Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

An Efficient Reversible Data Hiding Approach on Digital Video for Secret Data Communication

Author : M.Rajakumari 1 S.Muthukumar 2

Date of Publication :21st March 2018

Abstract: The undertaking proposes the upgrade of security framework for mystery information correspondence through encoded information inserting in Shading pictures. In this examination, the writers propose a steganalytic plot for advanced video spread range (SS) information covering up. The proposed technique gauges both the shrouded message and the pickup factor of the SS installing rules. In this strategy, the cover outlines are first assessed and are contrasted and the gotten video outlines. At that point, the remaining lattice is processed and particular highlights are extricated from this framework and additionally the video outlines and assessed outlines. The help vector machine, at that point applies to the extricated highlights to arrange the video as either spotless or suspicious. In the event that the video is announced suspicious, both the shrouded message and the installing procedure pick up factor are assessed and subsequently the first video is remade. The reproduction comes about affirm the achievement of the creators' proposed strategy in identifying the stego video, estimation of the shrouded message and pick up factor and in addition recreation of the first video.

Reference :

    1. R. J. Mstafa and K. M. Elleithy, "A video steganography algorithm based on Kanade-Lucas-Tomasi tracking algorithm and error correcting codes," Multimedia Tools and Applications, pp. 1-23, 2015.
    2. R. J. Mstafa and K. M. Elleithy, "A highly secure video steganography using Hamming code (7, 4)," in Systems, Applications and Technology Conference (LISAT), 2014 IEEE Long Island, 2014, pp. 1-6.
    3.  W. Jyun-Jie, C. Houshou, L. Chi-Yuan, and Y. TingYa, "An embedding strategy for large payload using convolutional embedding codes," in ITS Telecommunications (ITST), 2012 12th International Conference on, 2012, pp. 365-369.
    4. R. Zhang, V. Sachnev, and H. Kim, "Fast BCH Syndrome Coding for Steganography," in Information Hiding. vol. 5806, S. Katzenbeisser and A.-R. Sadeghi, Eds., ed: Springer Berlin Heidelberg, 2009, pp. 48-58.
    5. R. J. Mstafa and K. M. Elleithy, "A high payload video steganography algorithm in DWT domain based on BCH codes (15, 11)," in Wireless Telecommunications Symposium (WTS), 2015, pp. 1-8.
    6. W. Abu-Marie, A. Gutub, and H. Abu-Mansour, "Image Based Steganography Using Truth Table Based and Determinate Array on RGB Indicator," International Journal of Signal and Image Processing, vol. 1, pp. 196- 204, 2010.
    7. R. Das and T. Tuithung, "A novel steganography method for image based on Huffman Encoding," in Emerging Trends and Applications in Computer Science (NCETACS), 2012 3rd National Conference on, 2012, pp. 14-18.
    8. R. T. Mercuri, "The many colors of multimedia security," Communications of the ACM, vol. 47, pp. 25- 29, 2015.

Recent Article