Key Hiding of Multimedia Applications in Multimedia File 

V. Gupta, M. Shoeb
{"title":"Key Hiding of Multimedia Applications in Multimedia File ","authors":"V. Gupta, M. Shoeb","doi":"10.31838/ijccts/01.02.05","DOIUrl":null,"url":null,"abstract":"The project entitled Effective key Generation for Multimedia Application is the application developed to embed an video file in another video signal. It is concerned with embedding information in an innocuous cover Speech in a secure and robust manner. This system makes the Files more secure by using the concepts Steganography and Cryptography, Steganography, poor cousin of Cryptography is the art of hiding messages inside other messages such that the very existence of the message is unknown to third party. The goal of cryptography is to make data unreadable by a third party, the goal of Steganography is to hide the data from a third party Through the use of advanced computer software, authors of images and software can place a hidden trademark in their product, allowing them to keep a check on piracy. This is commonly known as watermarking. Hiding serial numbers or a set of characters that distinguishes an object from a similar object is known as finger printing. Together, these two are intended to fight piracy. The latter is used to detect copyright violators and the former is used to prosecute them. But these are only examples of the much wider field of Steganography. The cover data should not be significantly degraded by the embedded data, and the embedded data should be as imperceptible as possible. The embedded data should be as immune as possible to modifications from intelligent attacks or anticipated manipulations. Thus it is necessary that the hidden message should be encrypted.","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of communication and computer Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31838/ijccts/01.02.05","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The project entitled Effective key Generation for Multimedia Application is the application developed to embed an video file in another video signal. It is concerned with embedding information in an innocuous cover Speech in a secure and robust manner. This system makes the Files more secure by using the concepts Steganography and Cryptography, Steganography, poor cousin of Cryptography is the art of hiding messages inside other messages such that the very existence of the message is unknown to third party. The goal of cryptography is to make data unreadable by a third party, the goal of Steganography is to hide the data from a third party Through the use of advanced computer software, authors of images and software can place a hidden trademark in their product, allowing them to keep a check on piracy. This is commonly known as watermarking. Hiding serial numbers or a set of characters that distinguishes an object from a similar object is known as finger printing. Together, these two are intended to fight piracy. The latter is used to detect copyright violators and the former is used to prosecute them. But these are only examples of the much wider field of Steganography. The cover data should not be significantly degraded by the embedded data, and the embedded data should be as imperceptible as possible. The embedded data should be as immune as possible to modifications from intelligent attacks or anticipated manipulations. Thus it is necessary that the hidden message should be encrypted.
多媒体应用程序在多媒体文件中的密钥隐藏
多媒体应用的有效密钥生成项目是为了将视频文件嵌入到另一个视频信号中而开发的应用程序。它关注的是以安全和稳健的方式将信息嵌入到无害的覆盖语音中。该系统通过使用隐写术和密码学的概念使文件更加安全,隐写术,密码学的穷表弟是将消息隐藏在其他消息内的艺术,使得消息的存在对第三方是未知的。密码学的目标是使数据无法被第三方读取,隐写术的目标是对第三方隐藏数据,通过使用先进的计算机软件,图像和软件的作者可以在他们的产品中放置隐藏的商标,使他们能够检查盗版。这通常被称为水印。隐藏序列号或一组字符,以区分一个对象与类似的对象被称为指纹。这两项合作旨在打击盗版。后者用于发现侵犯版权者,前者用于起诉他们。但这些只是更广泛的隐写术领域的例子。覆盖数据不应该被嵌入的数据显著降低,并且嵌入的数据应该尽可能地难以察觉。嵌入式数据应该尽可能不受智能攻击或预期操作的影响。因此,有必要对隐藏的消息进行加密。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信