Novel Security Strategy for Real Time Digital Videos
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33093
Novel Security Strategy for Real Time Digital Videos

Authors: Prakash Devale, R. S. Prasad, Amol Dhumane, Pritesh Patil

Abstract:

Now a days video data embedding approach is a very challenging and interesting task towards keeping real time video data secure. We can implement and use this technique with high-level applications. As the rate-distortion of any image is not confirmed, because the gain provided by accurate image frame segmentation are balanced by the inefficiency of coding objects of arbitrary shape, with a lot factors like losses that depend on both the coding scheme and the object structure. By using rate controller in association with the encoder one can dynamically adjust the target bitrate. This paper discusses about to keep secure videos by mixing signature data with negligible distortion in the original video, and to keep steganographic video as closely as possible to the quality of the original video. In this discussion we propose the method for embedding the signature data into separate video frames by the use of block Discrete Cosine Transform. These frames are then encoded by real time encoding H.264 scheme concepts. After processing, at receiver end recovery of original video and the signature data is proposed.

Keywords: Data Hiding, Digital Watermarking, video coding H.264, Rate Control, Block DCT.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1086257

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1560

References:


[1] ITU-T Recommendation H.263, "Video coding for low bit rate communication".
[2] Riley and Richardson, "Digital Video Communications", Artech House 1997.
[3] M. D. Swanson, M. Kobayashi and A. H. Tewfik, "Multimedia Data- Embedding and Watermarking Technologies," Proceedings of the IEEE, Vol. 86, June, 1998.
[4] I. J. Cox, J. Killian, T. Leighton, and T. Shamoon, "A secure Robust watermark for Multimedia," IEEE Trans.IP Vol. 6 Dec, 1997.
[5] D. Mukherjee, J. J. Chae and S. K. Mitra, "A Source and Channel Coding Approach to Data Hiding with Application to Hiding Speech in Video," Proceeding of IEEE ICIP -98.
[6] M. D. Swanson, B. Zh and A. H. Tewfik, "Data Hiding for Video-in- Video," Proceedings of IEEE International Conference of Image Processing -97.
[7] B. Tao and B. Dickenson, "Adaptive Watermarking in the DCT Domain," (ICASSP ÔÇÿ97), Vol. 4, April 1997.
[8] Marco Cagnazzo, Sara Parrilli "Costs and Advantages of Object-Based Image Coding with Shape-adaptive Wavelet Transform" EURASIP Image Processing Journal Volume, 2007.
[9] A Lightweight Encryption Scheme for Secure Real-time Multimedia Transmission Choo, Euijin Lee, Jehyun Lee, Heejo Nam, Giwon Multimedia and Ubiquitous Engineering, 2007.
[10] B. Bhargava, C. Shi, and S. Wang. MPEG video encryption algorithms. Multimedia Tools and Applications, 9 2004.
[11] T. Wiegand, H. Schwarz, A. Joch, F. Kossentini and G. Sullivan, "Rate- Constrained Coder Control and Comparison of Video Coding Standards," IEEE Transactions 7, July 2003.
[12] ITU-T Rec. H.264/ISO/IEC 11496-10, "Advanced Video Coding", Final Committee Draft, Document JVTE022, September 2002.