2,906 research outputs found

    Survey of Error Concealment techniques: Research directions and open issues

    Full text link
    © 2015 IEEE. Error Concealment (EC) techniques use either spatial, temporal or a combination of both types of information to recover the data lost in transmitted video. In this paper, existing EC techniques are reviewed, which are divided into three categories, namely Intra-frame EC, Inter-frame EC, and Hybrid EC techniques. We first focus on the EC techniques developed for the H.264/AVC standard. The advantages and disadvantages of these EC techniques are summarized with respect to the features in H.264. Then, the EC algorithms are also analyzed. These EC algorithms have been recently adopted in the newly introduced H.265/HEVC standard. A performance comparison between the classic EC techniques developed for H.264 and H.265 is performed in terms of the average PSNR. Lastly, open issues in the EC domain are addressed for future research consideration

    Digital watermarking by utilizing the properties of self-organization map based on least significant bit and most significant bit

    Get PDF
    Information security is one of the most important branches concerned with maintaining the confidentiality and reliability of data and the medium for which it is transmitted. Digital watermarking is one of the common techniques in this field and it is developing greatly and rapidly due to the great importance it represents in the field of reliability and security. Most modern watermarking systems, however, use the self-organization map (SOM), which is safer than other algorithms because an unauthorized user cannot see the result of the SOM's training. Our method presents a semi-fragile watermark under spatial domain using least significant bit (LSB) and by relying on most significant bit (MSB) when the taken values equal to (2 or 4 bits) depending on the characteristics of SOM through developing the so-called best matching unit (BMU) which working to determine the best location for concealment. As a result, it shows us the ability of the proposed method to maintain the quality of the host with the ability to retrieve data, whether it is a binary image or a secret message

    An Efficient Data Security System Using Reserve Room Approach on Digital Images for Secret Sharing

    Get PDF
    This paper presents enhancement of d ata protection system for secret communication through common network based on reversible data concealment in encrypted images with reserve room approach. In this paper was implemented for true color RGB image and reserve room approach under multi scale decomposition. The Blue plane will be chosen for hiding the secret text data. Then image is then separated into number of blocks locally and lifting wavelet will be used to detect approximation and detailed coefficients. Then approximation part is encrypted using chaos encryption method. The proposed encryption technique uses the key to encrypt an image and not only enhances the safety of secret carrier informa tion by making the information inaccessible to any intruder having a random method. After image encryption, the data hide r will conceal the secret data into the detailed coefficients which are reserved before encryption. Although encryption achieves certain security effects, they make the secret messages unreadable and unnatural or meaningless. This system is still enhanced with encrypt messages using a symmetric key method. This is the reason a new security approach called reversible data hiding arises. It is the art of hiding the existence of data in another transmission medium to achieve secret communication. The data hidi ng technique uses the adaptive LSB replacement algorithm for concealing the secret message bits into the encrypted image. In the data extraction module, the secret data will be extracted by using relevant key for choosing the encrypted pixe ls to extract th e data. By using the decryption keys, the image and extracted text data will be extracted from encryption to get the original informatio n. Finally the performance of this proposal in encryption and data hiding will be analyzed based on image and data recovery

    PRIVACY INFORMATION PROTECTION IN AN ENCRYPTED COMPRESSED H.264 VIDEO BITSTREAM

    Get PDF
    The paper presents that encryption of compressed video bit streams and hiding privacy information to protect videos during transmission or cloud storage. Digital video sometimes needs to be stored and processed in an encrypted format to maintain security and privacy. Here, data hiding directly in the encrypted version of H.264/AVC video stream is approached, which includes the following three parts. By analyzing he property of H.264/AVC codec, the code words of intra prediction modes, the code words of motion vector differences, and the code words of residual coefficients are encrypted with stream ciphers. Then, a data hider may embed additional data in the encrypted domain by using wrapping technique, without knowing the original video content. The paper results shows that used methods provides better performance in terms of computation efficiency, high data security and video quality after decryption. The parameters such as RMSE, PSNR, CC are evaluated to measure its efficienc

    Hide text depending on the three channels of pixels in color images using the modified LSB algorithm

    Get PDF
    At the moment, with the great development of information and communications technology, the transfer of confidential and sensitive data through public communications such as the Internet is very difficult to keep them from hackers and attackers. Therefore, it is necessary to work on the development of new and innovative ways to transfer such information and protect it to ensure that it reaches the desired goal. The goal of a new technique to hide information design not only hides the secret message behind the center cover, but it also provides increased security. The most common way to transfer important and confidential data is through embedding it into cover medium files in a way that does not affect the accuracy of the carrier file, which is known as hiding. In this paper, encryption and concealment techniques were used to protect data transferred from attackers. The proposed method relied on encryption of confidential information using the encryption key and the Xnor gate, after which the encrypted information was hidden in a color image using the LSB algorithm. The method of concealment depends on the extraction of chromatic channels of three RGB for each pixel and specifying the channel in which the bit of the encryption message will be hidden. Some metrics have been adopted to measure the quality of the resulting picture after hiding as PSNR and MSE, and achieve good results

    Review on Common Steganography Techniques

    Get PDF
    تحرص الجهات المختلفة على الحفاظ على سرية معلوماتها وحمايتها من الأطراف المتنافسة أو المعادية التي حرصت أيضًا على الوصول إلى تلك المعلومات بكافة الوسائل المتاحة. بما أن تشفير المعلومات ينكشف لأنه ينتج نصوصًا غير مفهومة تثير الشك، يميل البعض إلى العمل بطريقة تزيل الشكوك عن طريق إخفاء المعلومات في وسيط مثل النص أو الصورة بحيث يبدو ما يتم إرساله وتداوله طبيعيًا وخاليًا من العلامات أو رموز غير مفهومة كما لو لم يتم تحميلها بأي معلومات إضافية. هذا البحث يقدم مراجعة للتقنيات المستخدمة لإخفاء البيانات في الصور باعتبارها واحدة من أكثر تقنيات الإخفاء شيوعًا.Various authorities are keen to preserve the confidentiality of their information and protect it from competing or hostile parties who were also keen to access that information by all available means. Since the encryption of information is exposed as it produces incomprehensible texts that arouse suspicion, some tend to work in a way that removes suspicions by hiding the information in a medium like text or picture so that what is sent and circulated appears natural and free of signs or incomprehensible symbols as if not loaded with any additional information. This paper introduces a review the techniques used to hide data in images as one of the most common concealment techniques

    High Quality of Service on Video Streaming in P2P Networks using FST-MDC

    Full text link
    Video streaming applications have newly attracted a large number of participants in a distribution network. Traditional client-server based video streaming solutions sustain precious bandwidth provision rate on the server. Recently, several P2P streaming systems have been organized to provide on-demand and live video streaming services on the wireless network at reduced server cost. Peer-to-Peer (P2P) computing is a new pattern to construct disseminated network applications. Typical error control techniques are not very well matched and on the other hand error prone channels has increased greatly for video transmission e.g., over wireless networks and IP. These two facts united together provided the essential motivation for the development of a new set of techniques (error concealment) capable of dealing with transmission errors in video systems. In this paper, we propose an flexible multiple description coding method named as Flexible Spatial-Temporal (FST) which improves error resilience in the sense of frame loss possibilities over independent paths. It introduces combination of both spatial and temporal concealment technique at the receiver and to conceal the lost frames more effectively. Experimental results show that, proposed approach attains reasonable quality of video performance over P2P wireless network.Comment: 11 pages, 8 figures, journa
    corecore