International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064

Downloads: 101

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 11, November 2015

Data Hiding in H.264/AVC Video Encryption with XOR-ed User Information and Data in File Format

Neenu Shereef

Digital video sometimes needs to be stored and processed in an encrypted format to maintain security and privacy. In this paper, a novel scheme of data hiding directly in the encrypted version of H.264/AVC video stream is proposed, which includes the following three parts, i. e. , H.264/AVC video encryption, data embedding, and data extraction. By analyzing the property of H.264/AVC codec, the codewords of intraprediction modes, the codewords of motion vector differences, and the codewords of residual coefficients are encrypted with stream ciphers. Then, a data hider may embed additional data in the encrypted domain by using codeword substitution technique, without knowing the original video content. In order to adapt to different application scenarios, data extraction can be done either in the encrypted domain or in the decrypted domain. The enhanced feature added to the system is each user id can be saved inside the video, so that the uploader of the video can decide who all can access the data within the video.

Keywords: Data hiding, encrypted domain, H264/AVC, codeword substituting, data decryption

Edition: Volume 4 Issue 11, November 2015

Pages: 1579 - 1582

Share this Article

How to Cite this Article?

Neenu Shereef, "Data Hiding in H.264/AVC Video Encryption with XOR-ed User Information and Data in File Format", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV151456, Volume 4 Issue 11, November 2015, 1579 - 1582

Enter Your Email Address


Similar Articles with Keyword 'Data hiding'

Downloads: 103

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1175 - 1178

Steganographic Method of Data Hiding using JPEG Images

Shabana Vathelil Subair, Fathima A Muhammadali

Share this Article

Downloads: 104

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1319 - 1323

Advanced Technique for Comprehensive Data Security

Pramendra Kumar, Vijay Kumar Sharma

Share this Article

Similar Articles with Keyword 'encrypted domain'

Downloads: 104

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1642 - 1643

A Survey Paper on Various Encryption & Data Hiding Methods for Video Streams

Shrutika S. Giradkar, Antara Bhattacharya

Share this Article

Downloads: 112

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 615 - 621

Advance Robust Watermarking Of Compressed and Encrypted Digital Media

Mohammad Asif Iqbal, Kemal Koche

Share this Article

Similar Articles with Keyword 'data decryption'

Downloads: 106

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1398 - 1401

A Review on Encryption Techniques to Secure a Cloud

Ramandeep Kaur, Ashish Verma

Share this Article

Downloads: 111

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2888 - 2890

Use of Advanced Encryption Standard to Enhance the Performance of Geo Protocol in Location Based Network

Pranjala G Kolapwar, Prof. H. P. Ambulgekar

Share this Article

Similar Articles with Keyword 'Data'

Downloads: 510 | Weekly Hits: ⮙3 | Monthly Hits: ⮙5

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 1454 - 1458

Heart Disease Prediction with Machine Learning Approaches

Megha Kamboj

Share this Article

Downloads: 86 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020

Pages: 1626 - 1628

Image Noise Reduction with Autoencoder using Tensor Flow

Jai Sehgal, Dr Yojna Arora

Share this Article

Similar Articles with Keyword 'hiding'

Downloads: 91

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 823 - 826

Survey Paper on Users Location Hiding In Geosocial Recommendation Applications

Mayura Phadnis, Kanchan Varpe

Share this Article

Downloads: 102

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1809 - 1812

Efficient Flow Marking IP Traceback System

Sonali H. Mane, S. Pratap Singh

Share this Article

Similar Articles with Keyword 'encrypted'

Downloads: 11 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 788 - 791

A New Cryptography Algorithm Based on ASCII Code

Yaser M.A. Abualkas

Share this Article

Downloads: 73

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 470 - 478

Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT

Aditya Tiwari, Ayush Pandey

Share this Article

Similar Articles with Keyword 'domain'

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021

Pages: 1068 - 1070

Predicting the Course Knowledge Level of Students using Data Mining Techniques

Thapaswini P S

Share this Article

Downloads: 4

Comparative Studies, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 1560 - 1562

A Comparative Study on Different Training Model in Machine Learning

Priyanka S Jigalur, Dr. B. G. Prasad

Share this Article
Top