IJIRST (International Journal for Innovative Research in Science & Technology)ISSN (online) : 2349-6010

 International Journal for Innovative Research in Science & Technology

Embedded Hiding and Extracting Secret Data in Compress Video File


Print Email Cite
International Journal for Innovative Research in Science & Technology
Volume 1 Issue - 9
Year of Publication : 2015
Authors : Rohit Nagargoje ; Manish Raka; amrut pol; B.B.Gite

BibTeX:

@article{IJIRSTV1I9009,
     title={Embedded Hiding and Extracting Secret Data in Compress Video File},
     author={Rohit Nagargoje, Manish Raka, amrut pol and B.B.Gite},
     journal={International Journal for Innovative Research in Science & Technology},
     volume={1},
     number={9},
     pages={18--22},
     year={},
     url={http://www.ijirst.org/articles/IJIRSTV1I9009.pdf},
     publisher={IJIRST (International Journal for Innovative Research in Science & Technology)},
}



Abstract:

The Security has become an essential part of our daily life, and many organizations realize that the Security can be a major issue to protect data from unauthorized person. In this project, we are going to deals with data hiding in compressed video. Unlike data hiding in images and raw video which operates on the images themselves in the spatial or transformed domain. We target the motion vectors used to encode and reconstruct both the forward predictive (P)-frame and bidirectional (B)-frames in compressed video. The choice of candidate subset of these motion vectors are based on their macro block prediction error, which is different from the approaches based on the motion vector attributes such as the magnitude and phase angle, etc. A greedy adaptive threshold is searched for every frame to achieve robustness while maintaining a low prediction error level. The secret message bit stream is embedded in the least significant bit of both components of the candidate motion vectors. The method is implemented and tested for hiding data in natural sequences of multiple groups of pictures and the results are evaluated. The evaluation is based on two criteria: minimum distortion to the reconstructed video and minimum overhead on the compressed video size. Based on the criteria, the proposed method is found to perform well and is compared to a motion vector attribute-based method from the literature.


Keywords:

Encryption, Compression, Authentication, LBS Method, Password, LZW, AES


Download Article