0% Complete
فارسی
Home
/
چهاردهمین کنفرانس بین المللی فناوری اطلاعات و دانش
Video Steganography in HEVC Using Intra-Prediction Modes
Authors :
Vahidreza Seirafian
1
Masoud Omomi
2
1- دانشگاه صنعتی اصفهان
2- دانشگاه صنعتی اصفهان
Keywords :
Video steganography،HEVC standard،I-frame prediction،Angle modes
Abstract :
Steganography is a security method that has been used since ancient times and has evolved as a prominent research area in electronic media with the advancement of technology and the transformation of information into digital data. Hidden data carriers can take various forms, such as text, audio, images, or videos. With the expansion of video media and advancements in areas such as increased memory capacity, processor power, and data exchange speed, video-based steganography has gained more attention. The presence of consecutive video frames and suitable space for data steganography are among the reasons for the popularity of this method. Currently, the most effective video steganography methods are based on the HEVC (High-Efficiency Video Coding) standard, which is widely used in hardware and software applications. In this paper, a method for hiding data in videos based on the HEVC standard is proposed, utilizing its features for data concealment. The proposed technique in video steganography relies on intra-prediction modes and hides the data during the encoding process using HEVC angle modes. Experimental results demonstrate that the proposed method introduces minimal visual changes compared to other methods and possesses a suitable hiding rate. Moreover, it yields acceptable results regarding the security of hidden data.
Papers List
List of archived papers
شکلدهی سه بعدی پرتو و بهبود نرخ امن در شبکههای مخابراتی بیسیم-تواندادهشده مبتنی بر صفحات بازتابی هوشمند
کوثر انصاری - دکتر مهدی مجیدی
A New Routing Protocol in Internet of Vehicles Inspired of Spread Model of the Covid-19 Virus
Taha Yasin Rezapour - Esmaeil Zeinali - Reza Ebrahimi Atani - Mohammad Mehdi Gilanian Sadeghi
IT-based and Non-IT-based methods to separate and collect waste
Hoda Harati - Farzad Haghighi-Rad - Reza Yousefi Zenouz
تحلیل سازههای موثر بر پذیرش فناوری بلاکچین و استفاده از آن در صنعت بیمه ایران با استفاده از تکنیک معادلات ساختاری (مطالعه موردی: شرکت کارگزاری رسمی بیمه زندگی خوب)
احسان هنری - آفرین اخوان
A Deep Neural Network-based Method for MmWave Time-varying Channel Estimation
Amirhossein Molazadeh - Zahra Maroufi - Mehrdad Ardebilipour
IoMT-Enabled Smart Healthcare: State-of-the-Art, Security and Future Directions
Shivam Tripathi - Vatsalkumar Makwana - Malaram Kumhar - Harshal Trivedi - Jitendra Bhatia - Sudeep Tanwar - Hossein Shahinzadeh
Mode Selection and Resource Allocation in D2D-Enabled MC-NOMA using Matching Theory
Alireza Gholamrezaee - Hamid Farrokhi - Javad Zeraatkar Moghaddam
A Biased Random Key Genetic Algorithm for the Dial-a-Ride Problem
ُSomayeh Sohrabi - Koorush Ziarati - Morteza Keshtkaran
A Novel Service Deployment Policy in Fog Computing Considering The Degree of Availability and Fog Landscape Utilization Using Multiobjective Evolutionary Algorithms
Maryam Eslami - Dr Mehdi Sakhaei-nia
Short-Term Traffic Flow Prediction Based on a Recurrent Deep Neural Networks: Study in Tehran
Dr Monireh عبدوس - Taha Vajed Samei
more
Samin Hamayesh - Version 42.0.3