Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
Download
Standard view
Full view
of .
Look up keyword
Like this
3Activity
0 of .
Results for:
No results containing your search query
P. 1
Robust Video Data Hiding Using Forbidden Zone Data Hiding

Robust Video Data Hiding Using Forbidden Zone Data Hiding

Ratings: (0)|Views: 2,766|Likes:
Published by JAYAPRAKASH
Robust Video Data Hiding Using Forbidden Zone Data Hiding

2011 IEEE projects, 2011 IEEE java projects, 2011 IEEE Dotnet projects, 2011 IEEE .net projects,IEEE Projects, IEEE Projects 2011,IEEE Academic Projects, IEEE 2011 Projects, IEEE, IEEE Projects Pondicherry,IEEE Software Projects, Latest IEEE Projects,IEEE Student Projects, IEEE Final year Student Projects,Final Year Projects, final year IEEE 2011 projects, final year 2011 projects,ENGINEERING PROJECTS, MCA projects, BE projects, Embedded Projects, JAVA projects, J2EE projects, .NET projects, Students projects,BE projects, B.Tech. projects, ME projects, M.Tech. projects, M.Phil Projects,jp infotech
Robust Video Data Hiding Using Forbidden Zone Data Hiding

2011 IEEE projects, 2011 IEEE java projects, 2011 IEEE Dotnet projects, 2011 IEEE .net projects,IEEE Projects, IEEE Projects 2011,IEEE Academic Projects, IEEE 2011 Projects, IEEE, IEEE Projects Pondicherry,IEEE Software Projects, Latest IEEE Projects,IEEE Student Projects, IEEE Final year Student Projects,Final Year Projects, final year IEEE 2011 projects, final year 2011 projects,ENGINEERING PROJECTS, MCA projects, BE projects, Embedded Projects, JAVA projects, J2EE projects, .NET projects, Students projects,BE projects, B.Tech. projects, ME projects, M.Tech. projects, M.Phil Projects,jp infotech

More info:

Published by: JAYAPRAKASH on Oct 23, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as DOC, PDF, TXT or read online from Scribd
See more
See less

12/06/2012

pdf

text

original

 
ROBUST VIDEO DATA HIDING USINGFORBIDDEN ZONE DATA HIDINGAND SELECTIVE EMBEDDING
ABSTRACT:
Video data hiding is still an important research topic due to the design complexitiesinvolved. We propose a new video data hiding method that makes use of erasurecorrection capability of Repeat Accumulate codes and superiority of Forbidden ZoneData Hiding. Selective embedding is utilized in the proposed method to determine hostsignal samples suitable for data hiding. This method also contains a temporalsynchronization scheme in order to withstand frame drop and insert attacks. The proposed framework is tested by typical broadcast material against MPEG-2, H.264compression, frame-rate conversion attacks, as well as other well-known video datahiding methods. The decoding error values are reported for typical system parameters.The simulation results indicate that the framework can be successfully utilized in videodata hiding applications.
EXISTING SYSTEM:
In special domain, the hiding process such as least significant bit(LSB)replacement, is done in special domain, while transform domain methods; hidedata in another domain such as wavelet domain.
 
Least significant bit (LSB) is the simplest form of Steganography. LSB is basedon inserting data in the least significant bit of pixels, which lead to a slight changeon the cover image that is not noticeable to human eye. Since this method can beeasily cracked, it is more vulnerable to attacks.
LSB method has intense affects on the statistical information of image likehistogram. Attackers could be aware of a hidden communication by just checkingthe Histogram of an image. A good solution to eliminate this defect was LSBmatching. LSB-Matching was a great step forward in Steganography methods andmany others get ideas from it
PROPOSED SYSTEM:
Data hiding in video sequences is performed in two major ways: bit stream-leveland data-level.
In this paper, we propose a new block-based selective embedding type data hidingframework that encapsulates Forbidden Zone Data Hiding (FZDH).
By means of simple rules applied to the frame markers, we introduce certain levelof robustness against frame drop, repeat and insert attacks.
o
ADVANTAGES
User cannot find the original data.
 
It is not easily cracked.
To increase the Security.
To increase the size of stored data.
We can hide more than one bit.
HARDWARE REQUIREMENTS
SYSTEM: Pentium IV 2.4 GHz
HARD DISK: 40 GB
MONITOR: 15 VGA colouMOUSE: Logitech.
RAM: 256 MB
KEYBOARD: 110 keys enhanced.
SOFTWARE REQUIREMENTS
Operating system : Windows XP Professional
Front End : JAVA
Tool :NetBeans IDE
MODULES:

Activity (3)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
tatipibhargav liked this

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->