Embedding of Data in Motion Vectors by Using Steganography Concept
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 11
Abstract
This paper applies steganography algorithm in videos. In the proposed method, we take GOP techniques which are nothing but video algorithms so we use advantage of prediction types of MPEG bit streams to embed watermarks into both intra frame and non-intra frame with different residual masks. The experimental results show that the proposed steganography technique results almost invisible difference between the “STEGO FRAMES” and the original frames. Secrete Message is first encrypted by using cryptography algorithm. This encrypted message is converted into bits and replaced with the least significant bits of discrete cosine transform coefficients of frames in a video. By using cryptography we can provide high security to the embedded data. This algorithm was tested on different types of videos. The proposed method is found to perform well and is compared to a Least Significant Bit replacement algorithm from the literature.
Authors and Affiliations
Kolli Aditya, S. Sri durga Kameswari
A Study on Tactics Used to Incorporate Medical Informatics and Automated Diagnostic Methods
Drastic changes have taken place in medicine over the last century. Physicians were faced with the difficulty of making diagnoses with little information that are not sufficient, often resorting to exploratory surger...
Implementation of VLSI Based Router for Custom Network On Chip Applications
A fast full-chip synthesis method to construct network-on-chips (Custom Noc) for network on chip based systems.It can be used for irregular network topology for specific designs with already known communication deman...
Communication of Dumb & Blind People with T-T-S
Text-to-speech(TTS) conversion transforms linguistic information stored as data or text into speech. It is widely used in audio wading deviccs for blind people. In the last fcw years, use of text-to-speech conversion...
AIDA : Minimizing Communication Overhead And Enhance Privacy of Shared Data
An algorithm for anonymous sharing of private data among parties is developed. Top-down refinement masks a given table to satisfy broad range of anonymity requirements without sacrificing significantly the usefulness...
Improved Algorithm for Prediction of Heart Disease Using Case based Reasoning Technique on Non-Binary Datasets
Frequent itemset mining is a basic problem in data mining and knowledge discovery. The discovered patterns can be used as input for Association and Classification. Association Rules and Classification Rules have been...