SECRET DATA HIDING IN ENCRYPTED COMPRESSED VIDEO BITSTREAMS USING CHAOS CRYPTO SYSTEM
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 4, Issue 7
Abstract
Early research works have been done on image. Due to few features of images, such as high correlation among pixels and bulk data capacity , previous encryption algorithms are not suitable. Cloud computing has become an important technology trend, which can provide large-scale storage solution and highly efficient computation for video data. It is desired that the video content is accessible in encrypted form to protect from untrustworthy system administrators. The capability of performing data hiding is done in encrypted H.264/AVC video bitstreams which would avoid the leakage of video information also can help to maintain security and privacy concerns with cloud computing. During H.264/AVC compression, the intra-prediction mode (IPM), motion vector difference (MVD) and DCT coefficients’ signs are encrypted. For the purpose of content notation and tampering detection, it is necessary to perform data hiding in these encrypted videos. In system, a novel scheme of data hiding is proposed, which includes three section as follows, i.e., H.264/AVC video encryption, data encryption , and data decryption. Chaos crypto system is used here to encrypt/decrypt secret text data before/after data embedding/extraction. video file size is strictly preserved even after encryption and data embedding .
Authors and Affiliations
Sonali. A. Chaudhari ,
Transient Thermal Analysis for Optimized L Shaped Cross section of Casting Junctions
Intersection of sections is known as junctions. A casting can be viewed as an assemblage of sections and junctions. Molten metal at the junction does not possess sufficient surface area for cooling as compared to...
VIBRATION ANALYSIS OF TRACTOR MOUNTED HYDRAULIC ELEVATOR
In Due to increase of height of horiticultural crops it is difficult to harvesting and pruning. Some equipments & hand tools are available in market for harvesting and pruning, but those tools are non-useful for har...
GSM BTS RADIATION WITHIN COMMUNITIES ONDO - CITY, NIGERIA AS A CASE STUDY
The nature of communication base stations entails the emission of non-ionizing radiation due to the presence of transmitting and receiving antennas mounted on them. When the values of charges are varied harmonically wit...
Privacy Preserving Data Publishing: Using Overlapping Slicing and Attribute
Privacy preserving publishing is the kind of techniques to apply privacy to collected vast amount of The data publication processes are today still very difficult. Data often contains personally identifiable infor...
DESIGN AND FABRICATION OF FATIGUE ANALYSIS TEST SETUP FOR COMPOSITE MATERIAL TESTING
Lot of research work is published on various aspects of fatigue failure behavior of laminated composite materials. There is no standard method followed by researchers since these research works published in this a...