CFP last date
20 May 2024
Reseach Article

Data Hiding on Selected Object Track using Partial Least Square Analysis

by Ravi Shivhare, Nitin Mishra
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 132 - Number 1
Year of Publication: 2015
Authors: Ravi Shivhare, Nitin Mishra
10.5120/ijca2015907270

Ravi Shivhare, Nitin Mishra . Data Hiding on Selected Object Track using Partial Least Square Analysis. International Journal of Computer Applications. 132, 1 ( December 2015), 37-41. DOI=10.5120/ijca2015907270

@article{ 10.5120/ijca2015907270,
author = { Ravi Shivhare, Nitin Mishra },
title = { Data Hiding on Selected Object Track using Partial Least Square Analysis },
journal = { International Journal of Computer Applications },
issue_date = { December 2015 },
volume = { 132 },
number = { 1 },
month = { December },
year = { 2015 },
issn = { 0975-8887 },
pages = { 37-41 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume132/number1/23561-2015907270/ },
doi = { 10.5120/ijca2015907270 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:28:00.680661+05:30
%A Ravi Shivhare
%A Nitin Mishra
%T Data Hiding on Selected Object Track using Partial Least Square Analysis
%J International Journal of Computer Applications
%@ 0975-8887
%V 132
%N 1
%P 37-41
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With the large increase of internet users people are transferring information in many ways. But information protection is still a major issue for the people where different type of intruders is ready to read sensitive information. So contributing this field paper has focus on the information hiding in video frames. In order to hide information, position in the frame object is identified by use of color Histogram method. Here each frame passes through algorithm to filter tracked object from others. As each object has some path in the video and that is totally random, this path is not any algorithm dependent and different for different objects in the video. So one of the implementation of this random path is message sending by hiding text of that data at the respective position. So a normal video act as perfect messenger.

References
  1. Hanieh Khalilian, Student Member, IEEE, and Ivan V. BajicVideo “Watermarking With Empirical PCA-Based Decoding” IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 22, NO. 12, DECEMBER 2013.
  2. Walter Godoy Jr., Charles Way Hun Fung “ A novel DWT-SVD video watermarking scheme using side view” 978-1-4577-1180-0/11/$26.00 ©2011 IEEE.
  3. Tamanna Tabassum, S.M. Mohidul Islam “A Digital Video Watermarking Technique Based on Identical Frame Extraction in 3-Level DWT” vol. 13, no. 7, pp. 560 –576, july 2003.
  4. Frank Hartung, Jonathan K. Su, and Bernd Girod “Spread Spectrum Watermarking: Malicious Attacks and Counterattacks”. of Multimedia Contents” International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
  5. “CHAPTER 2. WAVELET TRANSFORMS ON IMAGES” sundoc.bibliothek.uni-halle.de/diss-online/02/03H033/t4.pdf
  6. A.F.ElGamal, N.A.Mosa , W.K.ElSaid A Fragile Video Watermarking Algorithm for Content Authentication based on Block Mean and Modulation Factor International Journal of Computer Applications (0975 – 8887) Volume 80 – No.4, October 2013.
  7. Nallagarla.Ramamurthy#1 and Dr.S.Varadarajan. “Effect of Various Attacks on Watermarked Images. “International Journal of Computer Science and information technologies, vol. 3 (2) , 2012,3582-3587
  8. Priya Porwal1, Tanvi Ghag, Nikita Poddar, Ankita Tawde digital video watermarking using modified lsb and dct technique. International journal of research in engineering and technology eissn: 2319-1163.
  9. Mr Mohan A Chimanna 1,Prof.S.R.Kho “Digital Video Watermarking Techniques for Secure Multimedia Creation and Delivery” Vol. 3, Issue 2, March -April 2013, pp.839-844839.
  10. Dawen xu, rangding wang, and yun q. Shi. “Data hiding in encrypted h.264/avc video Streams by codeword substitution”. Ieee transactions oninformation forensics and security, vol. 9, no. 4, april 2014.
Index Terms

Computer Science
Information Sciences

Keywords

Digital data hiding Frame segmentation Information Hiding.