Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Robust Security Technique for Video Data Hiding


Affiliations
1 Computer Science and Engineering in Hindustan, Padur, Chennai, Tamilnadu, India
     

   Subscribe/Renew Journal


Video data hiding is an important research topic due to design complexities involved. There exist a wide range of protocols for hiding message in images. However, without leaving any apparent evidence of image alteration, security and robustness will be the key attributes of any particular technique. Many attacks to security constitute a first step towards performing attacks to robustness. In this paper, we demonstrate an algorithm to make the data embedding process as robust as possible. Starting form proper selection of images, blocks within the image and coefficients within the block this algorithm gives an idea of making the embedding process robust. Experimental results show an improvement as we follow this algorithm. We are introducing two new techniques called Forbidden zone data hiding and selective embedding. Using this technique security and confidentiality of our information will be high


Keywords

Data Hiding, Digital Water-Marking, Forbidden Zone Data Hiding, Repeat Accumulate Codes, Selective Embedding.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 219

PDF Views: 2




  • Robust Security Technique for Video Data Hiding

Abstract Views: 219  |  PDF Views: 2

Authors

R. Vijayalakshmi
Computer Science and Engineering in Hindustan, Padur, Chennai, Tamilnadu, India

Abstract


Video data hiding is an important research topic due to design complexities involved. There exist a wide range of protocols for hiding message in images. However, without leaving any apparent evidence of image alteration, security and robustness will be the key attributes of any particular technique. Many attacks to security constitute a first step towards performing attacks to robustness. In this paper, we demonstrate an algorithm to make the data embedding process as robust as possible. Starting form proper selection of images, blocks within the image and coefficients within the block this algorithm gives an idea of making the embedding process robust. Experimental results show an improvement as we follow this algorithm. We are introducing two new techniques called Forbidden zone data hiding and selective embedding. Using this technique security and confidentiality of our information will be high


Keywords


Data Hiding, Digital Water-Marking, Forbidden Zone Data Hiding, Repeat Accumulate Codes, Selective Embedding.