Data Embedding in Scrambled Digital Video for Security

نویسندگان

  • Sudheer Raja
  • M. Shasidhar
چکیده

In broadcast service operators would like the viewing of such a sufficiently corrupted video on the screen of the unauthorized viewer to allure potential customers without sacrificing the level of robustness provided by digital encryption techniques.A technique for embedding data in scrambled AVI video is described. The embedding technique is applied to the video sequence jointly with the video scrambling algorithm. The scrambling operation together with the data embedding process are performed prior to AVI encoding, and the scrambled and data-embedded video is AVI encoded with a minimal increase in the AVI bit rate. The applied technique uses premanipulation of the block scrambling parameters to generate inter block differentials to embed the data bits. Embedded data has sufficient robustness to resist the AVI encoding attack. The data channel capability of the system arises due to the scrambling process and is not available when the video is not scrambled. The data embedding scrambler precedes input of any AVI compliant encoder.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A survey on digital data hiding schemes: principals, algorithms, and applications

This paper investigates digital data hiding schemes. The concept of information hiding will be explained at first, and its traits, requirements, and applications will be described subsequently. In order to design a digital data hiding system, one should first become familiar with the concepts and criteria of information hiding. Having knowledge about the host signal, which may be audio, image, ...

متن کامل

Security, confidentiality, and privacy of information in the field of health with data EPR embedding in medical MRI images based on HVS model

the development of new technology and modern equipment has led to the development of telemedicine systems. As a result, there are dangers such as publishing patient information and intentionally or unintentionally, medical information. The forensic organization, as one of the powerful arms of the judiciary, pursues important cases in the medical and psychiatric commissions to take steps to rea...

متن کامل

Digital Video Watermarking Techniques for Secure Multimedia Creation and Delivery

We have seen an explosion of data exchange in the Internet and the extensive use of digital media. Consequently, digital data owners can quickly and massively transfer multimedia documents across the Internet. This leads to wide interest in multimedia security and multimedia copyright protection. We propose a digital video watermarking algorithm, in which a novel DWTbased blind digital video wa...

متن کامل

پنهان نگاری وفقی براساس پیچیدگی نسبی پیکسلها در تصاویر دوسطح

In recent years steganography has attracted the attention of many researchers. Steganography can be used in media such as still image, audio, and video. Image is one of the most frequently used media. One of the forms of presentation of an image is halftone. In this paper a method is presented which hides data in halftone images. The data hiding process is performed during the halftoning step. ...

متن کامل

A chaos-based video watermarking algorithm

The intriguing characteristics of chaotic maps have prompted researchers to use these sequences in watermarking systems to good effect. In this paper we aim to use a tent map to encrypt the binary logo to achieve a like-noise signal. This approach makes extraction of the watermark signal by potential attacker very hard. Embedding locations are selected based on certain principles. Experimental ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011