Open Access   Article Go Back

A Novel Block-Based Selective Embedding Type Video Data Hiding using Encryption Algorithms

Dr.K.Vanaja 1 , D. Thilagavathi2 , C. Rukmani3 , L.Gandhi 4

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-7 , Page no. 647-653, Jul-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i7.647653

Online published on Jul 31, 2018

Copyright © Dr.K.Vanaja, D. Thilagavathi, C. Rukmani, L.Gandhi . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Dr.K.Vanaja, D. Thilagavathi, C. Rukmani, L.Gandhi, “A Novel Block-Based Selective Embedding Type Video Data Hiding using Encryption Algorithms,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.647-653, 2018.

MLA Style Citation: Dr.K.Vanaja, D. Thilagavathi, C. Rukmani, L.Gandhi "A Novel Block-Based Selective Embedding Type Video Data Hiding using Encryption Algorithms." International Journal of Computer Sciences and Engineering 6.7 (2018): 647-653.

APA Style Citation: Dr.K.Vanaja, D. Thilagavathi, C. Rukmani, L.Gandhi, (2018). A Novel Block-Based Selective Embedding Type Video Data Hiding using Encryption Algorithms. International Journal of Computer Sciences and Engineering, 6(7), 647-653.

BibTex Style Citation:
@article{Thilagavathi_2018,
author = {Dr.K.Vanaja, D. Thilagavathi, C. Rukmani, L.Gandhi},
title = {A Novel Block-Based Selective Embedding Type Video Data Hiding using Encryption Algorithms},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {7 2018},
volume = {6},
Issue = {7},
month = {7},
year = {2018},
issn = {2347-2693},
pages = {647-653},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2487},
doi = {https://doi.org/10.26438/ijcse/v6i7.647653}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i7.647653}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2487
TI - A Novel Block-Based Selective Embedding Type Video Data Hiding using Encryption Algorithms
T2 - International Journal of Computer Sciences and Engineering
AU - Dr.K.Vanaja, D. Thilagavathi, C. Rukmani, L.Gandhi
PY - 2018
DA - 2018/07/31
PB - IJCSE, Indore, INDIA
SP - 647-653
IS - 7
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
326 237 downloads 146 downloads
  
  
           

Abstract

Data hiding is a process of embedding information into the host medium and is an important process in security. Video data hiding is a very important research topic due to the design complexities involved. In general, due to the wide presence and the tolerance of human perceptual systems involved visual and aural media are preferred. The methods vary depending on the nature of such media and the general structure of data hiding process does not depend on the host media type. However, most of the video data hiding methods utilize uncompressed video data. Recent video data hiding techniques are focused on the characteristics generated by video compressing standards. The main objective of this research work is to propose a new video data hiding method that makes use of correction capability of repeat accumulate codes and superiority of forbidden zone data hiding (FZDH). FZDH is used for no alteration is allowed while data hiding process. The framework is tested by all kinds of videos such as .mp4, .3gp, .avi etc., and gets successful output for all video data hiding process. The proposed scheme is hiding the video data to provide security by encryption and decryption process. The simulation results show that the process of hiding the video data enforce security in higher level.

Key-Words / Index Term

FZDH, data hiding, encrypt process, decrypt process, superiority

References

[1] M. Wu, H. Yu, and B. Liu, “Data hiding in image and video: I. Fundamental issues and solutions,” IEEE Trans. Image Process., vol. 12, no. 6, pp. 685–695, Jun. 2003.
[2] M. Wu, H. Yu, and B. Liu, “Data hiding in image and video: II. Designs and applications,” IEEE Trans. Image Process., vol. 12, no. 6, pp. 696–705, Jun. 2003.
[3] S. K. Kapotas, E. E. Varsaki, and A. N. Skodras, “Data hiding in H-264 encoded video sequences,” in Proc. IEEE 9th Workshop Multimedia Signal Process., pp. 373–376,Oct. 2007,.
[4] A. Sarkar, U. Madhow, S. Chandrasekaran, and B. S. Manjunath,“Adaptive MPEG-2 video data hiding scheme,” in Proc. 9th SPIE Security Steganography Watermarking Multimedia Contents, pp.373–376. 2007,
[5] K. Wong, K. Tanaka, K. Takagi, and Y. Nakajima,
“Complete video quality-preserving data hiding,” IEEE
[6]A. Sarkar, U. Madhow, S. Chandrasekaran, and B. S. Manjunath, ―Adaptive MPEG-2 Video Data Hiding Scheme,‖ in Proceedings of SPIE Security, Steganography, and Watermarking of Multimedia Contents IX, 2007.
[7]M. Wu, H. Yu, and B. Liu, “Data hiding in image and video I. Fundamental issues and solutions, ”IEEE Transactions on Image Processing, vol. 12, pp. 685—695, June 2003.
[7] M. Wu, H. Yu, and B. Liu, “Data hiding in image and video II: Designs and applications,” IEEE Transactions on Image Processing, vol. 12, pp. 696—705, June 2003.
[8] E. Esen and A. A. Alatan, “Forbidden zone data hiding,” in IEEE International Conference on Image Processing, 2006, pp. 1393— 1396.
[9] B. Chen and G. W. Wornell, “Quantization index modulation: a class of provably good methods fordigital watermarking and information embedding,” IEEE Transactions on Information Theory, vol. 47,May 2001, pp. 1423-1443, May 2001,.
[10] E. Esen, Z. Doğan, T. K. Ates, and A. A. Alatan, “Comparison of Quantization Index Modulation and Forbidden Zone Data Hiding for Compressed Domain Video Data Hiding,”in IEEE 17th Signal Processing and Communications Applications Conference SIU, 2009.
[11] D. Divsalar, H. Jin, and R. J. McEliece, “Coding theorems for turbo like codes,” in Proc. 36thAllerton Conf. Communications, Control, and Computing, 1998, pp. 201— 210.
[12] M. M. Mansour, “A Turbo-Decoding Message-Passing Algorithm for Sparse Parity-Check Matrix Codes,” IEEE Transactions on Signal Processing, vol. 54, pp. 4376—4392, Nov. 2006.
[13] Z. Wei, K. N. Ngan, “Spatio-Temporal Just Noticeable Distortion Profile for Grey Scale Image/Videoin DCT Domain,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 19, pp.337—346, Mar. 2009.
[14] M. Maes, T. Kalker, J. Haitsma, and G. Depovere, “Exploiting Shift Invariance to Obtain a High Payload in Digital Image Watermarking,” in IEEE International Conference on Multimedia Computing and Systems (ICMCS`99), vol. 1, 1999.
[15] T. Kalker, G. Depovere, J. Haitsma, and M. J. Maes, “Video watermarking system for broad castmonitoring,” in Security and watermarking of multimedia contents Conference, SPIE Proceedings vol.3657 , 1999, pp. 103— 112.
[16] M. Maes, T. Kalker, J. -P. M. G., J. Talstra, F. G. Depovere, and J. Haitsma, “Digital watermarking for DVD video copy protection,” IEEE Signal Processing Magazine, vol. 17, pp. 47—57, Sep. 2000.
[17] K. Wong, K. Tanaka, K. Takagi, and Y. Nakajima, “Complete video quality-preserving data hiding,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 19, pp. 1499—1512,Oct. 2009.
[18] G. Tardos, “Optimal probabilistic fingerprint codes,” in Proceedings of the thirty fifth annual ACM symposium on Theory of computing (STOC ’03), New York, NY, USA, 116—125.
[19] B. Skoric, T. U. Vladimirova, M. Celik, and J. C. Talstra, “Tardos fingerprinting is better than we thought,” IEEE Transactions on Information Theory, vol. 54, no. 8, pp. 3663—3676, 2008.
[20] Ramesh, G. Umarani, R. ,UMARAM: A novel fast encryption algorithm for data security in local area network http://ieeexplore.ieee.org /xpl/ freeabs_all.jsp? arnumber=5670740
[21] Ramesh, G. Umarani, R,” UR5: A Novel Symmetrical Encryption Algorithm with Fast Flexible and High Security Based on Key Updation”, European Journal of Scientific Research ISSN 1450-216X Vol.77 No.2 (2012), pp.275-292.