Please use this identifier to cite or link to this item:
http://ir.futminna.edu.ng:8080/jspui/handle/123456789/9713
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Ismaila, Idris | - |
dc.contributor.author | Onoja, Emmanuel Oche | - |
dc.contributor.author | John, K. Alhassan | - |
dc.date.accessioned | 2021-07-15T21:45:03Z | - |
dc.date.available | 2021-07-15T21:45:03Z | - |
dc.date.issued | 2016-11-28 | - |
dc.identifier.uri | http://repository.futminna.edu.ng:8080/jspui/handle/123456789/9713 | - |
dc.description.abstract | Abstract—By hiding data in compressed video using a secret key, we can prevent and eliminate the security threat faced by computers and smart devices in this information age. In this paper, we hid data by focusing on the motion vectors used to structure and reframe both the frontward extrapolative and bi-directional in dense image frames. The selection of candidate set of these motion vectors are established on their affiliated prediction error. An adaptive threshold is sought for each frame (based on greedy approach) to gain lustiness while sustaining a modest error level. The secret data bit stream is inserted in the Least Significant Bit (LSB) of both parts of the candidate motion vectors. The approach is implemented and checked for hiding data in natural sequences of multiple blocks of frames and the outputs are measured. The measurement is based on minimum distortion to the reframed video and minimum overhead on the compressed video frame. The proposed approach is justified efficient in line the stated condition, and more valid when compare with a motion vector attribute-based approach. | en_US |
dc.language.iso | en | en_US |
dc.publisher | International Conference on Information and Communication Technology and Its Applications | en_US |
dc.subject | confidential data; video Compression; data hiding Steg-analysis; watermarking; Huffman Codin; candidate motion vectors | en_US |
dc.title | An Infallible Technique for Hiding Confidential Data in Compressed Video using LSB and RSA Algorithm | en_US |
dc.type | Article | en_US |
Appears in Collections: | Cyber Security Science |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
AN INFALLIBLE TECHNIQUES FOR HIDING COF. DATA.pdf | AN INFALLIBLE TECHNIQUE FOR HIDING CONFIDENTIAL DATA IN COMPRESSED VIDEO USING LSB AND RSA ALGORITHM | 549.13 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.