IJSRSET calls volunteers interested to contribute towards the scientific development in the field of Science, Engineering and Technology

Home > IJSRSET1844199                                                     


Video Content Sharing With Security Using Time - Domain Attribute

Authors(2):

S. Sangeetha, P. Alaguthai
  • Abstract
  • Authors
  • Keywords
  • References
  • Details
Internet is gaining more and more popular now a days, so there is need to provide security for everything on internet. One of the most important concepts where we need to provide higher security is in communication between sender and receiver. Due to security threats the requirement of the secure transmission of the data is also increased the reason for developing the Data Hiding is the easy access of images, documents confidential data by the hackers who always monitor the system. Data hiding is the process of secretly embedding information inside a source without changing its content and meaning there is numerous techniques which hides the data. This paper aims to implement data hiding in compressed video. Like data hiding in images and raw video which operates on the images themselves in the spatial or transformed domain which are vulnerable to steganalysis. The sender first uses the stenographic application for encrypting the secret message. For this encryption, the sender uses text document in which the data is written and the image as a carrier file in which the secret message or text document to be hidden. The sender sends the carrier file and text document to the encryption phase for data embedding, in which the text document is embedded into the image file or video file. In encryption phase, the data is embedded into carrier file which was protected with the password now the carrier file acts as an input for the decryption phase. The image in which data is hidden i.e. the carrier file is sent to the receiver using a transmission medium. E.g. Web or e-mail. The receiver receives the carrier file and places the image in the decryption phase. Now the carrier file acts as an input for the decryption phase. The image in which data is hidden the carrier image is sent to the receiver using a transmission medium. Example: Web or e-mail. The receiver receives the carrier file and places the image in the decryption phase.

S. Sangeetha, P. Alaguthai

Streaming media, Access Control, Time domain analysis, Encryption, Video Content Sharing.

  1. M. Wang, J. Konrad, P. Ishwar, K. Jing, and H. Rowley. Image saliency:    From intrinsic to extrinsic context. In CVPR,2011.
  2. S. Lazebnik, C. Schmid, and J. Ponce, "Beyond bags of features: Spatialpyramid matching for recognizing natural scene categories," in Proc. IEEE Int’l Conf. on Computer Vision and Pattern Recognition, vol. II,2006, pp. 2169-2178.
  3. T. Harada, Y. Ushiku, Y. Yamashita, and Y. Kuniyoshi, "Discriminative spatial pyramid," in Proc. IEEE Int’l Conf. on Computer Vision and Pattern Recognition, 2011, pp. 1617-1624.
  4. G. Sharma, F. Jurie, and C. Schmid, "Discriminative spatial saliency for image classi?cation," in Proc. IEEE Int’l Conf. on Computer Vision and Pattern Recognition, 2012, pp. 3434-3441.
  5. Y. Jia, C. Huang, and T. Darrell, "Beyond spatial pyramids: Receptive ?eld learning for pooled image features," in Proc. IEEE Int’l Conf. on Computer Vision and Pattern Recognition, 2012, pp. 3370-3377.
  6. Y.-L. Boureau, F. Bach, Y. LeCun, and J. Ponce, "Learning mid-levelfeatures for recognition," in Proc. IEEE Int’l Conf. on Computer Vision and Pattern Recognition, 2010, pp. 2559-2566.
  7. J. Yang, K. Yu, Y. Gong, and T. Huang, "Linear spatial pyramid matching using sparse coding for image classi?cation," in Proc. IEEE Int’l Conf. on Computer Vision and Pattern Recognition, 2009.
  8. J. Wang, J. Yang, K. Yu, F. Lv, T. Huang, and Y. Gong, "Locality-constrained linear coding for image classi?cation," in Proc. IEEE Int’l Conf. on Computer Vision and Pattern Recognition, 2010, pp. 3360-3367.
  9. F. Perronnin, J. Sī anchez, and T. Mensink, "Improving the Fisher kernel for large-scale image classi?cation," in Proc. European Conf. Computer Vision, ser. LNCS 6314, 2010, pp. 143-156.
  10. J. Wu and J. M. Rehg, "CENTRIST: A visual descriptor for scene categorization," IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 33, no. 8, pp. 1489-1501, 2011.

Publication Details

Published in : Volume 4 | Issue 7 | March-April - 2018
Date of Publication Print ISSN Online ISSN
2018-04-30 2395-1990 2394-4099
Page(s) Manuscript Number   Publisher
122-130 IJSRSET1844199   Technoscience Academy

Cite This Article

S. Sangeetha, P. Alaguthai, "Video Content Sharing With Security Using Time - Domain Attribute", International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 4, Issue 7, pp.122-130, March-April-2018.
URL : http://ijsrset.com/IJSRSET1844199.php