International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
Volume 134 - Issue 13 |
Published: January 2016 |
Authors: R. Aparna, Ajish S |
![]() |
R. Aparna, Ajish S . A Review on Data Hiding Techniques in Compressed Video. International Journal of Computer Applications. 134, 13 (January 2016), 1-4. DOI=10.5120/ijca2016908091
@article{ 10.5120/ijca2016908091, author = { R. Aparna,Ajish S }, title = { A Review on Data Hiding Techniques in Compressed Video }, journal = { International Journal of Computer Applications }, year = { 2016 }, volume = { 134 }, number = { 13 }, pages = { 1-4 }, doi = { 10.5120/ijca2016908091 }, publisher = { Foundation of Computer Science (FCS), NY, USA } }
%0 Journal Article %D 2016 %A R. Aparna %A Ajish S %T A Review on Data Hiding Techniques in Compressed Video%T %J International Journal of Computer Applications %V 134 %N 13 %P 1-4 %R 10.5120/ijca2016908091 %I Foundation of Computer Science (FCS), NY, USA
This paper presents various Data Hiding techniques of video in compressed domain. Data is embedded into digital media for the purpose of identification, annotation, copy right and tampering detection. The identification purpose mainly falls into the area of cloud computing- making sure that the sender is the one intended; annotation refers to the property of tagging or giving captions to the video; copyright protection, which is used to prevent the recreation of the video; tampering detection is the method in which the receiver checks whether the video is tampered or disturbed during the transmission by a third party. Several factors affect the data hiding process-the quantity of data to be hidden, whether the embedding technique can handle large payloads without affecting the quality of the video, embedding in a lossy compression environment and the extent to which the data hidden is subject to modification or removal by a third party. This paper discusses the various data hiding techniques of video in the compressed environment and compares the techniques based on the quantities mentioned above. Furthermore they are analyzed in terms of their method, robustness and capacity. A comparison graph is plotted based on the efficiency analysis of the data hiding techniques and conclusions are drawn based on the analysis.