Please use this identifier to cite or link to this item: http://ir.futminna.edu.ng:8080/jspui/handle/123456789/9713
Full metadata record
DC FieldValueLanguage
dc.contributor.authorIsmaila, Idris-
dc.contributor.authorOnoja, Emmanuel Oche-
dc.contributor.authorJohn, K. Alhassan-
dc.date.accessioned2021-07-15T21:45:03Z-
dc.date.available2021-07-15T21:45:03Z-
dc.date.issued2016-11-28-
dc.identifier.urihttp://repository.futminna.edu.ng:8080/jspui/handle/123456789/9713-
dc.description.abstractAbstract—By hiding data in compressed video using a secret key, we can prevent and eliminate the security threat faced by computers and smart devices in this information age. In this paper, we hid data by focusing on the motion vectors used to structure and reframe both the frontward extrapolative and bi-directional in dense image frames. The selection of candidate set of these motion vectors are established on their affiliated prediction error. An adaptive threshold is sought for each frame (based on greedy approach) to gain lustiness while sustaining a modest error level. The secret data bit stream is inserted in the Least Significant Bit (LSB) of both parts of the candidate motion vectors. The approach is implemented and checked for hiding data in natural sequences of multiple blocks of frames and the outputs are measured. The measurement is based on minimum distortion to the reframed video and minimum overhead on the compressed video frame. The proposed approach is justified efficient in line the stated condition, and more valid when compare with a motion vector attribute-based approach.en_US
dc.language.isoenen_US
dc.publisherInternational Conference on Information and Communication Technology and Its Applicationsen_US
dc.subjectconfidential data; video Compression; data hiding Steg-analysis; watermarking; Huffman Codin; candidate motion vectorsen_US
dc.titleAn Infallible Technique for Hiding Confidential Data in Compressed Video using LSB and RSA Algorithmen_US
dc.typeArticleen_US
Appears in Collections:Cyber Security Science

Files in This Item:
File Description SizeFormat 
AN INFALLIBLE TECHNIQUES FOR HIDING COF. DATA.pdfAN INFALLIBLE TECHNIQUE FOR HIDING CONFIDENTIAL DATA IN COMPRESSED VIDEO USING LSB AND RSA ALGORITHM549.13 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.