Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Forbidden Zone Data Hiding in Video Using Selective Embedding Techniques

Author : N Manasa 1 G Karunakar Goud 2 Prasad B 3

Date of Publication :7th March 2016

Abstract: Due to the design complexities involved the video data hiding is still an important research topic. We propose a new video data hiding method that makes use of erasure correction capability of repeat accumulate codes and superiority of forbidden zone data hiding. Selective embedding is utilized in the proposed method to determine host signal samples suitable for data hiding. This method also contains a temporal synchronization scheme in order to withstand frame drop and insert attacks. The proposed framework is tested by typical broadcast material against MPEG- 2, H.264 compression, frame-rate conversion attacks, as well as other well-known video data hiding methods. The decoding error values are reported for typical system parameters. The simulation results indicate that the framework can be successfully utilized in video data hiding applications. Data hiding is the process of embedding information into a host medium. In general, visual and arual media are preferred due to their wide presence and the tolerance of human perceptual systems involved. Although the general structure of data hiding process does not depend on the host media type, the methods vary depending on the nature of such media.

Reference :

    1. S. K. Kapotas, E. E. Varsaki, and A. N. Skodras, “Data hiding in H-264 encoded video sequences,” in Proc. IEEE 9th Workshop Multimedia Signal Process., Oct. 2007, pp. 373–376.
    2. Sarkar, U. Madhow, S. Chandrasekaran, and B. S. Manjunath,“Adaptive MPEG-2 video data hiding scheme,” in Proc. 9th SPIE Security Steganography Watermarking Multimedia Contents, 2007, pp.373–376.
    3. K. Solanki, N. Jacobsen, U. Madhow, B. S. Manjunath, and S. Chandrasekaran, “Robust image-adaptive data hiding using erasure and error correction,” IEEE Trans. Image Process., vol. 13, no. 12, pp. 1627–1639,Dec. 2004.
    4. M. Schlauweg, D. Profrock, and E. Muller, “Correction of insertions and deletions in selective watermarking,” in Proc. IEEE Int. Conf. SITIS, Nov.–Dec. 2008, pp. 277–284.
    5. H. Liu, J. Huang, and Y. Q. Shi, “DWT-based video data hiding robust to MPEG compression and frame loss,” Int. J. Image Graph., vol. 5, no. 1, pp. 111–134, Jan. 2005
    6. M. Wu, H. Yu, and B. Liu, “Data hiding in image and video: I. Fundamental issues and solutions,” IEEE Trans. Image Process., vol.12, no. 6, pp. 685–695, Jun. 2003. 
    7. M. Wu, H. Yu, and B. Liu, “Data hiding in image and video: II. Designs and applications,” IEEE Trans. Image Process., vol. 12, no. 6, pp. 696–705, Jun. 2003.
    8. E. Esen and A. A. Alatan, “Forbidden zone data hiding,” in Proc. IEEE Int. Conf. Image Process., Oct. 2006, pp. 1393–1396
    9. B. Chen and G. W. Wornell, “Quantization index modulation: A class of provably good methods for digital watermarking and information embedding,” IEEE Trans. Inform. Theory, vol. 47, no. 4, pp. 1423–1443, May 2001.
    10. E. Esen, Z. Do˘gan, T. K. Ates, and A. A. Alatan, “Comparison of quantization index modulation and forbidden zone data hiding for compressed domain video data hiding,” in Proc. IEEE 17th Signal Process. Commun. Applicat. Conf., Apr. 2009, pp. 404–407.
    11. D. Divsalar, H. Jin, and R. J. McEliece, “Coding theorems for turbo-like codes,” in Proc. 36th Allerton Conf. Commun. Control Comput., 1998, pp. 201–210.
    12. M. M. Mansour, “A turbo-decoding messagepassing algorithm for sparse parity-check matrix codes,” IEEE Trans. Signal Process., vol. 54, no 11, pp. 4376–4392, Nov. 2006.
    13. Z. Wei and K. N. Ngan, “Spatio-temporal just noticeable distortion profile for grey scale image/video in DCT domain,” IEEE Trans. Circuits Syst. Video Technol., vol. 19, no. 3, pp. 337–346, Mar. 2009.
    14. M. Maes, T. Kalker, J. Haitsma, and G. Depovere, “Exploiting shift invariance to obtain a high payload in digital image watermarking,” in Proc. IEEE ICMCS, vol. 1. Jul. 1999, pp. 7–12.
    15. T. Kalker, G. Depovere, J. Haitsma, and M. J. Maes, “Video watermarking system for broadcast monitoring,” in Proc. SPIE Security Watermarking Multimedia Contents Conf., vol. 3657. 1999, pp. 103– 112
    16. M. Maes, T. Kalker, J.-P. M. G. Linnartz, J. Talstra, F. G. Depovere, and J. Haitsma, “Digital watermarking for DVD video copy protection,” IEEE Signal Process. Mag., vol. 17, no. 5, pp. 47– 57, Sep. 2000.
    17. K. Wong, K. Tanaka, K. Takagi, and Y. Nakajima, “Complete video quality-preserving data hiding,” IEEE Trans. Circuits Syst. Video Technol., vol. 19, no. 10, pp. 1499–1512, Oct. 2009.
    18. G. Tardos, “Optimal probabilistic fingerprint codes,” in Proc. 35th Annu. ACM STOC, 2003, pp. 116–125.
    19. B. Skoric, T. U. Vladimirova, M. Celik, and J. C. Talstra, “Tardos fingerprinting is better than we thought,” IEEE Trans. Inform. Theory, vol. 54, no. 8, pp. 3663–3676, Aug. 2008.
    20. Sarkar, U. Madhow, S. Chandrasekaran, and B. S. Manjunath, “Adaptive MPEG-2 video data hiding scheme,” in Proc. 9th SPIE Security Steganography Watermarking Multimedia Contents, 2007, pp. 373–376
    21. Jonathan Cummins, Patrick Diskin, Samuel Lau and Robert Parlett,Steganography and digital watermarking” School of Computer Science, TheUniversity of Birmingham. 2003.

Recent Article