Selective Embedding and Forbidden Zone Data Hiding for Strong Video Data Thrashing

Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2013, Vol 4, Issue 9

Abstract

 A new method for high capacity data hiding in H.264 streams takes advantage of the different block sizes used by the H.264 encoder during the inter prediction stage in order to hide the desirable data. This fragile data hiding approach can be mainly used for content-based authentication and covert communication. Information-theoretic analyses for data hiding prescribe embedding the hidden data in the choice of quantizer for the host data. The hidden data can be recovered reliably under attacks, such as compression and limited amounts of image tampering and image resizing. The three main findings are as follows. 1) In order to limit perceivable distortion while hiding large amounts of data. 2) The use of local criteria to choose where to hide data can potentially causede synchronization of the encoder and decoder. 3) For simplicity, scalar quantization based hiding is employed, even though information-theoretic guidelines prescribe vector quantization-based methods. We begin with a review of two major types of embedding, based on which we propose a new multilevel embedding framework to allow the amount of extractable data to be adaptive according to the actual noise condition. We propose a new video data hiding method that makes use of erasure correction capability of repeat accumulate codes and superiority of forbidden zone data hiding. Selective embedding is utilized in the proposed method to determine host signal samples suitable for data hiding. The decoding error values are reported for typical system parameters. The simulation results indicate that the framework can be successfully utilized in video data hiding applications.

Authors and Affiliations

R. Ravi Kumar#1, V. Kesav Kumar

Keywords

Related Articles

A Novel Approach to Implement a Vedic Multiplier for High Speed Applications

Now-a-days in VLSI technology speed optimization plays a vital role. So designing of high speed devices became necessary to fulfill the end user requirements. Generally the processor designing is mainly depending upon th...

A Wireless Approach with Sensor Network for Real Time Railway Track Surveillance System

This paper report discusses the safeness analysis of a railway track. A sensor network has been used to detect the cracks in the railway track. This sensor network incorporates an IR sensor and a photodiode. An Arduino U...

A Hybrid Modified Semantic Matching Algorithm Based on Instances Detection With Case Study on Renewable Energy

This Matching input keywords with historical or information domain is an important point in modern computations in order to find the best match information domain for specific input queries. Matching algorithms represent...

 A Virtual Router Schedule in the Practice of Creating Default Gateway

 we tend to discuss on Dynamic Time adjust Reference Load equalization technique to reinforce the Virtual Router Redundancy Protocol with Dynamic load equalization feature to utilize the redundant VRRP Backup devi...

 32×32 Colour Image Steganography

 — The word steganography is originally derived from Greek words which mean “Hidden Writing”.Due to the rapid growth of usage of internet over high bandwidth and low cost computer hardware has propelled the explosiv...

Download PDF file
  • EP ID EP98964
  • DOI -
  • Views 81
  • Downloads 0

How To Cite

R. Ravi Kumar#1, V. Kesav Kumar (2013).  Selective Embedding and Forbidden Zone Data Hiding for Strong Video Data Thrashing. INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY, 4(9), 4188-4192. https://europub.co.uk/articles/-A-98964