A Security Mechanism for Video Data hiding

  IJCOT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© - August Issue 2013 by IJCTT Journal
Volume-4 Issue-8                           
Year of Publication : 2013
Authors :Mr Sudheer Adepu, Mr P. Ashok , Dr.C.V.Guru Rao

MLA

Mr Sudheer Adepu, Mr P. Ashok , Dr.C.V.Guru Rao"A Security Mechanism for Video Data hiding"International Journal of Computer Trends and Technology (IJCTT),V4(8):2951-2955 August Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract:- Video data hiding is at rest an essential research subject. We implementing an advanced video data hiding method that performs erasure correction capability of repeat accumulate codes and superiority of forbidden zone data hiding. Selective embedded is applied in the suggested procedure to conclude host signal samples that appropriate for data hiding. This method includes a temporal synchronization scheme in the sequence to resist insert attacks and frame drop. The suggested frame work is examined by emblematic broadcast temporal against MPEG-2, H.264 compression, frame rate adaptation attacks and other familiar video data hiding methods. The decoding error principles are stated for conventional system parameters. The simulation outputs specified that the frame work can be favorably makes use in video data hiding operations.

 

References-
[1] S. K. Kapotas, E. E. Varsaki, and A. N. Skodras, “Data hiding in H- 264 encoded video sequences,” in Proc. IEEE 9th Workshop Multimedia Signal Process., Oct. 2007, pp. 373–376. [2] A. Sarkar, U. Madhow, S. Chandrasekaran, and B. S. Manjunath, “Adaptive MPEG-2 video data hiding scheme,” in Proc. 9th SPIE Security Steganography Watermarking Multimedia Contents, 2007, pp. 373–376. [3] K. Solanki, N. Jacobsen, U. Madhow, B. S. Manjunath, and S. Chandrasekaran, “Robust image-adaptive data hiding using erasure and error correction,” IEEE Trans. Image Process., vol. 13, no. 12, pp. 1627–1639, Dec. 2004. [4] M. Schlauweg, D. Profrock, and E. Muller, “Correction of insertions and deletions in selective watermarking,” in Proc. IEEE Int. Conf. SITIS, Nov.–Dec. 2008, pp. 277–284. [5] H. Liu, J. Huang, and Y. Q. Shi, “DWT-based video data hiding robust to MPEG compression and frame loss,” Int. J. Image Graph., vol. 5, no. 1, pp. 111–134, Jan. 2005. [6] M. Wu, H. Yu, and B. Liu, “Data hiding in image and video: I. Fundamental issues and solutions,” IEEE Trans. Image Process., vol. 12, no. 6, pp. 685–695, Jun. 2003. [7] M. Wu, H. Yu, and B. Liu, “Data hiding in image and video: II. Designs and applications,” IEEE Trans. Image Process., vol. 12, no. 6, pp. 696– 705, Jun. 2003. [8] E. Esen and A. A. Alatan, “Forbidden zone data hiding,” in Proc. IEEE Int. Conf. Image Process., Oct. 2006, pp. 1393–1396. [9] B. Chen and G. W. Wornell, “Quantization index modulation: A class of provably good methods for digital watermarking and information embedding,” IEEE Trans. Inform. Theory, vol. 47, no. 4, pp. 1423–1443, May 2001. [10] E. Esen, Z. Do?gan, T. K. Ates, and A. A. Alatan, “Comparison of quantization index modulation and forbidden zone data hiding for compressed domain video data hiding,” in Proc. IEEE 17th Signal Process. Commun. Applicat. Conf., Apr. 2009, pp. 404–407

Keywords : Data hiding, forbidden zone data hiding, quantization index modulation, repeat accumulate