A Secure Process of Hiding Data in Motion Vector of Compressed Video Based on Artifacts
Sonal Jain1, Brajlata Chourasiya2
1Sonal Jain, Department of Electronics and Communication Gyan Ganga Institute of Technology and Science, Jabalpur (M.P), India.
2Brajlata Chourasiya, Asst. Prof., Department of Electronics and Communication Gyan Ganga Institute of Technology and Science, Jabalpur (M.P), India.
Manuscript received on 21 November 2013 | Revised Manuscript received on 28 November 2013 | Manuscript published on 30 November 2013 | PP: 116-119 | Volume-2 Issue-5, November 2013 | Retrieval Number: E0857112513/2013©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: There are many researches that have been proposed for hiding the data into digital videos. Most of those schemes uses the attributes of motion vectors like amplitude, phase angle etc. This paper deals with hiding data in compressed video where motion vectors are used to encode and reconstruct both the forward predictive (P-) frame and bidirectional (B-) frames in the compressed video. The subset of motion vectors are chosen based their associated macro block prediction error. Pertinent features will be collected from the motion in between the frames as in the form of the vectors in association with macro blocks and depending on the motion message is going to be hidden. To achieve the robustness a adaptive threshold is searched and low predictive error level is retained. Secret message bits are hidden in Least significant bit of both components of candidate motion vector. The evaluation will be based on two criteria: minimum distortion to reconstructed video and minimum overhead on compressed video size
Keywords: Data Hiding, Minimum Picture Expert Group (MPEG), Motion Vectors, Prediction Error, Steganography
Scope of the Article: Data Analytics