SlideShare una empresa de Scribd logo
1 de 26
ROBUST VIDEO DATA
HIDING USING
FORBIDDEN ZONE DATA
HIDING AND SELECTIVE
EMBEDDING
Under the guidance of:
Prof. Rekha Patil
Team members:
Geeta S Savalgi
Pooja Lakha
Pooja S Patil
WHAT IS DATA SECURITY?
Protecting a database from
destructive forces and the
unwanted actions of
unauthorized users.
INTRODUCTION
DATA SECURITY TECHNOLOGIES
DISK
ENCRYPTION
HARDWARE BASED
MECHANISMS BACKUP
S
DATA
MASKING
DATA ERASUR
DATA HIDING
It is the process of embedding information into a host medium.
FORBIDDEN ZONE
It is defined as the host signal range where no alteration is allowed
during data hiding process.
 SELECTIVE EMBEDDING
Here host signal samples, which will be used in data hiding, are
determined adaptively. The selection is performed at four stages:
Frame selection, frequency band determination, block selection and
coefficient selection.
KEY TERMS USED IN PROJECT
 To achieve efficient data hiding in video sequence.
 To utilize systematic RA Codes to encode message
bits and frame bits.
 To allow handling de-synchronization between
embedder and decoder.
 To achieve certain level of robustness against frame
drop, repeat and insertion attacks.
 To use 3-D interleaving.
ISSUES AND CHALLENGES
 Successfully utilized in video data hiding
applications.
 Tamper detection in digital videos can be
performed efficiently.
 It is used in fragile applications such as
authentication.
 It provides excess control, copy control in DVD’s.
 Widely suitable for broader range of application.
APPLICATIONS
 The necessity for practical higher dimensional
data hiding codes.
 Adjusting trade-off between robustness(channel
code) and imperceptibility(source) by practical
means.
 Design of end-to-end real-life visual applications.
MOTIVATIONS
 During video data hiding the quality of the image
cannot be preserved.
 They cannot survive any format conversion or
transcoding, without any significant loss of perceptual
quality.
 Efficiently hide data in video and to preserve the
quality from the external attacks.
PROBLEM STATEMENT
 A new block based data hiding method which makes
use of erasure correction capability of repeat
accumulates codes.
 Uses superiority of forbidden zone for low embedding
distortion levels.
 Robust to frame manipulation attacks via frame
synchronization markers.
SCOPE OF WORK
The goal of the design process is to
produce a model of a system which can be
used later to build that system and use this
model to build the overall system.
DESIGN
 Parallel decoders are used to correct de-sync.
 The video data hiding methods utilize uncompressed video
data where insertions and erasures occur at decoder, causing
de-sync.
 Multiple hronization errors.
 This scheme is successful only when the number of selected
host signal samples is much less than the total number of
host signal samples.
EXISTING SYSTEM
ARCHITECTURE of proposed
system
EMBED
MESSAGE DATA FILE
OUTPUT FILE
MASTER FILE
ENCODEDVIDEO
COMPRESSION AND ENCRYPTION
DECODE
UNCOMPRESSION DECRYPTION
COMPRESSION AND
ENCRYPTION CHECK
ENCODEDVIDEO
RECEIVED
DECODED FILE
MESSAGE OR DATA FILE
SENDER
RECEIVER
ENCODER
DECODER
Substitute bytes
Shift rows
Add round key
Mix columns
Substitute bytes
Add round key
Mix columns
Shift keys
Add round key
Shift keys
Substitute bytes
Add round key
Add round key
Inverse mix columns
Add round key
Inverse sub bytes
Inverse shift rows
Inverse mix columns
Add round key
Inverse shift bytes
Inverse shift rows
Add round key
Inverse shift bytes
Inverse shift rows
EXPAND KEY
W(0,3)
KEY
Round 9 .
Round 10
Round 1
Round 9
ound 1
Implementation is the stage of the project when the
theoretical design is turned out into a working system.
The implementation stage involves careful planning,
investigation of the existing system and it’s constraints.
IMPLEMENTATION
Frame selection is performed and the selected
frames are processed block-wise.
The selection is performed at four stages:
 Frame selection
 Frequency band determination
 Block selection
 Coefficient selection
ENCRYPTION MODULE
Let fcur and fpre denote the current and previous
frame indices
 fcur > T, then skip this frame.
 If fcur = fpre, then skip this frame.
 Otherwise, process the current frame.
 fcur< fpre, then the end of the group of frames is
reached.
DECRYPTION MODULE
System flow diagram
System flow
Embed data
Spread frames
Actual video
User give input Msg or data as Data embedded video
input
Spread a video Encrypted video
Decrypt a video View original data or
msg
Encryption
Decryption
results
 New video data hiding framework that makes use of erasure
correction capability of RA codes and superiority of FZDH.
 It robust to frame manipulation attacks via frame
synchronization markers.
 Typical system parameter are reported for error-free decoding.
 The results indicate that the framework can be successfully
utilized in video data hiding applications.
 User cannot find the original data.
 It increases the security.
Conclusion
 Incorporation of human visual system based spatio
temporal adaption of data hiding method
parameters.
 New multilevel embedding technique .
 Increase block size to embed more data.
 Improve commercialization.
FUTURE WORK
THANK YOU FOR
YOUR
ATTENTION !

Más contenido relacionado

Destacado

fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
priyanka reddy
 
Fog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptFog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud ppt
priyanka reddy
 
Steganography
Steganography Steganography
Steganography
Uttam Jain
 
Estimize Bull speed using Back propagation
Estimize Bull speed using Back propagationEstimize Bull speed using Back propagation
Estimize Bull speed using Back propagation
IJMER
 

Destacado (20)

Audio Steganography synopsis
Audio Steganography synopsisAudio Steganography synopsis
Audio Steganography synopsis
 
DATA HIDING IN ENCRYPTED H.264 VIDEO FORMAT
DATA HIDING IN ENCRYPTED H.264 VIDEO FORMATDATA HIDING IN ENCRYPTED H.264 VIDEO FORMAT
DATA HIDING IN ENCRYPTED H.264 VIDEO FORMAT
 
Captcha as graphical passwords a new security primitive based on hard ai prob...
Captcha as graphical passwords a new security primitive based on hard ai prob...Captcha as graphical passwords a new security primitive based on hard ai prob...
Captcha as graphical passwords a new security primitive based on hard ai prob...
 
Marketing 4.0
Marketing 4.0Marketing 4.0
Marketing 4.0
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
Captcha as graphical password
Captcha as graphical passwordCaptcha as graphical password
Captcha as graphical password
 
H.264 vs HEVC
H.264 vs HEVCH.264 vs HEVC
H.264 vs HEVC
 
Fog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptFog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud ppt
 
Marketing 3.0
Marketing 3.0Marketing 3.0
Marketing 3.0
 
Steganography
Steganography Steganography
Steganography
 
Marketing mix
Marketing mixMarketing mix
Marketing mix
 
Estimize Bull speed using Back propagation
Estimize Bull speed using Back propagationEstimize Bull speed using Back propagation
Estimize Bull speed using Back propagation
 
Why What & How of the Internet of Things
Why What & How of the Internet of Things Why What & How of the Internet of Things
Why What & How of the Internet of Things
 
Data-Driven Marketing And Sales Predictions 2014 - Lattice Engines
Data-Driven Marketing And Sales Predictions 2014 - Lattice EnginesData-Driven Marketing And Sales Predictions 2014 - Lattice Engines
Data-Driven Marketing And Sales Predictions 2014 - Lattice Engines
 
Best practice in sales and marketing alignment
Best practice in sales and marketing alignment Best practice in sales and marketing alignment
Best practice in sales and marketing alignment
 
The Indian History Quiz
The Indian History QuizThe Indian History Quiz
The Indian History Quiz
 
AVR_Course_Day1 basic electronics
AVR_Course_Day1 basic electronicsAVR_Course_Day1 basic electronics
AVR_Course_Day1 basic electronics
 
10 Ways to be a Marketing Genius Like Lady Gaga
10 Ways to be a Marketing Genius Like Lady Gaga10 Ways to be a Marketing Genius Like Lady Gaga
10 Ways to be a Marketing Genius Like Lady Gaga
 
50 Content Marketing Predictions for 2014
50 Content Marketing Predictions for 201450 Content Marketing Predictions for 2014
50 Content Marketing Predictions for 2014
 
The Evolution of SEO - 2014 and Beyond
The Evolution of SEO - 2014 and BeyondThe Evolution of SEO - 2014 and Beyond
The Evolution of SEO - 2014 and Beyond
 

Similar a Robust video data hiding using forbidden zone data hiding and selective embedding

1-160730050929.pptx dynamic hash table info
1-160730050929.pptx dynamic hash table info1-160730050929.pptx dynamic hash table info
1-160730050929.pptx dynamic hash table info
MdjunaidAli3
 
10.1.1.184.6612
10.1.1.184.661210.1.1.184.6612
10.1.1.184.6612
NITC
 
Final_year_project_documentation
Final_year_project_documentationFinal_year_project_documentation
Final_year_project_documentation
Ushnish Chowdhury
 
Final PPT.pptx (1).pptx
Final PPT.pptx (1).pptxFinal PPT.pptx (1).pptx
Final PPT.pptx (1).pptx
gopikahari7
 

Similar a Robust video data hiding using forbidden zone data hiding and selective embedding (20)

CR_CSI_119
CR_CSI_119CR_CSI_119
CR_CSI_119
 
A REAL-TIME H.264/AVC ENCODER&DECODER WITH VERTICAL MODE FOR INTRA FRAME AND ...
A REAL-TIME H.264/AVC ENCODER&DECODER WITH VERTICAL MODE FOR INTRA FRAME AND ...A REAL-TIME H.264/AVC ENCODER&DECODER WITH VERTICAL MODE FOR INTRA FRAME AND ...
A REAL-TIME H.264/AVC ENCODER&DECODER WITH VERTICAL MODE FOR INTRA FRAME AND ...
 
Enabling data integrity protection in regenerating coding-based cloud storage...
Enabling data integrity protection in regenerating coding-based cloud storage...Enabling data integrity protection in regenerating coding-based cloud storage...
Enabling data integrity protection in regenerating coding-based cloud storage...
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
JPD1406 Enabling Data Integrity Protection in Regenerating-Coding-Based Clou...
JPD1406  Enabling Data Integrity Protection in Regenerating-Coding-Based Clou...JPD1406  Enabling Data Integrity Protection in Regenerating-Coding-Based Clou...
JPD1406 Enabling Data Integrity Protection in Regenerating-Coding-Based Clou...
 
Hydan
HydanHydan
Hydan
 
Fibonacci Video Encryption
Fibonacci Video EncryptionFibonacci Video Encryption
Fibonacci Video Encryption
 
1-160730050929.pptx dynamic hash table info
1-160730050929.pptx dynamic hash table info1-160730050929.pptx dynamic hash table info
1-160730050929.pptx dynamic hash table info
 
Image Compression Using Intra Prediction of H.264/AVC and Implement of Hiding...
Image Compression Using Intra Prediction of H.264/AVC and Implement of Hiding...Image Compression Using Intra Prediction of H.264/AVC and Implement of Hiding...
Image Compression Using Intra Prediction of H.264/AVC and Implement of Hiding...
 
V01 i010410
V01 i010410V01 i010410
V01 i010410
 
ITDCC05.ppt
ITDCC05.pptITDCC05.ppt
ITDCC05.ppt
 
Fine grained two-factor access control for cloud
Fine grained two-factor access control for cloud Fine grained two-factor access control for cloud
Fine grained two-factor access control for cloud
 
IRJET - Information Hiding in H.264/AVC using Digital Watermarking
IRJET -  	  Information Hiding in H.264/AVC using Digital WatermarkingIRJET -  	  Information Hiding in H.264/AVC using Digital Watermarking
IRJET - Information Hiding in H.264/AVC using Digital Watermarking
 
10.1.1.184.6612
10.1.1.184.661210.1.1.184.6612
10.1.1.184.6612
 
S.A.kalaiselvan- robust video data hiding at forbidden zone
S.A.kalaiselvan- robust video data hiding at forbidden zoneS.A.kalaiselvan- robust video data hiding at forbidden zone
S.A.kalaiselvan- robust video data hiding at forbidden zone
 
Ameya_Kasbekar_Resume
Ameya_Kasbekar_ResumeAmeya_Kasbekar_Resume
Ameya_Kasbekar_Resume
 
Final_year_project_documentation
Final_year_project_documentationFinal_year_project_documentation
Final_year_project_documentation
 
18 17 jan17 13470 rakesh ahuja revised-version(edit)
18 17 jan17 13470 rakesh ahuja revised-version(edit)18 17 jan17 13470 rakesh ahuja revised-version(edit)
18 17 jan17 13470 rakesh ahuja revised-version(edit)
 
Final PPT.pptx (1).pptx
Final PPT.pptx (1).pptxFinal PPT.pptx (1).pptx
Final PPT.pptx (1).pptx
 
Ensuring d.s
Ensuring d.sEnsuring d.s
Ensuring d.s
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 

Robust video data hiding using forbidden zone data hiding and selective embedding

  • 1. ROBUST VIDEO DATA HIDING USING FORBIDDEN ZONE DATA HIDING AND SELECTIVE EMBEDDING Under the guidance of: Prof. Rekha Patil Team members: Geeta S Savalgi Pooja Lakha Pooja S Patil
  • 2. WHAT IS DATA SECURITY? Protecting a database from destructive forces and the unwanted actions of unauthorized users. INTRODUCTION
  • 3. DATA SECURITY TECHNOLOGIES DISK ENCRYPTION HARDWARE BASED MECHANISMS BACKUP S DATA MASKING DATA ERASUR
  • 4. DATA HIDING It is the process of embedding information into a host medium. FORBIDDEN ZONE It is defined as the host signal range where no alteration is allowed during data hiding process.  SELECTIVE EMBEDDING Here host signal samples, which will be used in data hiding, are determined adaptively. The selection is performed at four stages: Frame selection, frequency band determination, block selection and coefficient selection. KEY TERMS USED IN PROJECT
  • 5.  To achieve efficient data hiding in video sequence.  To utilize systematic RA Codes to encode message bits and frame bits.  To allow handling de-synchronization between embedder and decoder.  To achieve certain level of robustness against frame drop, repeat and insertion attacks.  To use 3-D interleaving. ISSUES AND CHALLENGES
  • 6.  Successfully utilized in video data hiding applications.  Tamper detection in digital videos can be performed efficiently.  It is used in fragile applications such as authentication.  It provides excess control, copy control in DVD’s.  Widely suitable for broader range of application. APPLICATIONS
  • 7.  The necessity for practical higher dimensional data hiding codes.  Adjusting trade-off between robustness(channel code) and imperceptibility(source) by practical means.  Design of end-to-end real-life visual applications. MOTIVATIONS
  • 8.  During video data hiding the quality of the image cannot be preserved.  They cannot survive any format conversion or transcoding, without any significant loss of perceptual quality.  Efficiently hide data in video and to preserve the quality from the external attacks. PROBLEM STATEMENT
  • 9.  A new block based data hiding method which makes use of erasure correction capability of repeat accumulates codes.  Uses superiority of forbidden zone for low embedding distortion levels.  Robust to frame manipulation attacks via frame synchronization markers. SCOPE OF WORK
  • 10. The goal of the design process is to produce a model of a system which can be used later to build that system and use this model to build the overall system. DESIGN
  • 11.  Parallel decoders are used to correct de-sync.  The video data hiding methods utilize uncompressed video data where insertions and erasures occur at decoder, causing de-sync.  Multiple hronization errors.  This scheme is successful only when the number of selected host signal samples is much less than the total number of host signal samples. EXISTING SYSTEM
  • 12. ARCHITECTURE of proposed system EMBED MESSAGE DATA FILE OUTPUT FILE MASTER FILE ENCODEDVIDEO COMPRESSION AND ENCRYPTION DECODE UNCOMPRESSION DECRYPTION COMPRESSION AND ENCRYPTION CHECK ENCODEDVIDEO RECEIVED DECODED FILE MESSAGE OR DATA FILE SENDER RECEIVER
  • 14. Substitute bytes Shift rows Add round key Mix columns Substitute bytes Add round key Mix columns Shift keys Add round key Shift keys Substitute bytes Add round key Add round key Inverse mix columns Add round key Inverse sub bytes Inverse shift rows Inverse mix columns Add round key Inverse shift bytes Inverse shift rows Add round key Inverse shift bytes Inverse shift rows EXPAND KEY W(0,3) KEY Round 9 . Round 10 Round 1 Round 9 ound 1
  • 15. Implementation is the stage of the project when the theoretical design is turned out into a working system. The implementation stage involves careful planning, investigation of the existing system and it’s constraints. IMPLEMENTATION
  • 16. Frame selection is performed and the selected frames are processed block-wise. The selection is performed at four stages:  Frame selection  Frequency band determination  Block selection  Coefficient selection ENCRYPTION MODULE
  • 17. Let fcur and fpre denote the current and previous frame indices  fcur > T, then skip this frame.  If fcur = fpre, then skip this frame.  Otherwise, process the current frame.  fcur< fpre, then the end of the group of frames is reached. DECRYPTION MODULE
  • 18. System flow diagram System flow Embed data Spread frames Actual video User give input Msg or data as Data embedded video input Spread a video Encrypted video Decrypt a video View original data or msg Encryption Decryption
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.  New video data hiding framework that makes use of erasure correction capability of RA codes and superiority of FZDH.  It robust to frame manipulation attacks via frame synchronization markers.  Typical system parameter are reported for error-free decoding.  The results indicate that the framework can be successfully utilized in video data hiding applications.  User cannot find the original data.  It increases the security. Conclusion
  • 25.  Incorporation of human visual system based spatio temporal adaption of data hiding method parameters.  New multilevel embedding technique .  Increase block size to embed more data.  Improve commercialization. FUTURE WORK