CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

A Review on Video Compression and Embedding Techniques

by K. Rajalakshmi, K. Mahesh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 141 - Number 12
Year of Publication: 2016
Authors: K. Rajalakshmi, K. Mahesh
10.5120/ijca2016909940

K. Rajalakshmi, K. Mahesh . A Review on Video Compression and Embedding Techniques. International Journal of Computer Applications. 141, 12 ( May 2016), 32-36. DOI=10.5120/ijca2016909940

@article{ 10.5120/ijca2016909940,
author = { K. Rajalakshmi, K. Mahesh },
title = { A Review on Video Compression and Embedding Techniques },
journal = { International Journal of Computer Applications },
issue_date = { May 2016 },
volume = { 141 },
number = { 12 },
month = { May },
year = { 2016 },
issn = { 0975-8887 },
pages = { 32-36 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume141/number12/24839-2016909940/ },
doi = { 10.5120/ijca2016909940 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:43:23.337572+05:30
%A K. Rajalakshmi
%A K. Mahesh
%T A Review on Video Compression and Embedding Techniques
%J International Journal of Computer Applications
%@ 0975-8887
%V 141
%N 12
%P 32-36
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Data embedding techniques embed the secret image into another image for increasing the privacy. The data embedding techniques can also be substituted to the videos so that the confidentiality of the image, video, and the embedded data can be maintained. In this paper, multiple compression techniques such as Principle Component Analysis (PCA) based method, Set Partitioning in Hierarchical Trees (SPIHT) algorithm and fuzzy concepts are analyzed. The embedding techniques are classified into two types such as digital image watermarking and data hiding algorithms. The digital watermarking techniques like Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Least Significant Bit (LSB) are surveyed. Further, the data hiding techniques such as H.264/AVC video stream and MPEG videos are analyzed. In the survey results, it is clear that the existing techniques do not efficiently restore the compressed image, the pixel information is lost during the transformations. Further, the existing techniques have increased time complexity and computational complexity.

References
  1. Mallaiah, S. K. Shabbir, T. Subhashini. 2012. "An Spiht Algorithm With Huffman Encoder For Image Compression And Quality Improvement Using Retinex Algorithm." International Journal Of Scientific & Technology Research no. 1 (5):45-49.
  2. Chopra, Deepshikha, Preeti Gupta, Gaur Sanjay, and Anil Gupta. 2012. "LSB based digital image watermarking for gray scale image." IOSR Journal of Computer Engineering (IOSRJCE) ISSN:2278-0661.
  3. Deb, Kaushik, Md Sajib Al-Seraj, Mohammed Moshiul Hoque, and Md Iqbal Hasan Sarkar. 2012. Combined DWT-DCT based digital image watermarking technique for copyright protection. Paper read at 7th International Conference on Electrical & Computer Engineering (ICECE).
  4. Gurpreet Kaur, Kamaljeet Kaur. 2013. "Image Watermarking Using LSB." International Journal of Advanced Research in Computer Science and Software Engineering no. 3 (4):858-861.
  5. Kashyap, Nikita, and GR Sinha. 2012. "Image watermarking using 3-level discrete wavelet transform (DWT)." International Journal of Modern Education and Computer Science no. 4 (3):50.
  6. Khalilian, Hanieh, and Ivan V Bajic. 2013. "Video watermarking with empirical PCA-based decoding." IEEE Transactions on Image Processing no. 22 (12):4825-4840.
  7. Khan, Asifullah, Ayesha Siddiqa, Summuyya Munib, and Sana Ambreen Malik. 2014. "A recent survey of reversible watermarking techniques." Information sciences no. 279:251-272.
  8. Li, Y., H. x. Chen, and Y. Zhao. 2010. A new method of data hiding based on H.264 encoded video sequences. Paper read at IEEE 10th International Conference on Signal Processing (ICSP), 24-28 Oct. 2010.
  9. Ma, Xiaojing, Zhitang Li, Hao Tu, and Bochao Zhang. 2010. "A data hiding algorithm for H. 264/AVC video streams without intra-frame distortion drift." IEEE Transactions on Circuits and Systems for Video Technology no. 20 (10):1320-1330.
  10. Navnidhi Chaturvedi, Dr.S.J.Basha. 2012. "Comparison of Digital Image watermarking Methods DWT & DWT-DCT on the Basis of PSNR." International Journal of Innovative Research in Science, Engineering and Technology no. 1 (2):147-153.
  11. Pan, I-Hui, Ping Sheng Huang, and Te-Jen Chang. 2013. "DCT-Based Watermarking for Color Images via Two-Dimensional Linear Discriminant Analysis." In Information Technology Convergence, 57-65. Springer.
  12. Sadashivappa, K.V.S Anand Babu, Dr. Srinivas 2011. "Color Image Compression using SPIHT Algorithm." International Journal of Computer Applications no. 16 (7):34-42.
  13. Seema Kalangi, Veeraiah Maddu, Sreenivasa Ravi Kavuluri. 2013. "A Novel Approach of Low Complexity DWT/PCA Based Video Compression Method." International Journal of Engineering Science and Innovative Technology (IJESIT) no. 2 (3):159-168.
  14. Senthil Nathan.M , Pandiarajan.K, Baegan.U. 2013. "Digital Image Watermarking Basics " IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) no. 8 (1):07-11.
  15. Shanableh, T. 2012. "Data Hiding in MPEG Video Files Using Multivariate Regression and Flexible Macroblock Ordering." IEEE Transactions on Information Forensics and Security no. 7 (2):455-464. doi: 10.1109/TIFS.2011.2177087.
  16. Shivani Khosla, Paramjeet Kaur 2014. "Secure Data Hiding Technique Using Video Steganography and Watermarking." International Journal of Computer Applications no. 95 (20):7-12.
  17. Singh, Ranjeet Kumar, Dilip Kumar Shaw, and M Javed Alam. 2015. "Experimental Studies of LSB Watermarking with Different Noise." Procedia Computer Science no. 54:612-620.
  18. Suganya.G, Mahesh.K. 2014. "A Survey: Various Techniques of Video Compression." International Journal of Engineering Trends and Technology (IJETT) no. 7 (1):10-12.
  19. Suhail, M. A., and M. S. Obaidat. 2003. "Digital watermarking-based DCT and JPEG model." IEEE Transactions on Instrumentation and Measurement no. 52 (5):1640-1647. doi: 10.1109/TIM.2003.817155.
  20. Thakur, S, Nilesh Kumar Dewangan, and Kavita Thakur. 2014. A Highly Efficient Gray Image Compression Codec Using Neuro Fuzzy Based Soft Hybrid JPEG Standard. Paper read at Proceedings of Second International Conference “Emerging Research in Computing, Information, Communication and Applications” ERCICA.
  21. Thakur, Vikrant Singh, and Kavita Thakur. 2014. Design and Implementation of a highly efficient gray image compression codec using fuzzy based soft hybrid JPEG standard. Paper read at International Conference on Electronic Systems, Signal Processing and Computing Technologies (ICESC).
  22. Wong, KokSheik, Kiyoshi Tanaka, Koichi Takagi, and Yasuyuki Nakajima. 2009. "Complete video quality-preserving data hiding." IEEE Transactions on Circuits and Systems for Video Technology no. 19 (10):1499-1512.
  23. Xu, Dawen, Rangding Wang, and Yun Q Shi. 2014. "Data hiding in encrypted H. 264/AVC video streams by codeword substitution." IEEE Transactions on Information Forensics and Security no. 9 (4):596-606.
Index Terms

Computer Science
Information Sciences

Keywords

Principal Component Analysis (PCA) Set Partitioning in Hierarchical Trees (SPIHT) algorithm Least Significant Bit (LSB) Discrete Wavelet Transform (DWT) Discrete Cosine Transform (DCT) Fuzzy.