scispace - formally typeset
Proceedings ArticleDOI: 10.1109/RTEICT.2016.7807979

Double coding mechanism for robust audio data hiding in videos

01 Apr 2016-pp 997-1001
Abstract: This paper proposes a simple and robust method of audio data embedding into videos. Robustness in this method comes because of the use of double coding mechanism. Here double coding means using two kinds of codes on the same data one after another. This provides more security and reliability to the hidden data into video. As security is the most important matter of concern in present data communication scenario, thus our proposed method provides satisfactory results. The method performed in wavelet domain by using pseudo random codes and morse codes. The performance of this method is evaluated by MSE (Mean Square Error) and PSNR (Peak Signal to Noise Ratio). Further testing is done on videos after embedding, by exposing it to video compression technique. The obtained test result doesn't affect much to the quality of extracted audio data.

...read more

Topics: Data compression (61%), Robustness (computer science) (55%), Peak signal-to-noise ratio (54%) ...read more
Citations
  More

Open accessJournal ArticleDOI: 10.21917/IJIVP.2019.0275
Abstract: In this modern era, where technology is increasing at rapid pace and made all day new developments, security is of highest priority. To protect facts into the unrecognizable form diverse technique are used for records hiding like steganography and cryptography techniques have been advanced. This paper securing the image by way of encryption is completed by LSB bits, DWT and RSA algorithm. This paper additionally presents new strategies wherein cryptography and steganography are mixed to scramble the information and in addition to cover the insights in some other medium through image processing (IP). The encrypted picture can be hiding in some other image by way of the use of LSB bits, DWT strategies so that the secret’s message exists. RSA algorithm applied, receiver will use his/her private key because the secret data have been encrypted by recipient public key. Hide encrypted image in the cover image by DWT. Extract encrypted image from cover image and decrypt text by DWT. The proposed scheme is implemented in MATLAB platform the use of preferred cryptography and steganography set of regulations. Calculate PSNR and MSE. Also calculate the entropy of cover image and stego image. This method is secure for communication in the digital world with the digital data transmission.

...read more

10 Citations


Open accessJournal ArticleDOI: 10.15587/1729-4061.2020.201010
Abstract: Protecting information on various communication media is considered an essential requirement in the present information transmission technology. So, there is a continuous search around different modern techniques that may be used to protect the data from the attackers. Steganography is one of those techniques that can be used to maintain the copyright by employing it to cover the publisher logo image inside the video frames. Nowadays, most of the popular known of the Video-Steganography methods become a conventional technique to the attacker, so there is a requirement for a modern and smart strategy to protect the copyright of the digital video file. Where this proposed system goal to create a hybrid system that combines the properties of Cryptography and Steganography work to protect the copyright hidden data from different attack types with maintaining of characteristics of the original video (quality and resolution). In this article, a modern Video-Steganography method is presented by employing the benefits of TC (Turbo code) to encrypt the pixels of logo image and Least two Significant Bit Technique procedure to embed the encryption pixels inside the frames of the video file. The insertion is performed in the frequency domain by applying the Fast Fourier Transform (FFT)on the video frames. The examination of the suggested architecture is done by terms of Structural Similarity Index, MSE (mean squared error), and PSNR (peak signal-to-noise ratio) by comparing between an original and extracted logo as well as between original and Steganographic video (averaged overall digital frames in the video). The simulation results show that this method proved high security, robustness, capacity and produces a substantial performance enhancement over the present known ways with fewer distortions in the quality of the video

...read more

Topics: Steganography (61%), Encryption (52%), Cryptography (52%) ...read more

3 Citations


Open accessJournal Article
Abstract: Need of hiding information from intruders has been around since ancient times. Nowadays digital media is getting advanced like text, image, audio, video etc. To maintain the secrecy of information different methods of hiding have been evolved. One of them is Steganography which means hiding information under some other information without noticeable change in cover information. Video Steganography is the technique of hiding some covert message inside a video. In these paper work on improve data hiding capacity using video Steganography and use motion vector here for hiding data using LSB approach for hide text data. Using proposed system to improve images accuracy, embedding capacity. To enhance more security each bit of secret frames will be stored in covered frames. That are achieves good images quality when compared with existing method.

...read more

Topics: Steganography (63%), Information hiding (61%), Least significant bit (51%) ...read more

2 Citations


Open accessJournal Article
Abstract: In the mechanical design constituent, numerical simulations method is mostly used for design instauration (or modification) and design optimisation. In the nowadays aim of work the first stage rotor leaf sword of a two-stage gas turbine has been analyzed for steady state thermal using ANSYS 16.2 an attempt has been investigated the effect of temperature on the turbine blade. A steady state thermal analysis has been carried out to investigate the focal point of the temperature flow rate which is been develops due to the thermal loading. An attempt is also made to suggest the best material for a turbine blade by comparing the results obtained for three different stuff such as Copper, Titanium and Nickel that has been considered for the analysis. The blade is modelled with SolidWorks 2015. The geometric model of the blade profile is generated with mathematically and extruded to get a solid model. In this work after finding the suitable materials, the analysis of different diam of hole also investigated. For different hole diameter, it has been pointed out that if the diameter of the hole is increased gradually with the constant number of holes, then the maximum temperature value and the total heat flux distribution decreases, then it grows again. Therefore, this present work the suitable diameter of hole also has been suggested for better performance in future.

...read more

Topics: Turbine blade (64%), Heat flux (51%), Rotor (electric) (51%)

2 Citations


Proceedings ArticleDOI: 10.1109/ICCCNT.2017.8204117
Komal Sharma1, Kunal Gupta1Institutions (1)
01 Jul 2017-
Abstract: This paper proposes a new compression technique and compares its performance with the popular adaptive Huffman encoding. The main objective of our approach was to shrink the original data optimally without losing data integrity. The above proposed algorithm employs static variable length non prefix codes for ASCII characters that have been assigned by analyzing the character occurring probabilities in variables lossless data file. We have used several lossless data formats like BMP, PNG, TXT, WAV, FLAC, AAC, WMV, DOC. For comparison and analysis we have used compression ratio, compression time, compression factor and saving percentage. A windows executable application has been constructed to facilitate and ease application usage. Moreover the addition of encryption algorithm(Caesar Cipher) will ensure the file protection and privacy. This compression can easily handle large files and without consuming much of system's resources.

...read more

Topics: Lossless compression (69%), Huffman coding (58%), Encryption (55%) ...read more

1 Citations


References
  More

Open accessJournal ArticleDOI: 10.1016/J.SIGPRO.2009.08.010
01 Mar 2010-Signal Processing
Abstract: Steganography is the science that involves communicating secret data in an appropriate multimedia carrier, e.g., image, audio, and video files. It comes under the assumption that if the feature is visible, the point of attack is evident, thus the goal here is always to conceal the very existence of the embedded data. Steganography has various useful applications. However, like any other science it can be used for ill intentions. It has been propelled to the forefront of current security techniques by the remarkable growth in computational power, the increase in security awareness by, e.g., individuals, groups, agencies, government and through intellectual pursuit. Steganography's ultimate objectives, which are undetectability, robustness (resistance to various image processing methods and compression) and capacity of the hidden data, are the main factors that separate it from related techniques such as watermarking and cryptography. This paper provides a state-of-the-art review and analysis of the different existing methods of steganography along with some common standards and guidelines drawn from the literature. This paper concludes with some recommendations and advocates for the object-oriented embedding mechanism. Steganalysis, which is the science of attacking steganography, is not the focus of this survey but nonetheless will be briefly discussed.

...read more

  • Fig. 7. Communication-theoretical view of a generic embedding proce
    Fig. 7. Communication-theoretical view of a generic embedding proce
  • Fig. 14. JPEG suggested Luminance Quantization Table used in DCT lossy compression. The value 16 (in bold-face) represents the DC coefficient and the other values are the AC coefficients.
    Fig. 14. JPEG suggested Luminance Quantization Table used in DCT lossy compression. The value 16 (in bold-face) represents the DC coefficient and the other values are the AC coefficients.
  • Fig. 13. Histograms of Lena and Baboon: (a) histogram of Lena; (b) difference histogram of Lena; (c) histogram of Baboon; (d) difference histogram of Baboon [36].
    Fig. 13. Histograms of Lena and Baboon: (a) histogram of Lena; (b) difference histogram of Lena; (c) histogram of Baboon; (d) difference histogram of Baboon [36].
  • Fig. 15. The modified Quantization Table [39].
    Fig. 15. The modified Quantization Table [39].
  • Table 4 compares some software tools appearing in [25]. We based our comparison on the following factors:
    Table 4 compares some software tools appearing in [25]. We based our comparison on the following factors:
  • + 26

Topics: Steganography tools (74%), Steganography (66%), Steganalysis (62%) ...read more

1,410 Citations


Journal ArticleDOI: 10.1109/83.777088
Abstract: We present a new method of digital steganography, entitled spread spectrum image steganography (SSIS). Steganography, which means "covered writing" in Greek, is the science of communicating in a hidden manner. Following a discussion of steganographic communication theory and review of existing techniques, the new method, SSIS, is introduced. This system hides and recovers a message of substantial length within digital imagery while maintaining the original image size and dynamic range. The hidden message can be recovered using appropriate keys without any knowledge of the original image. Image restoration, error-control coding, and techniques similar to spread spectrum are described, and the performance of the system is illustrated. A message embedded by this method can be in the form of text, imagery, or any other digital signal. Applications for such a data-hiding scheme include in-band captioning, covert communication, image tamperproofing, authentication, embedded control, and revision tracking.

...read more

Topics: Steganography tools (67%), Steganography (66%), Image restoration (57%) ...read more

727 Citations



Open accessBook
21 Sep 2011-
Abstract: ions of image information and making local decisions at every image point whether there is an image feature of a given type at that point or not the resulting features will 25 / 31 be subsets of the image domain often in the form of isolated points continuous curves or connected, this is the first book to combine image and video processing with a practical matlab oriented approach in order to demonstrate the most important image and video techniques and algorithms utilizing minimal math the contents are presented in a clear objective manner emphasizing and encouraging experimentation, software for manipulating or displaying netcdf data this document provides references to software packages that may be used for manipulating or displaying netcdf data we include information about both freely available and licensed commercial software that can be used with netcdf data, international journal of scientific and research publications volume 2 issue 6 june 2012 1 issn 2250 3153 www ijsrp org, practical statistics a quick and easy guide to ibm spss statistics stata and other statistical software matlab fr dummies german edition lectures on the nearest neighbor method springer series in the data sciences r for stata users statistics and computing additional info for practical image and video processing using , practical image and video processing using matlab oge marques on amazon com free shipping on qualifying 26 / 31 offers up to date technically accurate coverage of essential topics in image and video processing this is the first book to combine image and video processing with a practical matlab oriented approach in order to demonstrate the most important image and video techniques , very sadly dr david lucy died on wednesday 20 june 2018 david was perhaps best known in the forensic science community for his work on statistical models for the calculation of likelihood ratios including his work with prof colin aitken on multivariate kernel density models and for his 2005 book introduction to statistics for forensic scientists, this page is a curated collection of jupyter ipython notebooks that are notable feel free to add new content here but please try to only include links to notebooks that include interesting visual or technical content this should not simply be a dump of a google search on every ipynb file out, this is the first book to combine image and video processing with a practical matlab r oriented approach in order to demonstrate the most important image and video techniques and algorithms utilizing minimal math the contents are presented in a clear objective manner emphasizing up to date, schedule lecture slides will be posted here shortly before each lecture if you wish to view slides further in advance refer to last year s slides which are mostly similar the lecture notes are updated versions of the cs224n 2017 lecture notes viewable here and will be uploaded a few days after each lecture the notes which cover approximately the first half of the course content give, up to date technically accurate coverage of essential topics in image and video processing this is the first book to combine image and video processing with a practical matlab oriented approach in order to demonstrate the most important image and video techniques and algorithms, torrent contents practical image and video processing using matlab o marques wiley ieee 2011 bbs pdf 13 27 / 31 mb please note that this page does not hosts or makes available any of the listed filenames, up to date technically accurate coverage of essential topics in image and video processing this is the first book to combine image and video processing with a practical matlab oriented approach in order to demonstrate the most important image and video techniques and algorithms, image processing digital techniques genre digital video mathematics summary the book provides a practical introduction to the most important topics in image and video processing using matlab and its image processing toolbox as a tool to demonstrate the most important techniques and algorithms, big data training and tutorials what is big data it s a phrase used to quantify data sets that are so large and complex that they become difficult to exchange secure and analyze with typical tools, read practical image and video processing using matlab by oge marques available from rakuten kobo sign up today and get 5 off your first purchase up to date technically accurate coverage of essential topics in image and video processing this is the first book to co, john a great review python is quite a steep learning curve to eclipse matlab in this instance i would suggest that r has now come of age and with ggplot is now a viable replacement for most of the work that we ever did in , read practical image and video processing using matlab by oge marques available from rakuten kobo sign up today and get 5 off your first purchase up to date technically accurate coverage of essential topics in image and video processing this is the first book to co, dr oge marques is professor of machine learning serious games and human visual perception including the textbook practical image and video processing using matlab wiley ieee press special track on medical image and video analysis using deep learning at the, practical image and video processing using matlab practical image and video processing using matlab oge marques florida atlantic university about the cover by roger dalal the elegant nautilus with its progressive chambers and near perfect logarithmic spiral demonstrates the beauty of mathematics and the power of digital image processing, up to date technically accurate coverage of essential topics in image and video processing this is the first book to combine image and video processing with a practical matlab oriented approach in order to demonstrate the most important image and video techniques and algorithms utilizing minimal math the 28 / 31 contents are presented in a clear objective manner emphasizing and , i am a professor of engineering science at simon fraser university my professional interests revolve around signal processing machine learning and their applications in image and video processing coding communications and multimedia ergonomics in addition to research teaching and consulting, college of engineering electrical engineering detailed course offerings time schedule are available for spring quarter 2019 summer quarter 2019 e e 205 introduction to signal conditioning 4 qsr introduces analog circuits interfacing sensors to digital systems includes connection attenuation amplification sampling filtering termination controls kirchhoff s laws sources, up to date technically accurate coverage of essential topics in image and video processing this is the first book to combine image and video processing with a practical matlab r oriented approach in order to demonstrate the most important image and video techniques and algorithms utilizing minimal math the contents are presented in a clear objective manner emphasizing and , abebooks com practical image and video processing using matlab 29 / 31 9780470048153 by oge marques and a great selection of similar new used and collectible books available now at great prices, stanford libraries official online search tool for books media journals databases government documents and more, practical image and video processing using matlab written for undergraduate and graduate students this book provides comprehensive coverage of video techniques and algorithms using matlab the book presents an overview of the field then introduces the fundamental concepts notation and terminology associated with image representation, texture can be a powerful descriptor of an image or one of its regions although there is not a universally agreed upon definition of texture image processing techniques usually associate the notion of texture with image or region properties such as smoothness or its opposite roughness coarseness and regularity, amazon in buy practical image and video processing using matlab wiley ieee book online at best prices in india on amazon in read 30 / 31 practical image and video processing using matlab wiley ieee book reviews amp author details and more at amazon in free delivery on qualified orders, ieee xplore delivering full text access to the world s highest quality technical literature in engineering and technology, a beginner s guide to deep reinforcement learning when it is not in our power to determine what is true we ought to act in accordance with what is most probable, 2 tutorial time series with matlab 3 disclaimer i am not affiliated with mathworks in any way but i do like using matlab a lot since it makes my life easier errors and bugs are most likely contained in this tutorial, book description up to date technically accurate coverage of essential topics in image and video processing this is the first book to combine image and video processing with a practical matlab oriented approach in order to demonstrate the most important image and video techniques and algorithms Powered by TCPDF (www.tcpdf.org)

...read more

Topics: Image processing (80%), Digital image processing (74%), Video processing (67%) ...read more

188 Citations


Proceedings ArticleDOI: 10.1109/WTS.2015.7117257
15 Apr 2015-
Abstract: Video steganography has become a popular topic due to the significant growth of video data over the Internet. The performance of any steganography algorithm depends on two factors: embedding efficiency and embedding payload. In this paper, a high embedding payload of video steganography algorithm has been proposed based on the BCH coding. To improve the security of the algorithm, a secret message is first encoded by BCH(n, k, t) coding. Then, it is embedded into the discrete wavelet transform (DWT) coefficients of video frames. As the DWT middle and high frequency regions are considered to be less sensitive data, the secret message is embedded only into the middle and high frequency DWT coefficients. The proposed algorithm is tested under two types of videos that contain slow and fast motion objects. The results of the proposed algorithm are compared to both the Least Significant Bit (LSB) and [1] algorithms. The results demonstrate better performance for the proposed algorithm than for the others. The hiding ratio of the proposed algorithm is approximately 28%, which is evaluated as a high embedding payload with a minimal tradeoff of visual quality. The robustness of the proposed algorithm was tested under various attacks. The results were consistent.

...read more

Topics: Steganography (59%), BCH code (57%), Algorithm design (57%) ...read more

49 Citations


Performance
Metrics
No. of citations received by the Paper in previous years
YearCitations
20201
20191
20183
20171
Network Information