An Effective Substitution Technique for Data Hiding in Compressed Video Streams

  • Authors

    • C Vimala
    • P Aruna Priya
    2018-04-25
    https://doi.org/10.14419/ijet.v7i2.24.12013
  • H.264 Encrypt Video, Chao’s Data Encryption, Compressed bit streams.
  • Data hiding approach is enforced to the encrypted videos for the intent of content notation and tamper detection. Such as, data hiding favored in encrypted domain without decryption extract of the classified content. The  substitution techniques is used to data hiding in the compressed video. A video file size is closely maintained even after data encryption and embeds. In this work the data has been restored without any loss with better bit rates, Peak Signal Noise Ratio and testify the feasibility and efficiency of the prospective scheme.

     

     

  • References

    1. [1] W. J. Lu, A. Varna, and M. Wu, ‘‘Secure video processing Problems and challenges’’ IEEE Int. Conf. Acoust., Speech, Signal Processing, Prague, Czech Republic, pp. 5856–5859, May 2011.

      [2] W. Hong, T. S. Chen, and H. Y. Wu, ‘‘An improved reversible data hiding in encrypted images using side match’’ IEEE Signal Lett., vol. 19, no. 4, pp. 199–202, Apr. 2012.

      [3] X. P. Zhang, ‘‘Separable reversible data hiding in encrypted image’’IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 826–832, Apr. 2012

      [4] K. D. Ma, W. M. Zhang, X. F. Zhao, N. Yu, and F. Li, ‘‘Reversible data hiding in encrypted images by reserving room before encryption’’ IEEE Trans. Inf. Forensics Security, vol. 8, no. 3, pp. 553–562, Mar. 2013.

      [5] Dawn Xu Rang ding Wang and Yun Q. shi Fellow ‘‘data hiding in encryption H.264/AVC video streams by code word substitution’’IEEE Trans.Inf.Forensics security vol 9.no.4 Apr 2014.

      [6] Meenakshi R, Kuppusmay K. The use of least significant bit technique at various color spaces for secure steganography with performance evaluation. Int J Adv Res Comput Sci Software Eng;4(6):1047–1051, 2014.

      [7] S. Uma Maheswari, D. Jude Hemanth, ‘‘Frequency domain QR code based image steganography using Fresnelet transform’’ International Journal of Electronics and Communications 69 539–544 ,Nov 2015

      [8] Xinpeng Zhang‘‘ Reversible Data Hiding With Optimal Value Transfer’’, IEEE transactions on multimedia, vol. 15, no. 2, February 2013.

      [9] Weiming Zhang, Biao Chen, and Nenghai Yu ‘‘Improving Various Reversible Data Hiding Schemes Via Optimal Codes for Binary Covers’’ IEEE transactions on image processing, vol. 21, no. 6, June 2012

      [10] S.V.Manikanthan and T.Padmapriya “Recent Trends In M2m Communications In 4g Networks And Evolution Towards 5gâ€, International Journal of Pure and Applied Mathematics, ISSN NO:1314-3395, Vol-115, Issue -8, Sep 2017.

      [11] S.V. Manikanthan , T. Padmapriya “An enhanced distributed evolved node-b architecture in 5G tele-communications network†International Journal of Engineering & Technology (UAE), Vol 7 Issues No (2.8) (2018) 248-254.March2018.

  • Downloads

  • How to Cite

    Vimala, C., & Aruna Priya, P. (2018). An Effective Substitution Technique for Data Hiding in Compressed Video Streams. International Journal of Engineering & Technology, 7(2.24), 116-120. https://doi.org/10.14419/ijet.v7i2.24.12013