Abstract

A data hiding scheme for encrypted image has been proposed by Xinpeng Zhang (11). In this paper however, we put forward a data hiding scheme on an encrypted video. The data to be embedded is encrypted ensuring greater security. Each video frame is a jpg image, which is then encrypted using any stream cipher. The data to be embedded is encrypted. It is then embedded by modifying a small portion of the encrypted cover image. The decryption of video is done first followed by the decryption of the data. With the aid of the data hiding key and spatial correlation in natural image, the embedded data can be successfully extracted and the original video can be perfectly recovered. The accuracy of receiver is very much dependant on the block size of the cover image and consequently, an optimum block size is suggested as an experimental value. Index Terms: Video Encryption, Data Embedding, Frames I. INTRODUCTION Data embedding helps data to be stored inside any cover media. The cover media may be image, audio or video. Reversible data hiding ensures that the cover media is unaltered after decryption and data extraction. That is, the cover that was used for data embedding shoud be as such recovered after data extraction. Encryption is a technique that ensures secure sharing of data. Only the sender and receiver would have access to the encrypted data, by means of the key. Encryption may be symmetric or asymmetric, based on the keys being used. Joining the two schemes of data hiding and encryption provides added security and convenience in transmission.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.