scholarly journals An Effective Statistics Approach to Secure Data File through Forbidden Zone Data Hiding Technique

2019 ◽  
Vol 68 (1) ◽  
pp. 01-07
Author(s):  
Tyler Taylor, Justin Rogers

Video Steganography is a strategy wherein we can conceal a wide range of documents with any extension into a carrying Video document. Right now, are utilizing two fundamental wording that is have host file and carrier file where host file is a hidden file (any sort of record like content document, picture document, and sound/video document) and carrier file must be a video record. The primary inspiration of this paper is to make sure about moving of information by utilizing steganography and cryptography system. It is worried about implanting data in a harmless spread media in a safe and hearty way. Right now expositions we are utilizing Forbidden Zone Data Hiding strategy where no modification is required in have signal range during information hidden procedure. To safely moving the information record, we use video information covering up and utilizing revision limit of rehash gather code with predominance of taboo zone information stowing away. Utilizing this methodology we can likewise stow away and move the enormous video record whose size is bigger than spread record in secure way. The principle favorable position of utilizing video record sequestered from everything data is the additional protection from of the outsider or unintended beneficiary because of the overall multifaceted nature of video contrasted with picture and sound document. I have effectively actualized the proposed system of video information hiding utilizing forbidden zone datahiding strategy (FZDH) on content document, picture record, sound record and video document. The exceptional element is that we can hide the bigger size video record behind the smaller size cover record.

2020 ◽  
Vol 69 (1) ◽  
pp. 01-07
Author(s):  
Jayden Gabb, Sophia Brereton

Video Steganography is a method where we can hide a wide range of documents with any extension into a carrying Video document. Right now exposition we are utilizing Forbidden Zone Data Hiding system where no adjustment is required in have signal range during information concealing procedure. Approach of this paper depends on the idea of message taking cover behind the video record that utilizations Forbidden Zone Data Hiding technique strategy. RA codes are utilizing with Forbidden zone information hiding to give robustness.


Author(s):  
Ms Swathi ◽  
Supriya A V ◽  
Soundarya Shridhar Patgar

Today, the protection is getting the imperative interest due to the elevated use of internet. As the use of internet is increased, the charge at which the records are interchanged per day is additionally increased. The data that is interchanged every day might also turn out to be the target of fraudsters. To take action to do something in particular to resolve this hassle one of the powerful technology is the Steganography. The Steganography is a process of concealing secret information behind an harmless cover file, such that the existence of information is no longer usually admitted. This paper uses the idea of Audio and Video Steganography, where the data is hidden behind the audios and frames of videos.


2012 ◽  
Vol 433-440 ◽  
pp. 5384-5389 ◽  
Author(s):  
Xiao Yuan Yang ◽  
Li Yi Zhao ◽  
Ke Niu

In this paper, a simple video steganography algorithm based on the tree structured motion compensation of the H.264 video compression standard is proposed. In the proposed method, the head data of macroblock in P/B-frames was used as a cover, the 8x8 partition modes which represent the detailed areas are selected, and information hiding is implemented by modifying the partition modes of the sub-macroblock. Experiments are designed to prove the feasibility of the proposed scheme by using different kinds of test videos. Simulation results show that, in our scheme, a high data hiding rate is obtained with a little increase on bit rate, and it also has the characteristics of high computational efficiency and imperceptibility.


Entropy ◽  
2021 ◽  
Vol 23 (7) ◽  
pp. 917
Author(s):  
Limengnan Zhou ◽  
Hongyu Han ◽  
Hanzhou Wu

Reversible data hiding (RDH) has become a hot spot in recent years as it allows both the secret data and the raw host to be perfectly reconstructed, which is quite desirable in sensitive applications requiring no degradation of the host. A lot of RDH algorithms have been designed by a sophisticated empirical way. It is not easy to extend them to a general case, which, to a certain extent, may have limited their wide-range applicability. Therefore, it motivates us to revisit the conventional RDH algorithms and present a general framework of RDH in this paper. The proposed framework divides the system design of RDH at the data hider side into four important parts, i.e., binary-map generation, content prediction, content selection, and data embedding, so that the data hider can easily design and implement, as well as improve, an RDH system. For each part, we introduce content-adaptive techniques that can benefit the subsequent data-embedding procedure. We also analyze the relationships between these four parts and present different perspectives. In addition, we introduce a fast histogram shifting optimization (FastHiSO) algorithm for data embedding to keep the payload-distortion performance sufficient while reducing the computational complexity. Two RDH algorithms are presented to show the efficiency and applicability of the proposed framework. It is expected that the proposed framework can benefit the design of an RDH system, and the introduced techniques can be incorporated into the design of advanced RDH algorithms.


Sign in / Sign up

Export Citation Format

Share Document