Secret Data Sharing Through Video Using Adaptive Data Concealment With Crypto System

نویسندگان

  • B.Prabhakaran
  • A.Murugan
چکیده

Nowadays, Internet and digital media are getting more popular. So, the need and requirement for secure transmission of data also increasing rapidly.A given input video file is converted into frame sequences and one of frame will be selected to conceal the secret data for secured data communication. The proposed technique uses chaos crypto system for encrypting a secret text data into cipher text to avoid data hacking issues. After data encryption, the data hider will conceal the secret encrypted data into the selected frame using adaptive embedding algorithm. Although encryption achieves certain security effects, they make the secret messages unreadable and unnatural or meaningless. These unnatural messages usually attract some unintended observers‘ attention. The data hiding technique uses the adaptive LSB replacement algorithm for concealing the secret message bits into the image in frequency domain. An Integer wavelet transform is used to determine the high frequency components for effective data concealing for preserving image quality. In the data extraction module, the secret data will be extracted by using relevant key for choosing the pixel coefficients and it will be decrypted to get original data using encryption key. Finally the data encryption and hiding will be analyzed based on image and data recovery.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Adaptive Spectral Separation Two Layer Coding with Error Concealment for Cell Loss Resilience

This paper addresses the issue of cell loss and its consequent effect on video quality in a packet video system, and examines possible compensative measures. In the system's enconder, adaptive spectral separation is used to develop a two-layer coding scheme comprising a high priority layer to carry essential video data and a low priority layer with data to enhance the video image. A two-step er...

متن کامل

An Efficient Adaptive Boundary Matching Algorithm for Video Error Concealment

Sending compressed video data in error-prone environments (like the Internet and wireless networks) might cause data degradation. Error concealment techniques try to conceal the received data in the decoder side. In this paper, an adaptive boundary matching algorithm is presented for recovering the damaged motion vectors (MVs). This algorithm uses an outer boundary matching or directional tempo...

متن کامل

An Efficient Secret Sharing-based Storage System for Cloud-based Internet of Things

Internet of things (IoTs) is the newfound information architecture based on the internet that develops interactions between objects and services in a secure and reliable environment. As the availability of many smart devices rises, secure and scalable mass storage systems for aggregate data is required in IoTs applications. In this paper, we propose a new method for storing aggregate data in Io...

متن کامل

ECG Steganography Based Privacy Protecting Of Medical Data for Telemedicine Application

The project proposes the enhancement of protection system for secret data communication through encrypted data concealment in ECG signals. The proposed encryption technique used to encrypt the confidential data into unreadable form and not only enhances the safety of secret carrier information by making the information inaccessible to any intruder having a random method. After data encryption, ...

متن کامل

An Efficient Data Security System Using Reserve Room Approach on Digital Images for Secret Sharing

This paper presents enhancement of data protection system for secret communication through common network based on reversible data concealment in encrypted images with reserve room approach. In this paper was implemented for true color RGB image and reserve room approach under multi scale decomposition. The Blue plane will be chosen for hiding the secret text data. Then image is then separated ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014