Hiding Messages Using Motion Vector Technique In Video Steganography
Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2012, Vol 3, Issue 3
Abstract
Steganography is the art of hiding information in ways that avert the revealing of hiding messages.Video files are generally a collection of images. so most of the presented techniques on images and audio can be applied to video files too. The great advantages of video are the large amount of data that can be hidden inside and the fact that it is a moving stream of image. In this paper, we proposed a new technique using the motion vector, to hide the data in the moving objects. Moreover, to enhance the security of the data, the data is encrypted by using the AES algorithm and then hided. The data is hided in the horizontal and the vertical components of the moving objects. The PSNR value is calculated so that the qualityof the video after the data hiding is evaluated.
Authors and Affiliations
P. Paulpandi1 , Dr. T. Meyyappan,M. sc. ,M. Phil. ,M. BA. ,Ph. D2
Fly Ash (F-Class): Oppertiunities For Sustainable Development Of Low Cost Rural Roads
Fly ash, a waste derived from coal burning in thermal power plants is plentiful in India causing severe health, environment and dumping problems. It is estimated that about 150 million tons of fly ash are being pro...
Improving Network I/O Virtualization Performance of Xen Hypervisor
Virtualization technology is the backbone of Cloud Computing. Virtualization provides efficiency, flexibility and scalability in cloud computing. Virtualization in cloud computing can be done through different virtualiza...
Isotropic Radiation Using Crossed Dipoles
This letter presents a compact isotropic-radiated planar antenna for 2.5-GHz wireless local area network (WLAN) applications. The antenna is designed using two crossed curved dipoles. By adjusting the length...
Fingerprint Based Gender Classification Using 2D Discrete Wavelet Transforms and Principal Component Analysis
Fingerprint evidence is undoubtedly the most reliable and acceptable evidence till date in the court of law. Fingerprints are obtained at the site of crime and in many old monuments and in excavated things. Estimat...
Implementation and Bit Error Rate analysis of BPSK Modulation and Demodulation Technique using MATLAB
This paper presents the theoretical background of digital modulation and evaluate the performance of BPSK system with respect to Bit error Rate and finally implement Binary Phase shift Keying modulation technique i...