0% Complete
فارسی
Home
/
چهاردهمین کنفرانس بین المللی فناوری اطلاعات و دانش
Video Steganography in HEVC Using Intra-Prediction Modes
Authors :
Vahidreza Seirafian
1
Masoud Omomi
2
1- دانشگاه صنعتی اصفهان
2- دانشگاه صنعتی اصفهان
Keywords :
Video steganography،HEVC standard،I-frame prediction،Angle modes
Abstract :
Steganography is a security method that has been used since ancient times and has evolved as a prominent research area in electronic media with the advancement of technology and the transformation of information into digital data. Hidden data carriers can take various forms, such as text, audio, images, or videos. With the expansion of video media and advancements in areas such as increased memory capacity, processor power, and data exchange speed, video-based steganography has gained more attention. The presence of consecutive video frames and suitable space for data steganography are among the reasons for the popularity of this method. Currently, the most effective video steganography methods are based on the HEVC (High-Efficiency Video Coding) standard, which is widely used in hardware and software applications. In this paper, a method for hiding data in videos based on the HEVC standard is proposed, utilizing its features for data concealment. The proposed technique in video steganography relies on intra-prediction modes and hides the data during the encoding process using HEVC angle modes. Experimental results demonstrate that the proposed method introduces minimal visual changes compared to other methods and possesses a suitable hiding rate. Moreover, it yields acceptable results regarding the security of hidden data.
Papers List
List of archived papers
Mode Selection and Resource Allocation in D2D-Enabled MC-NOMA using Matching Theory
Alireza Gholamrezaee - Hamid Farrokhi - Javad Zeraatkar Moghaddam
رویکردی در تشخیص خودکار بوهای بد در مدل های معماری سازمانی با استفاده از تحلیل گرافی
زهرا رحیمی تمندگانی - شهره آجودانیان
طرحی برای تبدیل نمودارهای رفتاری BPMN به نمودار UML و تولید کد از آن
مهدیس صفری - احمد عبدالله زاده بارفروش
IoT-Based Model in Smart Urban Traffic Control: Graph theory and Genetic Algorithm
Saeed Doostali - Seyed Morteza Babamir - Mohammad Shiralizadeh Dezfoli - Behzad Soleimani Neysiani
Establishing security using cryptography and biometric authentication to counter cyber-attacks
Mohammed ADIL AKABR - Mehdi Hamidkhani - Mostafa Sadeghi
قطعه بندی خودکار توده کلیه در تصاویر توموگرافی کامپیوتری با استفاده از همافزایی شبکه عصبی عمیق U-Net و الگوریتم فراابتکاری نهنگ
علی خلیلی - محمد مصلح - محمد خیراندیش
پیدا کردن خبره در انجمنهای پرسش و پاسخ با استفاده از الگوریتم طبقهبندی ترکیبی
مهراد قاضی پور - علیرضا رضوانیان
A Novel Approach to Data mining algorithms and IoT based data mining machine learning
Danial Ramezani - Seyed Hossein Siadat
Aligning the Brick and Mortar cosmetic with digital transformation as the right way to overhaul the In-store Experience
Mehrgan Malekpour - Dr Federica Caboni
SecVanet: provably secure authentication protocol for sending emergency events in VANET
Seyed Amir Mousavi - Mohammad Sadeq Sirjani - Seyyed Javad Bozorg zadeh Razavi - Morteza Nikooghadam
Samin Hamayesh - Version 40.3.1