Video Content Sharing With Security Using Time - Domain Attribute

Authors

  • S. Sangeetha  Research Scholar, Department of Computer Science, Sakthi College of Arts and Science for Women, ddanchatram, India
  • P. Alaguthai  Assistant Professor, Department of Computer Science, Sakthi College of Arts and Science for Women, Oddanchatram, India

Keywords:

Streaming media, Access Control, Time domain analysis, Encryption, Video Content Sharing.

Abstract

Internet is gaining more and more popular now a days, so there is need to provide security for everything on internet. One of the most important concepts where we need to provide higher security is in communication between sender and receiver. Due to security threats the requirement of the secure transmission of the data is also increased the reason for developing the Data Hiding is the easy access of images, documents confidential data by the hackers who always monitor the system. Data hiding is the process of secretly embedding information inside a source without changing its content and meaning there is numerous techniques which hides the data. This paper aims to implement data hiding in compressed video. Like data hiding in images and raw video which operates on the images themselves in the spatial or transformed domain which are vulnerable to steganalysis. The sender first uses the stenographic application for encrypting the secret message. For this encryption, the sender uses text document in which the data is written and the image as a carrier file in which the secret message or text document to be hidden. The sender sends the carrier file and text document to the encryption phase for data embedding, in which the text document is embedded into the image file or video file. In encryption phase, the data is embedded into carrier file which was protected with the password now the carrier file acts as an input for the decryption phase. The image in which data is hidden i.e. the carrier file is sent to the receiver using a transmission medium. E.g. Web or e-mail. The receiver receives the carrier file and places the image in the decryption phase. Now the carrier file acts as an input for the decryption phase. The image in which data is hidden the carrier image is sent to the receiver using a transmission medium. Example: Web or e-mail. The receiver receives the carrier file and places the image in the decryption phase.

References

  1. M. Wang, J. Konrad, P. Ishwar, K. Jing, and H. Rowley. Image saliency:    From intrinsic to extrinsic context. In CVPR,2011.
  2. S. Lazebnik, C. Schmid, and J. Ponce, "Beyond bags of features: Spatialpyramid matching for recognizing natural scene categories," in Proc. IEEE Int’l Conf. on Computer Vision and Pattern Recognition, vol. II,2006, pp. 2169-2178.
  3. T. Harada, Y. Ushiku, Y. Yamashita, and Y. Kuniyoshi, "Discriminative spatial pyramid," in Proc. IEEE Int’l Conf. on Computer Vision and Pattern Recognition, 2011, pp. 1617-1624.
  4. G. Sharma, F. Jurie, and C. Schmid, "Discriminative spatial saliency for image classi?cation," in Proc. IEEE Int’l Conf. on Computer Vision and Pattern Recognition, 2012, pp. 3434-3441.
  5. Y. Jia, C. Huang, and T. Darrell, "Beyond spatial pyramids: Receptive ?eld learning for pooled image features," in Proc. IEEE Int’l Conf. on Computer Vision and Pattern Recognition, 2012, pp. 3370-3377.
  6. Y.-L. Boureau, F. Bach, Y. LeCun, and J. Ponce, "Learning mid-levelfeatures for recognition," in Proc. IEEE Int’l Conf. on Computer Vision and Pattern Recognition, 2010, pp. 2559-2566.
  7. J. Yang, K. Yu, Y. Gong, and T. Huang, "Linear spatial pyramid matching using sparse coding for image classi?cation," in Proc. IEEE Int’l Conf. on Computer Vision and Pattern Recognition, 2009.
  8. J. Wang, J. Yang, K. Yu, F. Lv, T. Huang, and Y. Gong, "Locality-constrained linear coding for image classi?cation," in Proc. IEEE Int’l Conf. on Computer Vision and Pattern Recognition, 2010, pp. 3360-3367.
  9. F. Perronnin, J. S´ anchez, and T. Mensink, "Improving the Fisher kernel for large-scale image classi?cation," in Proc. European Conf. Computer Vision, ser. LNCS 6314, 2010, pp. 143-156.
  10. J. Wu and J. M. Rehg, "CENTRIST: A visual descriptor for scene categorization," IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 33, no. 8, pp. 1489-1501, 2011.

Downloads

Published

2018-04-30

Issue

Section

Research Articles

How to Cite

[1]
S. Sangeetha, P. Alaguthai, " Video Content Sharing With Security Using Time - Domain Attribute, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 4, Issue 7, pp.123-130, March-April-2018.