Research Article | Open Access | Download PDF
Volume 4 | Issue 8 | Year 2013 | Article Id. IJCTT-V4I8P202 | DOI : https://doi.org/10.14445/22312803/IJCTT-V4I8P202
A Security Mechanism for Video Data hiding
Mr Sudheer Adepu, Mr P. Ashok , Dr.C.V.Guru Rao
Citation :
Mr Sudheer Adepu, Mr P. Ashok , Dr.C.V.Guru Rao, "A Security Mechanism for Video Data hiding," International Journal of Computer Trends and Technology (IJCTT), vol. 4, no. 8, pp. 2951-2955, 2013. Crossref, https://doi.org/10.14445/22312803/IJCTT-V4I8P202
Abstract
Video data hiding is at rest an essential research subject. We implementing an advanced video data hiding method that performs erasure correction capability of repeat accumulate codes and superiority of forbidden zone data hiding. Selective embedded is applied in the suggested procedure to conclude host signal samples that appropriate for data hiding. This method includes a temporal synchronization scheme in the sequence to resist insert attacks and frame drop. The suggested frame work is examined by emblematic broadcast temporal against MPEG-2, H.264 compression, frame rate adaptation attacks and other familiar video data hiding methods. The decoding error principles are stated for conventional system parameters. The simulation outputs specified that the frame work can be favorably makes use in video data hiding operations.
Keywords
Data hiding, forbidden zone data hiding, quantization index modulation, repeat accumulate.
References
[1] S. K. Kapotas, E. E. Varsaki, and A. N. Skodras, “Data hiding in H- 264 encoded video sequences,” in Proc. IEEE 9th Workshop Multimedia Signal Process., Oct. 2007, pp. 373–376.
[2] A. Sarkar, U. Madhow, S. Chandrasekaran, and B. S. Manjunath, “Adaptive MPEG-2 video data hiding scheme,” in Proc. 9th SPIE Security Steganography Watermarking Multimedia Contents, 2007, pp. 373–376.
[3] K. Solanki, N. Jacobsen, U. Madhow, B. S. Manjunath, and S. Chandrasekaran, “Robust image-adaptive data hiding using erasure and error correction,” IEEE Trans. Image Process., vol. 13, no. 12, pp. 1627–1639, Dec. 2004.
[4] M. Schlauweg, D. Profrock, and E. Muller, “Correction of insertions and deletions in selective watermarking,” in Proc. IEEE Int. Conf. SITIS, Nov.–Dec. 2008, pp. 277–284.
[5] H. Liu, J. Huang, and Y. Q. Shi, “DWT-based video data hiding robust to MPEG compression and frame loss,” Int. J. Image Graph., vol. 5, no. 1, pp. 111–134, Jan. 2005.
[6] M. Wu, H. Yu, and B. Liu, “Data hiding in image and video: I. Fundamental issues and solutions,” IEEE Trans. Image Process., vol. 12, no. 6, pp. 685–695, Jun. 2003.
[7] M. Wu, H. Yu, and B. Liu, “Data hiding in image and video: II. Designs and applications,” IEEE Trans. Image Process., vol. 12, no. 6, pp. 696– 705, Jun. 2003.
[8] E. Esen and A. A. Alatan, “Forbidden zone data hiding,” in Proc. IEEE Int. Conf. Image Process., Oct. 2006, pp. 1393–1396.
[9] B. Chen and G. W. Wornell, “Quantization index modulation: A class of provably good methods for digital watermarking and information embedding,” IEEE Trans. Inform. Theory, vol. 47, no. 4, pp. 1423–1443, May 2001.
[10] E. Esen, Z. Do˘gan, T. K. Ates, and A. A. Alatan, “Comparison of quantization index modulation and forbidden zone data hiding for compressed domain video data hiding,” in Proc. IEEE 17th Signal Process. Commun. Applicat. Conf., Apr. 2009, pp. 404–407.
[11] D. Divsalar, H. Jin, and R. J. McEliece, “Coding theorems for turbo-like codes,” in Proc. 36th Allerton Conf. Commun. Control Comput., 1998, pp. 201–210.
[12] M. M. Mansour, “A turbo-decoding message-passing algorithm for sparse parity-check matrix codes,” IEEE Trans. Signal Process., vol. 54, no. 11, pp. 4376–4392, Nov. 2006.
[13] Z. Wei and K. N. Ngan, “Spatio-temporal just noticeable distortion profile for grey scale image/video in DCT domain,” IEEE Trans. Circuits Syst. Video Technol., vol. 19, no. 3, pp. 337–346, Mar. 2009.
[14] M. Maes, T. Kalker, J. Haitsma, and G. Depovere, “Exploiting shift invariance to obtain a high payload in digital image watermarking,” in Proc. IEEE ICMCS, vol. 1. Jul. 1999, pp. 7–12.
[15] T. Kalker, G. Depovere, J. Haitsma, and M. J. Maes, “Video watermarking system for broadcast monitoring,” in Proc. SPIE Security Watermarking Multimedia Contents Conf., vol. 3657. 1999, pp. 103– 112.
[16] M. Maes, T. Kalker, J.-P. M. G. Linnartz, J. Talstra, F. G. Depovere, and J. Haitsma, “Digital watermarking for DVD video copy protection,” IEEE Signal Process. Mag., vol. 17, no. 5, pp. 47–57, Sep. 2000.
[17] K. Wong, K. Tanaka, K. Takagi, and Y. Nakajima, “Complete video quality-preserving data hiding,” IEEE Trans. Circuits Syst. Video Technol., vol. 19, no. 10, pp. 1499–1512, Oct. 2009.
[18] G. Tardos, “Optimal probabilistic fingerprint codes,” in Proc. 35th Annu. ACM STOC, 2003, pp. 116–125.
[19] B. Skoric, T. U. Vladimirova, M. Celik, and J. C. Talstra, “Tardos fingerprinting is better than we thought,” IEEE Trans. Inform. Theory, vol. 54, no. 8, pp. 3663–3676, Aug. 2008.