We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

Information Hiding in Video using CDCS and Adaptive Embedding

by Asha P. Choudhari
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 70 - Number 22
Year of Publication: 2013
Authors: Asha P. Choudhari
10.5120/12198-8265

Asha P. Choudhari . Information Hiding in Video using CDCS and Adaptive Embedding. International Journal of Computer Applications. 70, 22 ( May 2013), 11-17. DOI=10.5120/12198-8265

@article{ 10.5120/12198-8265,
author = { Asha P. Choudhari },
title = { Information Hiding in Video using CDCS and Adaptive Embedding },
journal = { International Journal of Computer Applications },
issue_date = { May 2013 },
volume = { 70 },
number = { 22 },
month = { May },
year = { 2013 },
issn = { 0975-8887 },
pages = { 11-17 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume70/number22/12198-8265/ },
doi = { 10.5120/12198-8265 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:33:31.890778+05:30
%A Asha P. Choudhari
%T Information Hiding in Video using CDCS and Adaptive Embedding
%J International Journal of Computer Applications
%@ 0975-8887
%V 70
%N 22
%P 11-17
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The widespread of the internet and World Wide Web has changed the way digital data is handled. The rapid growth of digital media and communication networks has created an urgent need for self-contained data identification schemes to create adequate intellectual property right (IPR) protection technology in particular for image and video data [13]. . By embedding an invisible and robust watermark into the image or video data, unauthorized copies can be traced and copy protection schemes can be implemented. There are several approaches to embed a watermark into an image or video frame [1]. In Steganography embedded data is invisible to a human observer. Information Hiding refers to techniques which are used for embedding additional data in host media. Here blind data hiding technique in video is proposed. The main aim of the proposed system is to send text information behind a video which is invisible for human eye. Here the system is Proposed for high capacity, robust and blind Information Hiding The in DCT(Discrete Cosine Transform) domain. A new encoding technique called Class Dependent Coding Scheme (CDCS) is used to increase the embedding capacity, which can convey the same information using less number of bits. High imperceptibility is achieved by selecting efficient DCT blocks for Embedding data using energy thresholding scheme[11]. On review, of a digitized video before and after a message was inserted, will show video files that appeared to have no substantial visual differences. The DCT is used to embed the file, which casts embedded data into the selected region in the DCT domain. Embedding the file in the selected region gives rise to invisibility.

References
  1. KokSheik Wong and Kiyoshi Tanaka , Complete Video Quality-Preserving Data Hiding , IEEE Transactions on Circuits and Systems For Video Technology,vol. 19, 2009.
  2. F. A. P. Petitcolas, R. J. Anderson and M. G. Kuhn, `Information Hiding-A Survey ,Proceeding of the IEEE, vol. 87, pp. 1062-1078 , 1999, .
  3. Changyong Xu and Xijian Ping, Steganography in Compressed Video Stream , Proceedings of the First International Conference on Innovative Computing, Information and Control, (ICICIC'06),IEEE 2006.
  4. Peng Zheng , Bo Zhao and Min-zhong Liu, An Efficient Method to Hide Information in MPEG Video equences, International Conference on Multimedia Information Networking and Security, 2009.
  5. Y. Wang and E. Izquierdo, High-Capacity Data Hidingin MPEG-2 Compressed Video, Proceeding of the 9th International Workshop on Systems, Signals and Image Processing, Manchester, U. K, pp. 212-218, 2002 .
  6. S. Katzenbeisser and E A. Petitcolas, Information Hiding Techniques for Steganography and Digital Watermarking , Artech House, Boston, MA, 2000.
  7. Suresh N. Mali and Rajesh M. Jalnekar, ``Imperceptible and Robust Data Hiding using Steganography Against Image Manipulation, International Journal of Emerging Technologies and Applications in Engineering, Technology and Sciences,(IJ-ETA- ETS) pp. 84-91, 2008.
  8. Kaushal Solanki , Noah Jacobsen and Upamanyu Madhow, Robust Image-Adaptive Data Hiding using Erasure and Error Correction, IEEE Transactions on image processing, Volume 13, pp. 1627-1639, 2004 .
  9. J. R. Krenn ,Steganography and Steganalysis , 2004.
  10. N. F. Johnson and S. Jajodia Information Hiding: Steganography and watermarking attacks and countermeasures, Kluwer academic Publishers 2000.
  11. Dr. Suresh N. Mali ,Content Security Enhancement by Effective Encryption and Sealed Steganography, Ph. D. Thesis.
  12. SNELL & WILCOX , MPEG Encoding Basics .
  13. Gerrit C. Langelaar and Reginald L. Lagendijk, Optimal Differential Energy Watermarking of DCT Encoded Images and Video ,IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 10, NO. 1, JANUARY 2001
  14. http://en. wikipedia. org/wiki/Audio_VideoInterleave
Index Terms

Computer Science
Information Sciences

Keywords

Information Hiding DCT Video CDCS