Open Access Open Access  Restricted Access Subscription or Fee Access

Robust Verification Method for Video Communication

E. M. El-Bakary, O. Zahran, S. El-Rabaie, F. E. Abd El-Samie

Abstract


The videois compressed to move the redundancies for reducing the number of bits whichneed to show the video for reducing the size of video to reduce the band width. We embed the hiding data in redundancies of the video frame withoutvisibility manner using Steganography technique. In our research we focus in increasing the improvement of compressed video frame through using steganography. In our research we use two mixed techniques to compress the video, the first is digital steganography and the second is data compression. Hence, the suggested scheme is mixed the algorithm ofthe steganography algorithm with the DCT compressionvideo frame.The suggested scheme in our study compression of data is made in two steps. In the first step,redundant data isminimized by compaction of energy using video. In the second step, with using steganography bit blocks isembedded in its blocks which call subsequent of the same video frame. Theadvantage of thebits which it is embedded isdecrease the size of the file and increase thesize of the file of the compressed video frame, but also decrease the file size further more. Theresults of simulation results explainthat,the suggestedschemehave more potential in coding of the frame of the video.


Keywords


Video, Data Hiding and Compression and Steganography, DCT Compression.

Full Text:

PDF

References


Campisi, P., Kundur, D., Hatzinakos, D., & Neri, A. (2002). Compressive data hiding: An unconventional approach for improved color image coding. EURASIP Journal on Applied Signal Processing, 2002(2), 152–163.

Christopoulos, C., Skodras, A., & Ebrahimi, T. (2000). The JPEG2000 still image coding system: an overview. IEEE Transaction on Consumer Electronics, 46(4).

deQueiroz, R., Choi, C. K., Huh, Y., & Rao, K. R. (1997). Wavelet transforms in a JPEG-like image coder. IEEE Transactions on Circuits and Systems for Video Technology, 7(2), 419–424.

Solanki, K., Jacobsen, N., Madhow, U., Manjunath, B. S., & Chandrasekaran, S. (2004). Robust image adaptive data hiding based on erasure and error correction. IEEE Transaction on Image Processing, 13(12), 1627–1639.

Tseng, H., & Chang, C. (2004). High capacity data hiding in JPEG-compressed images. Informatica, 15(1), 127–142

Wang, Z., Bovik, A. C., Sheikh, H. R., & Simoncelli, E. P. (2004). Image quality assessments: From error visibility to structural similarity. IEEE Transaction on Image Processing, 3(4), 600–612.

N.F. Johnson, S. Jajodia, Exploring steganography: seeing the unseen, IEEE Computer 31 (2) (1998) 26–34.

J.C. Judge,Steganography: past, present, future. SANS Institute publication, /http://www.sans.org/reading_room/whitepapers/ stenganography/552.phpS, 2001

S.B. Sadkhan, Cryptography: current status and future trends, in: Proceedings of IEEE International Conference on Information & Communication Technologies: From Theory to Applications, Da-mascus. Syria, April 19–23, 2004, pp. 417–418.

J.C. Hernandez-Castro, I. Blasco-Lopez, J.M. Estevez-Tapiador, Stegano-graphy in games: a general methodology and its application to the game of Go, Computers and Security, Elsevier Science 25 (2006) 64–71.

Y. Li, C. Li, C. Wei, Protection of mammograms using blind steganography and watermarking, in: Proceedings of the IEEE International Symposium on Information Assurance and Security, 2007, pp. 496–499.

D. Frith, Steganography approaches, options, and implications, Network Security 2007 (8) (2007) 4–7.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.