CFP last date
20 May 2024
Reseach Article

Compressed Secured Video Steganography for Avi Files

Published on August 2011 by Rohit R. Nikam, K.V. Bhosle, Swati A. Abhang
journal_cover_thumbnail
National Technical Symposium on Advancements in Computing Technologies
Foundation of Computer Science USA
NTSACT - Number 5
August 2011
Authors: Rohit R. Nikam, K.V. Bhosle, Swati A. Abhang
cd310331-60ef-4287-a3b9-4cad1898aca6

Rohit R. Nikam, K.V. Bhosle, Swati A. Abhang . Compressed Secured Video Steganography for Avi Files. National Technical Symposium on Advancements in Computing Technologies. NTSACT, 5 (August 2011), 13-16.

@article{
author = { Rohit R. Nikam, K.V. Bhosle, Swati A. Abhang },
title = { Compressed Secured Video Steganography for Avi Files },
journal = { National Technical Symposium on Advancements in Computing Technologies },
issue_date = { August 2011 },
volume = { NTSACT },
number = { 5 },
month = { August },
year = { 2011 },
issn = 0975-8887,
pages = { 13-16 },
numpages = 4,
url = { /proceedings/ntsact/number5/3217-ntst038/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Technical Symposium on Advancements in Computing Technologies
%A Rohit R. Nikam
%A K.V. Bhosle
%A Swati A. Abhang
%T Compressed Secured Video Steganography for Avi Files
%J National Technical Symposium on Advancements in Computing Technologies
%@ 0975-8887
%V NTSACT
%N 5
%P 13-16
%D 2011
%I International Journal of Computer Applications
Abstract

Steganography is the idea of hiding private or sensitive data or information within something that appears to be nothing out of the ordinary. Steganography is the art and science of hiding communication; a steganographic system thus embeds hidden content in unremarkable cover media so as not to arouse an eavesdropper’s suspicion. In the past, people used hidden tattoos or invisible ink to convey steganographic content. Today, computer and network technologies provide easyto- use communication channels for steganography. Essentially, the information-hiding process in a steganographic system starts by identifying a cover medium’s redundant bits (those that can be modified without destroying that medium’s integrity). The embedding process creates a stego medium by replacing these redundant bits with data from the hidden message.

References
  1. K. Su, D. Kundur, and D. Hatzinakos, “Statistical invisibility for collusion-resistant digital video watermarking,” IEEE Trans. Multimedia, 2005,(7)1:43-51
  2. U. Budhia, D. Kundur, T. Zourntos. Digital Video Steganalysis Exploiting Statistical Visibility in the Temporal Domain. IEEE Trans. Information Forensics and security, 2006, (1)4:502-516.
  3. G. C. Langelaar. Watermarking Digital Image and Video Data. IEEE Signal Processing Magazine, 2000, (17)5:20- 46.
  4. Y. J. Dai, L. H. Zhang and Y. X. Yang. A New Method of MPEG Video Watermarking Technology. International Conference on Communication Technology Proceedings(ICCT), 2003.
  5. C. Lu, J. Chen and K. Fan, "Real-time Frame-Dependent Video Watermarking in VLC Domain", Signal Processing: Image Communication 20, 2005
  6. E. Q. L. X. Zhou and Y. Chen, implementation of h.264 decoder on general purpose processors with media instructions,î in SPIE Conf. on Image and Video Communications and Processing, (Santa Clara, CA), pp. 224ñ235, Jan 2003.
  7. M. B. T. Q. N. A. Molino, F. Vacca, ìLow complexity video codec for mobile video conferencing,î in Eur. Signal Processing Conf. (EUSIPCO), (Vienna, Austria), pp. 665ñ668, Sept 2004.
  8. S. B. Gokturk and A. M. Aaron, ìApplying 3d methods to Video for Compression,î in Digital Video Processing (EE392J) Projects Winter Quarter, 2002.
  9. T. Fryza, Compression of Video Signals by 3D-DCT Transform. Diploma thesis, Institute of Radio Electronics, FEKT Brno University of Tech., Czech Republic, 2002.
  10. G. M.P. Servais, ìVideo compression using the three dimensional discrete cosine transform,î in Proc.COMSIG,pp. 27ñ32, 1997.
Index Terms

Computer Science
Information Sciences

Keywords

Video Steganography Hidden Data Video frame LSB