SECRET DATA HIDING IN ENCRYPTED COMPRESSED VIDEO BITSTREAMS USING CHAOS CRYPTO SYSTEM
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 4, Issue 7
Abstract
Early research works have been done on image. Due to few features of images, such as high correlation among pixels and bulk data capacity , previous encryption algorithms are not suitable. Cloud computing has become an important technology trend, which can provide large-scale storage solution and highly efficient computation for video data. It is desired that the video content is accessible in encrypted form to protect from untrustworthy system administrators. The capability of performing data hiding is done in encrypted H.264/AVC video bitstreams which would avoid the leakage of video information also can help to maintain security and privacy concerns with cloud computing. During H.264/AVC compression, the intra-prediction mode (IPM), motion vector difference (MVD) and DCT coefficients’ signs are encrypted. For the purpose of content notation and tampering detection, it is necessary to perform data hiding in these encrypted videos. In system, a novel scheme of data hiding is proposed, which includes three section as follows, i.e., H.264/AVC video encryption, data encryption , and data decryption. Chaos crypto system is used here to encrypt/decrypt secret text data before/after data embedding/extraction. video file size is strictly preserved even after encryption and data embedding .
Authors and Affiliations
Sonali. A. Chaudhari ,
Hydrological Parameters And Aquifer Studies In Bolangir District
Bolangir is one of the severe drought prone and economically backward district of western Odisha, where average annual is scanty and erratic and the scope of surface water irrigation is limited resultingtosevere drought...
An Overview on Energy-aware Clustering Technique for Maximizing Wireless Sensor Network Life Time
A Wireless Sensor Network is a wireless network that consists of spatially distributed devices called sensor nodes. Sensor nodes are having sensing, data processing and communication functionalities. The sensor no...
Novel Algorithm for Iris Biometrics Using Fast Wavelet Transforms
Iris recognition is a potential tool in secure personal identification and authentication system which has the properties such as uniqueness, non-invasiveness and stability of human iris patterns. The method propo...
VIBRATION ANALYSIS OF TRACTOR MOUNTED HYDRAULIC ELEVATOR
In Due to increase of height of horiticultural crops it is difficult to harvesting and pruning. Some equipments & hand tools are available in market for harvesting and pruning, but those tools are non-useful for har...
EFFECT OF ANAEROBIC LEVEL ON THE GERMINATION OF WHITE AND BLACK STICKY BROWN RICE IN MEKONG DELTA, VIETNAM
The objective of this study was to optimize and compare production condition of GBRto maximize bio-active compounds. In order to do that the white sticky rice (CLN) and black sticky rice (DH6) varieties from A...