data embedding in scrambled digital video
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
sweginju
Active In SP
**

Posts: 1
Joined: Mar 2010
#1
02-03-2010, 06:21 AM


plz send me source code of this project and implimentation
Reply
seminar flower
Super Moderator
******

Posts: 10,120
Joined: Apr 2012
#2
15-06-2012, 05:47 PM

DATA EMBEDDING IN SCRAMBLED DIGITAL VIDEO


.ppt   DATA EMBEDDING IN SCRAMBLED DIGITAL VIDEO.ppt (Size: 1.67 MB / Downloads: 29)
AIM OF THE PROJECT

In broadcast service operators would like the viewing of sufficiently corrupted VIDEO/IMAGE on the screen of the unauthorized viewer to allure potential customers without sacrificing the level of robustness provided by digital encryption techniques.

BASIC DEFINITONS

Video: The sequence of frames put together one after another is a video sequence.
Scrambling : The in order sequence of an image content.
Data Embedding :
In this project and implimentation data which is to be transmitted withhigh security is embedded into the scrambled digital video, such that its presence will not be known out side.
Here the data is hidden in such a way that the original video will not be degraded.

.VIDEO SCRAMBLING TECHNIQUE

Video scrambling or video encryption is an extremely useful method for the stopping unwanted interception and viewing of any transmitted video or other information .
Steps in digital video scrambling are
Digital video and its formats
Frame conversion
Frame to image conversion
Scrambling of each image

Advantages of Wavelet transforms over other transforms

The wavelet transform is a multi-resolution description of an VIDEO/IMAGE
The wavelet transform is closer to the human visual system than the DCT.
The wavelet transform generates a data structure known as scale-space representation.
The spatial resolution of the wavelet transforms increases with frequency.

LSB METHOD FOR DATA HIDING

LSB insertion is a common simple approach to embedding information in a image
But it is vulnerable to even slight image manipulation.
Converting image from a format like GIF or BMP
to JPEG and back could destroy the information
hidden in LSBs.

Reply
seminar flower
Super Moderator
******

Posts: 10,120
Joined: Apr 2012
#3
04-07-2012, 11:05 AM

Data Embedding in Scrambled Digital VIDEO/IMAGE


.doc   Data Embedding.doc (Size: 1.64 MB / Downloads: 40)
Abstract

In broadcast service operators would like the viewing of such a sufficiently corrupted VIDEO/IMAGE on the screen of the unauthorized viewer to allure potential customers without sacrificing the level of robustness provided by digital encryption techniques.
A technique for embedding data in scrambled AVI VIDEO/IMAGE is described. The embedding technique is applied to the VIDEO/IMAGE sequence jointly with the VIDEO/IMAGE scrambling algorithm. The scrambling operation together with the data embedding process are performed prior to AVI encoding, and the scrambled and data-embedded VIDEO/IMAGE is AVI encoded with a minimal increase in the AVI bitrate. The applied technique uses premanipulation of the block scrambling parameters to generate interblock differentials to embed the data bits. Embedded data has sufficient robustness to resist the AVI encoding attack.

INTRODUCTION:

A AVI transparent VIDEO/IMAGE scrambling technique that allows the unauthorized user to have an arbitrarily degraded view of the current program has been proposed earlier . Some broadcast service operators would like the viewing of such a sufficiently corrupted VIDEO/IMAGE on the screen of the unauthorized viewer to allure potential customers without sacrificing the level of robustness provided by digital encryption techniques. In this technique, the scrambling is performed prior to the AVI encoding, and the scrambled VIDEO/IMAGE is AVI encoded with only a minimal increase in the AVI transport stream (TS) bitrate (or alternately a minimal degradation of the picture at fixed bitrate). This is achieved by performing a linear scrambling of the VIDEO/IMAGE in blocks as follows: The incoming picture frames are split into scrambler blocks (SB) of size equal to integer multiples of an AVI macro-block size. The SB boundaries are block-synchronous with the AVI block structure.

DIGITAL VIDEO/IMAGE PROCESSING

VIDEO/IMAGE is a sequence of frames put together one after another.

BACKGROUND:

Digital VIDEO/IMAGE processing is an area characterized by the need for extensive experimental work to establish the viability of proposed solutions to a given problem. An important characteristic underlying the design of VIDEO/IMAGE processing systems is the significant level of testing & experimentation that normally is required before arriving at an acceptable solution. This characteristic implies that the ability to formulate approaches &quickly prototype candidate solutions generally plays a major role in reducing the cost & time required to arrive at a viable system implementation.

Back ground of Steganography

Stenography today is a computer technique to make confidential information imperceptible to human eyes by embedding it in some innocent looking "vessel" data (aka "carrier", "cover" or "dummy" data) such as a digital image or a speech sound. A typical vessel is a color image having Red, Green, and Blue color components in a multi-bit data structure. The embedded information can only be extracted by using a special extracting program and a key, the technique of steganography we are talking here is definitely different from what is called a "file deception" or "file camouflage" technique.

Data Embedding in Scrambled VIDEO/IMAGE

The descrambler needs to know the parameters and rules used by the scrambler, and the scrambling status of the incoming stream. In addition, subscriber control data such as entitlement control/management messages (ECM and EMM data, respectively) are also required as in all systems with conditional access. Hence, there is a need for a data channel particularly in the broadcast applications of the scrambler.
In this system, a novel data embedding scheme has been designed to provide an integrated solution. The data transmission requirement of the system is handled in two parts. The scrambling status information is the first part; all the remaining data to be sent constitute the
second part. The scrambling status information is considered separately from the data channel. In this system, a 2-bit (or more) information regarding the scrambling status of the VIDEO/IMAGE stream is sent openly but in a special robust manner in a logo area. This 2-bit data informs the scrambler whether the next GOP and the GOP afterwards are scrambled or not.

ENCODING METHODS:

Data transmission and storage cost money. The more information being dealt with, the more it costs. In spite of this, most digital data are not stored in the most compact form. Rather, they are stored in whatever way makes them easiest to use, such as: ASCII text from word processors, binary code that can be executed on a computer, individual samples from a data acquisition system, etc. Typically, these easy-to-use encoding methods require data files about twice as large as actually needed to represent the information. Data compression is the general term for the various algorithms and programs developed to address this problem. A compression program is used to convert data from an easy-to-use format to one optimized for compactness. Likewise, an un-compression program returns the information to its original form. We examine five techniques for data compression in this chapter.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Request for project ideas on Social Security and Social Welfare Data Mining Guest 1 83 11-03-2016, 02:28 PM
Last Post: mkaasees
  ZigBee Based secured wireless Data Transmission and Reception. Guest 2 699 27-10-2015, 10:54 AM
Last Post: mkaasees
  All Digital Phase Locked Loop souparnika 0 330 08-01-2015, 11:38 PM
Last Post: souparnika
  Fog Computing Mitigating Insider Data Theft Attacks in the Cloud project and implimentation full docum mtamilselvan 2 3,014 24-12-2014, 10:43 AM
Last Post: Tushar4142
  implementation of video steganography using LSB technique in MATLAB d000304a 3 3,782 15-07-2014, 04:39 PM
Last Post: mkaasees
Thumbs Down cloud data protection for the masses documentation Guest 10 2,785 11-06-2014, 10:29 AM
Last Post: seminar project topic
  Improving security and efficiency in attribute based data sharing Guest 3 1,681 10-01-2014, 12:49 PM
Last Post: seminar project topic
  A Novel Data Embedding Method Using Adaptive Pixel Pair Matching Guest 0 365 16-11-2013, 10:41 AM
Last Post: Guest
  self repairing digital systems with unified recovery process with endocrine cell Guest 4 1,045 18-10-2013, 02:39 PM
Last Post: Guest
  Skin tone based secrete data hiding in images Guest 0 505 09-10-2013, 08:49 PM
Last Post: Guest