Downloads: 107
M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 5 Issue 5, May 2016
RS and OFDM Methods Over Encrypted and Data Embedded Video Streams
Jithya J. Prakash | Hemand E. P.
Abstract: Data hiding techniques are usually used in image processing. It is used to embed a secret message into a image for ensuring privacy. Data hiding can also be applied to videos. So the confidentiality of the image, video and embedded data is maintained. Sometimes digital video needs to be processed in an encrypted format to maintain security and privacy. For the purpose of content notation and/or tampering detection it is necessary to perform data hiding in these encrypted videos. There exists different techniques for hiding private data in videos. Several data hiding techniques in videos have been proposed. The data is embedded by using data hiding algorithm. This method preserves the exact data and video quality. There are some challenge while transmitting an encrypted video with hidden data from a sender to a receiver. At the time of transmission there is a chance of occurrence of errors in the content of video due to the presence of noise and by some other factors. Hence introduced a Reed Soloman error detection and correction method, which detect and correct the error. To improve the data rate through the channel an OFDM (Orthogonal Frequency Division Multiplexing) method is also proposed. These methods provides better efficiency, accuracy and performance.
Keywords: Data Hiding, Reed Soloman Method, OFDM, Chien search Algorithm
Edition: Volume 5 Issue 5, May 2016,
Pages: 2352 - 2357
Similar Articles with Keyword 'Data Hiding'
Downloads: 0
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 5, May 2022
Pages: 885 - 888Image Based Steganography
Bheeshma Rao J | Ujwal Sai Satya Jorige | Sai Praneetha Katragadda | Pradeep Kumar .V
Downloads: 101
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1579 - 1582Data Hiding in H.264/AVC Video Encryption with XOR-ed User Information and Data in File Format
Neenu Shereef