{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T09:22:15Z","timestamp":1770456135085,"version":"3.49.0"},"reference-count":31,"publisher":"Walter de Gruyter GmbH","issue":"1","license":[{"start":{"date-parts":[[2019,2,7]],"date-time":"2019-02-07T00:00:00Z","timestamp":1549497600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,12,18]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>This paper aims to propose a method for data hiding in video by utilizing the least significant bit (LSB) method and improving it by utilizing the knight tour algorithm for concealing the data inside the AVI video file and using a key function encryption method for encrypting the secret message. First, the secret message is encrypted by utilizing a mathematical equation. The key used in the equation is a set of random numbers. These numbers differ in each implementation to warrant the safety of the hidden message and to increase the security of the secret message. Then, the cover video was converted from a set of frames into separated images to take the advantage of the large size of video file. Afterward, the knight tour algorithm is utilized for random selecting of the pixels inside the frame utilized for embedding the secret message inside it to overcome the shortcoming of the conventional LSB method that utilized the serial selection of pixel and to increase the robustness and security of the proposed method. Afterward, the encrypted secret message is embedded inside the selected pixels by utilizing the LSB method in bits (7 and 8). The observational results have drawn that the proposed method has a superior performance compared to the previous steganography method in terms of quality by a high PSNR of 67.3638 dB and the lowest MSE of 0.2578. Furthermore, this method preserves the security where the secret message cannot be drawn out without knowing the decoding rules.<\/jats:p>","DOI":"10.1515\/jisys-2018-0225","type":"journal-article","created":{"date-parts":[[2019,2,7]],"date-time":"2019-02-07T04:03:06Z","timestamp":1549512186000},"page":"1216-1225","source":"Crossref","is-referenced-by-count":26,"title":["Video Steganography Using Knight Tour Algorithm and LSB Method for Encrypted Data"],"prefix":"10.1515","volume":"29","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6818-1392","authenticated-orcid":false,"given":"Zeyad Safaa","family":"Younus","sequence":"first","affiliation":[{"name":"Assistant Lecturer, Faculty of Computer Sciences and Mathematics, Software Engineering , University of Mosul , Mosul , Iraq , e-mail:"}]},{"given":"Ghada Thanoon","family":"Younus","sequence":"additional","affiliation":[{"name":"Lecturer, Faculty of Computer Sciences and Mathematics, Computer Science , University of Mosul , Mosul , Iraq"}]}],"member":"374","published-online":{"date-parts":[[2019,2,7]]},"reference":[{"key":"2025120523362753994_j_jisys-2018-0225_ref_001","doi-asserted-by":"crossref","unstructured":"S. A. Abbas, T. I. El Arif, F. F. Ghaleb and S. M. Khamis, Optimized video steganography using Cuckoo search algorithm, in: IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS\u201915), 2015, doi: 10.1109\/IntelCIS.2015.7397279.","DOI":"10.1109\/IntelCIS.2015.7397279"},{"key":"2025120523362753994_j_jisys-2018-0225_ref_002","doi-asserted-by":"crossref","unstructured":"S. A. Alhaj, A. M. Shaheen and T. M. Al-Kharoubi, Multi-layers video steganography, A Novel Technique for Image Hiding 4 (2016), 43\u201352.","DOI":"10.14738\/tnc.46.2529"},{"key":"2025120523362753994_j_jisys-2018-0225_ref_003","unstructured":"Z. S. Y. Alsaffawi, Image steganography by using exploiting modification direction and knight tour algorithm, J. Al-Qadisiyah Comput. Sci. Math. (QJCM) 8 (2016), 1\u201311."},{"key":"2025120523362753994_j_jisys-2018-0225_ref_004","doi-asserted-by":"crossref","unstructured":"S. Bahrami and M. Naderi, Encryption of video main frames in the field of DCT transform using A5\/1 and W7 stream encryption algorithms, Arab. J. Sci. Eng. 39 (2014), 4077\u20134088.","DOI":"10.1007\/s13369-014-1077-8"},{"key":"2025120523362753994_j_jisys-2018-0225_ref_005","doi-asserted-by":"crossref","unstructured":"D. Bharti and A. Kumar, Enhanced steganography algorithm to improve security by using vigenere encryption and first component alteration technique, Int. J. Eng. Trends Technol. (IJETT) 13 (2014), 242\u2013246.","DOI":"10.14445\/22315381\/IJETT-V13P250"},{"key":"2025120523362753994_j_jisys-2018-0225_ref_006","unstructured":"I. Cox, M. Miller, J. Bloom, J. Fridrich and T. Kalker, Digital and Watermarking, 2nd ed. Elsevier, USA, 2006."},{"key":"2025120523362753994_j_jisys-2018-0225_ref_007","doi-asserted-by":"crossref","unstructured":"Z. Elzbieta, M. Wojciech and S. Krzysztof, Trends in steganography, Commun. ACM 57 (2014), 86\u201395.","DOI":"10.1145\/2566590.2566610"},{"key":"2025120523362753994_j_jisys-2018-0225_ref_008","unstructured":"S. Ganzfried, A New Algorithm for Knight\u2019s Tours, REU Program in Mathematics at Oregon State University, Corvallis, OR, USA, 2004."},{"key":"2025120523362753994_j_jisys-2018-0225_ref_009","unstructured":"K. Jung, and K. Yoo, Improved exploiting modification direction method by modulus operation, Int. J. Signal Process. Image Process. Pattern Recognit. 2 (2009), 79\u201387."},{"key":"2025120523362753994_j_jisys-2018-0225_ref_010","unstructured":"M. Kalra and P. Singh, EMD techniques of image steganography a comparative study, International Journal of Technological Exploration and Learning (IJTEL) 3 (2014), 385\u2013390."},{"key":"2025120523362753994_j_jisys-2018-0225_ref_011","doi-asserted-by":"crossref","unstructured":"M. Kasapbas and W. Elmasry, New LSB-based colour image steganography method to enhance the efficiency in payload capacity, security and integrity check, Indian Acad. Sci. 43 (2018), 1\u201314.","DOI":"10.1007\/s12046-018-0848-4"},{"key":"2025120523362753994_j_jisys-2018-0225_ref_012","doi-asserted-by":"crossref","unstructured":"S. Katzenbeisser and F. Petitcolas, Information Hiding Techniques for Steganography and Digital Watermarking, Vol. 28, Artech House, Inc., Norwood, MA, USA, 2000.","DOI":"10.1201\/1079\/43263.28.6.20001201\/30373.5"},{"key":"2025120523362753994_j_jisys-2018-0225_ref_013","doi-asserted-by":"crossref","unstructured":"M. Kaur and K. Dhindsa, Enhancement of data security using video steganography, Int. J. Comput. Appl. 181 (2018), 34\u201338.","DOI":"10.5120\/ijca2018917472"},{"key":"2025120523362753994_j_jisys-2018-0225_ref_014","doi-asserted-by":"crossref","unstructured":"H. Khanzadi, M. Eshghi and S. E. Borujeni, Image encryption using random bit sequence based on chaotic maps, Arab. J. Sci. Eng. 39 (2014), 1039\u20131047.","DOI":"10.1007\/s13369-013-0713-z"},{"key":"2025120523362753994_j_jisys-2018-0225_ref_015","doi-asserted-by":"crossref","unstructured":"V. Kumar and D. Kumar, Performance evaluation of modified color image steganography using discrete wavelet transform, J. Intell. Syst. (2017), doi:10.1515\/jisys-2017-0134.","DOI":"10.1515\/jisys-2017-0134"},{"key":"2025120523362753994_j_jisys-2018-0225_ref_016","unstructured":"B. Michael and C. Cachin, Public-key steganography with active attacks, IBM Res. 3378 (2004), 1\u201316."},{"key":"2025120523362753994_j_jisys-2018-0225_ref_017","unstructured":"M. H. Mohammed, M. R. Mohd Shafry and A. A. Ali, A review and open issues of multifarious image steganography techniques in spatial domain, J. Theor. Appl. Inform. Technol. 96 (2018), 956\u2013977."},{"key":"2025120523362753994_j_jisys-2018-0225_ref_018","doi-asserted-by":"crossref","unstructured":"Z. F. Muhsin, A. Rehman, A. Altameem, T. Saba and M. Uddin, Improved quad tree image segmentation approach to region information, Imaging Sci. J. 62 (2014), 56\u201362.","DOI":"10.1179\/1743131X13Y.0000000063"},{"key":"2025120523362753994_j_jisys-2018-0225_ref_019","doi-asserted-by":"crossref","unstructured":"S. Mumthas and A. Lijiya, Transform domain video steganography using RSA, random DNA encryption and Huffman encoding, in: 7th International Conference on Advances in Computing and Communications ICACC-2017, 115, pp. 660\u2013666, 2017.","DOI":"10.1016\/j.procs.2017.09.152"},{"key":"2025120523362753994_j_jisys-2018-0225_ref_020","doi-asserted-by":"crossref","unstructured":"S. I. Nipanikar and V. Hima Deepthi, A multiple criteria-based cost function using wavelet and edge transformation for medical image steganography, J. Intell. Syst. 27 (2016), doi:10.1515\/jisys-2016-0095.","DOI":"10.1515\/jisys-2016-0095"},{"key":"2025120523362753994_j_jisys-2018-0225_ref_021","unstructured":"A. Putu, M. Gusti and M. Ni, A MP4 video steganography using least significant bit (LSB) substitution and advanced encryption standard (AES), J. Theor. Appl. Inform. Technol. 95 (2017), 5805\u20135814."},{"key":"2025120523362753994_j_jisys-2018-0225_ref_022","doi-asserted-by":"crossref","unstructured":"K. Rajalakshmi and K. Mahesh, Video steganography based on embedding the video using PCF technique, in: IEEE 2017 International Conference on Information communication and Embedded Systems(ICICES), pp. 1\u20134, 2017.","DOI":"10.1109\/ICICES.2017.8070726"},{"key":"2025120523362753994_j_jisys-2018-0225_ref_023","doi-asserted-by":"crossref","unstructured":"J. J. Ranjani, Data hiding using pseudo magic squares for embedding high payload in digital images, Multimed. Tools Appl. 76 (2017), 3715\u20133729.","DOI":"10.1007\/s11042-016-3974-1"},{"key":"2025120523362753994_j_jisys-2018-0225_ref_024","doi-asserted-by":"crossref","unstructured":"K. Rezagholipour and M. Eshghi, Video steganography algorithm based on motion vector of moving object, in: IEEE Eighth International Conference on Information and Knowledge Technology (IKT), 2016, doi: 10.1109\/IKT.2016.7777764.","DOI":"10.1109\/IKT.2016.7777764"},{"key":"2025120523362753994_j_jisys-2018-0225_ref_025","unstructured":"U. Sahu and S. Mitra, A secure data hiding technique using video steganography, Int. J. Comput. Sci. Commun. Netw. 5 (2015), 348\u2013357."},{"key":"2025120523362753994_j_jisys-2018-0225_ref_026","doi-asserted-by":"crossref","unstructured":"A. Saleema and T. Amarunnishad, A new steganography algorithm using hybrid fuzzy neural networks, in: International Conference on Emerging Trends in Engineering, Science and Technology (ICETEST-2015), 24, pp. 1566\u20131574, 2016.","DOI":"10.1016\/j.protcy.2016.05.139"},{"key":"2025120523362753994_j_jisys-2018-0225_ref_027","doi-asserted-by":"crossref","unstructured":"P. Sethi and V. Kapoor, A proposed novel architecture for information hiding in image steganography by using genetic algorithm and cryptography, Int. Conf. Comput. Sci. 87 (2016), 61\u201366.","DOI":"10.1016\/j.procs.2016.05.127"},{"key":"2025120523362753994_j_jisys-2018-0225_ref_028","doi-asserted-by":"crossref","unstructured":"A. Shjul and U. Kulkarni, A secure skin tone based steganography using wavelet transform, IJCTE 3 (2011), 16\u201322.","DOI":"10.7763\/IJCTE.2011.V3.277"},{"key":"2025120523362753994_j_jisys-2018-0225_ref_029","doi-asserted-by":"crossref","unstructured":"A. Solichin and Painem, Motion-based less significant frame for improving lsb-based video steganography, in: IEEE International Seminar on Application for Technology of Information and Communication (ISemantic), 2016, doi: 10.1109\/ISEMANTIC.2016.7873834.","DOI":"10.1109\/ISEMANTIC.2016.7873834"},{"key":"2025120523362753994_j_jisys-2018-0225_ref_030","doi-asserted-by":"crossref","unstructured":"K. Sudeepa, K. Raju, K. Ranjan and A. Ghanesh, A new approach for video steganography based on randomization and parallelization, in: International Conference on Information Security and Privacy, 78, pp. 483\u2013490, 2016.","DOI":"10.1016\/j.procs.2016.02.092"},{"key":"2025120523362753994_j_jisys-2018-0225_ref_031","doi-asserted-by":"crossref","unstructured":"V. Thanikaiselvan, P. Arulmozhivarman, A. Rengarajan, B. John and R. Balaguru, Horse riding and hiding in image for data guarding, in: International Conference on Communication Technology and System Design 2011, Procedia Engineering 30th 2012, 2012, pp. 36\u201344, 2012.","DOI":"10.1016\/j.proeng.2012.01.831"}],"container-title":["Journal of Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.degruyter.com\/view\/journals\/jisys\/29\/1\/article-p1216.xml","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jisys-2018-0225\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jisys-2018-0225\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T23:37:43Z","timestamp":1764977863000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jisys-2018-0225\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2,7]]},"references-count":31,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2018,4,25]]},"published-print":{"date-parts":[[2019,12,18]]}},"alternative-id":["10.1515\/jisys-2018-0225"],"URL":"https:\/\/doi.org\/10.1515\/jisys-2018-0225","relation":{},"ISSN":["2191-026X","0334-1860"],"issn-type":[{"value":"2191-026X","type":"electronic"},{"value":"0334-1860","type":"print"}],"subject":[],"published":{"date-parts":[[2019,2,7]]}}}