Open Access   Article Go Back

Robust Video Data Hiding Using Forbidden Zone Data Hiding and Selective Embedding

Narmatha K.1 , R. Vadivel2

Section:Research Paper, Product Type: Journal Paper
Volume-10 , Issue-5 , Page no. 18-24, May-2022

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v10i5.1824

Online published on May 31, 2022

Copyright © Narmatha K., R. Vadivel . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Narmatha K., R. Vadivel, “Robust Video Data Hiding Using Forbidden Zone Data Hiding and Selective Embedding,” International Journal of Computer Sciences and Engineering, Vol.10, Issue.5, pp.18-24, 2022.

MLA Style Citation: Narmatha K., R. Vadivel "Robust Video Data Hiding Using Forbidden Zone Data Hiding and Selective Embedding." International Journal of Computer Sciences and Engineering 10.5 (2022): 18-24.

APA Style Citation: Narmatha K., R. Vadivel, (2022). Robust Video Data Hiding Using Forbidden Zone Data Hiding and Selective Embedding. International Journal of Computer Sciences and Engineering, 10(5), 18-24.

BibTex Style Citation:
@article{K._2022,
author = {Narmatha K., R. Vadivel},
title = {Robust Video Data Hiding Using Forbidden Zone Data Hiding and Selective Embedding},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2022},
volume = {10},
Issue = {5},
month = {5},
year = {2022},
issn = {2347-2693},
pages = {18-24},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=5462},
doi = {https://doi.org/10.26438/ijcse/v10i5.1824}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v10i5.1824}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=5462
TI - Robust Video Data Hiding Using Forbidden Zone Data Hiding and Selective Embedding
T2 - International Journal of Computer Sciences and Engineering
AU - Narmatha K., R. Vadivel
PY - 2022
DA - 2022/05/31
PB - IJCSE, Indore, INDIA
SP - 18-24
IS - 5
VL - 10
SN - 2347-2693
ER -

VIEWS PDF XML
245 371 downloads 130 downloads
  
  
           

Abstract

The steganography has been used for long time before. The main use for it was for military and government messages, nowadays; the approaches of steganography become widely used for many purposes. Anyway, the researchers provide and found out many approaches while others enhanced the methods and the approaches of the steganography in order to improve the steganographic applications.Nowadays, the steganography application for sharing secure message used the multimedia files as a cover carrier for the secure message, since that many approaches has been proposed to use different type of the covers to send the secure message. The aim of this project is to use the methods of steganography using the video file as a cover carrier. The steganography is the art of protecting the information through embedding data in medium carrier. The video based steganography can be used as one video file. The use of the video based steganography can be more eligible than other multimedia files. As a result, the video based steganography the advantages of using the video file as a cover carrier for steganography have been proposed. In this project Steganography and encryption are bothused to ensure data confidentiality. However, the main difference between them is that with encryption anybody can see that both parties are communicating in secret. Steganography hides the existence of a secret message and in the best case nobody can see that both parties are communicating in secret.

Key-Words / Index Term

Strganography, Data Embedding, Data Extraaction, Data Hiding, Data Security using Video Files

References

[1] A. Sarkar, U. Madhow, S. Chandrasekaran, and B. S. Manjunath, “Adaptive MPEG-2 video data hiding scheme,” in Proc. 9th SPIE Security Steganography Watermarking Multimedia Contents, pp. 373–376, 2007.
[2] K. Solanki, N. Jacobsen, U. Madhow, B. S. Manjunath, and S. Chandrasekaran, “Robust video-adaptive data hiding using erasure and error correction,” IEEE Trans. Video Process., vol. 13, no. 12, pp. 1627–1639, Dec. 2004.
[3] M. Schlauweg, D. Profrock, and E. Muller, “Correction of insertions and deletions in selective watermarking,” in Proc. IEEE Int. Conf. SITIS, pp. 277–284, Nov. – Dec. 2008.
[4] M. Wu, H. Yu, and B. Liu, “Data hiding in video and video: I. Fundamental issues and solutions,” IEEE Trans. Video Process., vol. 12, no. 6, pp. 685–695, Jun. 2003.
[5] M. Wu, H. Yu, and B. Liu, “Data hiding in video and video: II. Designs and applications,” IEEE Trans. Video Process., vol. 12, no. 6, pp. 696– 705, Jun. 2003.
[6] E. Esen and A. A. Alatan, “Forbidden zone data hiding,” in Proc. IEEE Int. Conf. Video Process., pp. 1393–1396, Oct. 2006.
[7] B. Chen and G. W. Wornell, “Quantization index modulation: A class of provably good methods for digital watermarking and information embedding,” IEEE Trans. Inform. Theory, vol. 47, no. 4, pp. 1423–1443, May 2001.
[8] D. Divsalar, H. Jin, and R. J. McEliece, “Coding theorems for turbo-like codes,” in Proc. 36th Allerton Conf. Commun. Control Comput., pp. 201–210. 1998.
[9] M. M. Mansour, “A turbo-decoding message-passing algorithm for sparse parity-check matrix codes,” IEEE Trans. Signal Process., vol. 54, no. 11, pp. 4376–4392, Nov. 2006.
[10] Z. Wei and K. N. Ngan, “Spatio-temporal just noticeable distortion profile for grey scale video/video in DCT domain,” IEEE Trans. Circuits Syst. Video Technol., vol. 19, no. 3, pp. 337–346, Mar. 2009.
[11] M. Maes, T. Kalker, J. Haitsma, and G. Depovere, “Exploiting shift invariance to obtain a high payload in digital video watermarking,” in Proc. IEEE ICMCS, vol. 1. pp. 7–12. Jul. 1999.
[12] T. Kalker, G. Depovere, J. Haitsma, and M. J. Maes, “Video watermarking system for broadcast monitoring,” in Proc. SPIE Security Watermarking Multimedia Contents Conf., vol. 3657. pp. 103– 112, 1999.
[13] M. Maes, T. Kalker, J.-P. M. G. Linnartz, J. Talstra, F. G. Depovere, and J. Haitsma, “Digital watermarking for DVD video copy protection,” IEEE Signal Process. Mag., vol. 17, no. 5, pp. 47–57, Sep. 2000.
[14] K. Wong, K. Tanaka, K. Takagi, and Y. Nakajima, “Complete video quality-preserving data hiding,” IEEE Trans. Circuits Syst. Video Technol., vol. 19, no. 10, pp. 1499–1512, Oct. 2009.
[15] G. Tardos, “Optimal probabilistic fingerprint codes,” in Proc. 35th Annu. ACM STOC, pp. 116–125, 2003.