RS and OFDM Methods Over Encrypted and Data Embedded Video Streams
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 5 Issue 5, May 2016

RS and OFDM Methods Over Encrypted and Data Embedded Video Streams

Jithya J. Prakash, Hemand E. P.

Data hiding techniques are usually used in image processing. It is used to embed a secret message into a image for ensuring privacy. Data hiding can also be applied to videos. So the confidentiality of the image, video and embedded data is maintained. Sometimes digital video needs to be processed in an encrypted format to maintain security and privacy. For the purpose of content notation and/or tampering detection it is necessary to perform data hiding in these encrypted videos. There exists different techniques for hiding private data in videos. Several data hiding techniques in videos have been proposed. The data is embedded by using data hiding algorithm. This method preserves the exact data and video quality. There are some challenge while transmitting an encrypted video with hidden data from a sender to a receiver. At the time of transmission there is a chance of occurrence of errors in the content of video due to the presence of noise and by some other factors. Hence introduced a Reed Soloman error detection and correction method, which detect and correct the error. To improve the data rate through the channel an OFDM (Orthogonal Frequency Division Multiplexing) method is also proposed. These methods provides better efficiency, accuracy and performance.

Keywords: Data Hiding, Reed Soloman Method, OFDM, Chien search Algorithm

Edition: Volume 5 Issue 5, May 2016

Pages: 2352 - 2357

Share this Article

How to Cite this Article?

Jithya J. Prakash, Hemand E. P., "RS and OFDM Methods Over Encrypted and Data Embedded Video Streams", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV163921, Volume 5 Issue 5, May 2016, 2352 - 2357

78 PDF Views | 58 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Data Hiding'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1642 - 1643

A Survey Paper on Various Encryption & Data Hiding Methods for Video Streams

Shrutika S. Giradkar, Antara Bhattacharya

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1534 - 1539

Data Anonymization Approach for Data Privacy

Padma L. Gaikwad, M. M. Naoghare

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3075 - 3078

Secret Data Hiding in Compressed Video Bit Streams for Privacy Information Protection

B. Vengadalakshmi, S. Abiramasundari

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1537 - 1542

A Survey on Steganography Techniques

Amruta B. Bhojane, Priti A. Kodake

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2657 - 2659

An Outline of Various Secret Sharing Techniques

Kavita Choudhary, Kumar Vaibhav

Share this Article

Similar Articles with Keyword 'OFDM'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2002 - 2005

A Survey on Barcode Generation and Modulation Techniques

Vidyashree Kokane, Shyam Gupta

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2352 - 2357

RS and OFDM Methods Over Encrypted and Data Embedded Video Streams

Jithya J. Prakash, Hemand E. P.

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1484 - 1486

Broadband over Power Line

Seema, Dr. Neetu Sharma

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2606 - 2609

Designing and Comparative Analysis of Image Transmission using Techniques HQAM and QAM

Neeru Sharma

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 12, December 2017

Pages: 1120 - 1123

UPA for Image Transmission with Chaotic Communication

Monika Vyas, Sumeet Dhillon

Share this Article
Top