International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064

Downloads: 109 | Views: 143

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 4, April 2015

Secret Data Hiding in Compressed Video Bit Streams for Privacy Information Protection

B. Vengadalakshmi | S. Abiramasundari [2]

Abstract: The project presents the compressed video bit streams and hiding privacy information to protect videos during transmission or cloud storage. Digital video sometimes needs to be stored and processed in a compressed format to maintain security and privacy. Data hiding approach is necessary to perform in these encoded videos for the purpose of content notation and tampering detection. In this way, data hiding in encoded domain without decoding preserves the confidentiality of the content. Here, data hiding directly in the version of H.264/AVC video stream is approached, which includes the following three parts, i. e. , H.264/AVC video encoding, data embedding, and data extraction. By analyzing the property of H.264/AVC codec, the code words of intra prediction modes, the code words of motion vector differences, and the code words of residual coefficients are coded using H.264 encoding technique. Then, a data hider may embed additional data in to it by using bits replacement technique, without knowing the original video content. Chaos crypto system is used here to encrypt/decrypt secret text data before/after data embedding/extraction. The project simulated results shows that used methods provides better performance in terms of computation efficiency, high data security and video quality after decryption. The parameters such as Mean square error, PSNR, correlation are evaluated to measure its efficiency.

Keywords: Bits Stream, Data Hiding, Video Compression, Video Stenography

Edition: Volume 4 Issue 4, April 2015,

Pages: 3075 - 3078

How to Download this Article?

Type Your Email Address below to Receive the Article PDF Link

Verification Code will appear in 2 Seconds ... Wait