2006) Seamless peripherals integration for network computers based on the reversed server message block protocol. In: International conference on Networking and Services (ICNS'06). IEEE, pp 112–112
Metadata
Title
An efficient Sheep Flock Optimization-based hybrid deep RaNN for secure and enhanced video transmission quality
Author
R. B. Benisha
Publication date
06-01-2023
Publisher
Springer London
Published in
Neural Computing and Applications / Issue 11/2023
Print ISSN: 0941-0643
Electronic ISSN: 1433-3058
DOI
https://doi.org/10.1007/s00521-022-08083-7

Other articles of this Issue 11/2023

Neural Computing and Applications 11/2023 Go to the issue

Premium Partner