A Novel Block-Based Selective Embedding Type Video Data Hiding Using Encryption Algorithms

Author(s):  
P. Saravanan ◽  
K. K. Thyagarajan
2018 ◽  
Vol 6 (7) ◽  
pp. 647-653
Author(s):  
Dr.K.Vanaja . ◽  
D. Thilagavathi ◽  
C. Rukmani ◽  
L.Gandhi .

2020 ◽  
Vol 2 ◽  
pp. 100088 ◽  
Author(s):  
Yu Wang ◽  
Xianfeng Zhao ◽  
Yun Cao
Keyword(s):  

2011 ◽  
Vol 20 (02) ◽  
pp. 163-184 ◽  
Author(s):  
HARRIS E. MICHAIL ◽  
DIMITRIOS SCHINIANAKIS ◽  
COSTAS E. GOUTIS ◽  
ATHANASIOS P. KAKAROUNTAS ◽  
GEORGIOS SELIMIS

Message Authentication Codes (MACs) are widely used in order to authenticate data packets, which are transmitted thought networks. Typically MACs are implemented using modules like hash functions and in conjunction with encryption algorithms (like Block Ciphers), which are used to encrypt the transmitted data. However NIST in May 2005 issued a standard, addressing certain applications and their needs, defining a way to implement MACs through FIPS-approved and secure block cipher algorithms. In this paper the best performing implementation of the CMAC standard is presented, in terms of throughput, along with an efficient AES design and implementation.


2005 ◽  
Vol 05 (01) ◽  
pp. 111-133 ◽  
Author(s):  
HONGMEI LIU ◽  
JIWU HUANG ◽  
YUN Q. SHI

In this paper, we propose a blind video data-hiding algorithm in DWT (discrete wavelet transform) domain. It embeds multiple information bits into uncompressed video sequences. The major features of this algorithm are as follows. (1) Development of a novel embedding strategy in DWT domain. Different from the existing schemes based on DWT that have explicitly excluded the LL subband coefficients from data embedding, we embed data in the LL subband for better invisibility and robustness. The underlying idea comes from our qualitative and quantitative analysis of the DWT coefficients magnitude distribution over commonly used images. The experimental results confirm the superiority of the proposed embedding strategy. (2) To combat temporal attacks, which will destroy the synchronization of hidden data that is necessary in data retrieval, we develop an effective temporal synchronization technique. Compared with the sliding correlation proposed in the existing algorithms, our synchronization technique is more advanced. (3) We adopt a new 3D interleaving technique to combat bursts of errors, while reducing random error probabilities in data detection by exploiting ECC (error correcting coding). The detection error rate with 3D interleaving is much lower than that without 3D interleaving when frame loss rate is below 50%. (4) Take a carefully designed measure in bit embedding to guarantee the invisibility of information. In experiments, we can embed a string of 402 bytes (excluding the redundant bits associated with ECC) in 96 frames of the CIF format sequence. The experimental results have demonstrated that the embedded information bits are perceptually transparent when the frames in the sequence are viewed either as still images or played continuously. The hidden information is robust to manipulations, such as MPEG-2 compression, scaling, additive random noise, and frame loss.


IEEE Access ◽  
2021 ◽  
pp. 1-1
Author(s):  
Yanli Chen ◽  
Limengnan Zhou ◽  
Yonghui Zhou ◽  
Yi Chen ◽  
Shengbo Hu ◽  
...  

IARJSET ◽  
2017 ◽  
Vol 4 (1) ◽  
pp. 13-15
Author(s):  
Kundalakesi K ◽  
Abarna A ◽  
Kalaiselvi K ◽  
Sushmitha S
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document