CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

A Review on Data Hiding Techniques in Compressed Video

by R. Aparna, Ajish S
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 134 - Number 13
Year of Publication: 2016
Authors: R. Aparna, Ajish S
10.5120/ijca2016908091

R. Aparna, Ajish S . A Review on Data Hiding Techniques in Compressed Video. International Journal of Computer Applications. 134, 13 ( January 2016), 1-4. DOI=10.5120/ijca2016908091

@article{ 10.5120/ijca2016908091,
author = { R. Aparna, Ajish S },
title = { A Review on Data Hiding Techniques in Compressed Video },
journal = { International Journal of Computer Applications },
issue_date = { January 2016 },
volume = { 134 },
number = { 13 },
month = { January },
year = { 2016 },
issn = { 0975-8887 },
pages = { 1-4 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume134/number13/23971-2016908091/ },
doi = { 10.5120/ijca2016908091 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:34:04.983706+05:30
%A R. Aparna
%A Ajish S
%T A Review on Data Hiding Techniques in Compressed Video
%J International Journal of Computer Applications
%@ 0975-8887
%V 134
%N 13
%P 1-4
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper presents various Data Hiding techniques of video in compressed domain. Data is embedded into digital media for the purpose of identification, annotation, copy right and tampering detection. The identification purpose mainly falls into the area of cloud computing- making sure that the sender is the one intended; annotation refers to the property of tagging or giving captions to the video; copyright protection, which is used to prevent the recreation of the video; tampering detection is the method in which the receiver checks whether the video is tampered or disturbed during the transmission by a third party. Several factors affect the data hiding process-the quantity of data to be hidden, whether the embedding technique can handle large payloads without affecting the quality of the video, embedding in a lossy compression environment and the extent to which the data hidden is subject to modification or removal by a third party. This paper discusses the various data hiding techniques of video in the compressed environment and compares the techniques based on the quantities mentioned above. Furthermore they are analyzed in terms of their method, robustness and capacity. A comparison graph is plotted based on the efficiency analysis of the data hiding techniques and conclusions are drawn based on the analysis.

References
  1. Arup Kumar Bhaumit, Minkyu Choi, Rosslin J. Robles and MaricelO.Blitanas “Data Hiding in Video”,InternationalJournel of Database Theory and Application Vol. 2,No.2, June 2009
  2. X. P. Zhang, “Reversible data hiding in encrypted image,” IEEE Signal Process. Lett., vol. 18, no. 4, pp. 255-258, Apr. 2011.
  3. W. Hong, T. S. Chen, and H. Y. Wu, “An improved reversible data hiding in encrypted images using side match,” IEEE Signal Process. Lett., vol. 19, no. 4, pp. 199-202, Apr. 2012.
  4. K. D. Ma, W. M. Zhang, X. F. Zhao, N. Yu, and F. Li, “Reversible data hiding in encrypted images by reserving room before encryption,” IEEE Trans. Inf. Forensics Security, vol. 8, no. 3, pp. 553-562, Mar. 2013
  5. X. P. Zhang, “Separable reversible data hiding in encrypted image,” IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 826-832, Apr. 2012.
  6. I. E. G. Richardson, “H.264 and MPEG-4 Video Compression: VideoCoding for Next Generation Multimedia”. Hoboken, NJ, USA: Wiley,2003.
  7. Mehdi Fallahpour, Shervin Shirmohammadi, Mehdi Semsarzadeh, and Jiying Zhao,“Tampering detection in compressed digital video using watermarking”IEEE Trans.Instrumentation and Measurement, vol. 63, no. 5, May 2014.
  8. Hussein A. Aly,“Data hiding in motion vectors of compressed video based on their associated prediction error”,IEEE Trans. Inf. Forensics Security, vol. 6, no. 1, March 2011.
  9. Ding-Yu Fang, Long-Wen Chang, “Data hiding for digital video with phase of motion vector”, IEEE. Proc. ISCAS, 2006.
  10. Spyridon K. Kapotas, Eleni E. Varsaki and Athanassios N. Skodras, “Data hiding in H.264 encoded video sequences”, IEEE Proc. MMSP 2007.
  11. S. G. Lian, Z. X. Liu, and Z. Ren, “Commutative encryption and watermarking in video compression,” IEEE Trans. Circuits Syst. Video Technol., vol. 17, no. 6, pp. 774-778, Jun. 2007.
Index Terms

Computer Science
Information Sciences

Keywords

Data hiding Steganalysis Video compression Video encryption Watermarking