<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>An Infallible Technique for Hiding Confidential Data in Compressed Video using LSB and RSA Algorithm</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Ismaila Idris</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Onoja Emmanuel Oche</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>John K. Alhassan</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Cyber Security, Federal University of Technology</institution>
          ,
          <addr-line>Minna</addr-line>
          ,
          <country country="NG">Nigeria</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Federal University of Technology</institution>
          ,
          <addr-line>Minna</addr-line>
          ,
          <country country="NG">Nigeria</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2016</year>
      </pub-date>
      <fpage>124</fpage>
      <lpage>128</lpage>
      <abstract>
        <p>-By hiding data in compressed video using a secret key, we can prevent and eliminate the security threat faced by computers and smart devices in this information age. In this paper, we hid data by focusing on the motion vectors used to structure and reframe both the frontward extrapolative and bi-directional in dense image frames. The selection of candidate set of these motion vectors are established on their affiliated prediction error. An adaptive threshold is sought for each frame (based on greedy approach) to gain lustiness while sustaining a modest error level. The secret data bit stream is inserted in the Least Significant Bit (LSB) of both parts of the candidate motion vectors. The approach is implemented and checked for hiding data in natural sequences of multiple blocks of frames and the outputs are measured. The measurement is based on minimum distortion to the reframed video and minimum overhead on the compressed video frame. The proposed approach is justified efficient in line the stated condition, and more valid when compare with a motion vector attribute-based approach.</p>
      </abstract>
      <kwd-group>
        <kwd>-confidential data</kwd>
        <kwd>video Compression</kwd>
        <kwd>data hiding Steg-analysis</kwd>
        <kwd>watermarking</kwd>
        <kwd>Huffman Codin</kwd>
        <kwd>candidate motion vectors</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>INTRODUCTION</p>
      <p>
        The term “Confidential data” typically denotes data
classified as restricted, according to a specific data
classification scheme needs to be properly secured via any
secured mechanism that will not reveal it presence to an
unauthorized party (steganography). This data hiding
mechanism in different stegano-graphic cover is a broad
field. It is a technique of embedding secret data in a media or
other source and still maintaining the integrity of the data. It
can be used to embed confidential information for
annotation, access control, content transaction tracking, copy
right protection and tampering detection [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>This research focuses on internal changes of video
compression process, precisely the motion estimation level.
Choosing this level was based on the fact that the
compressed video frames contents are internally processed
during the encoding and decoding of the video which possess
detection constraint when analyzed by applying image
steganalysis techniques besides it is coded loosely, thus it is not
susceptible to quantization distortions. Change of motion
vector based on Magnitude and Phase angle attribute has
been the fundamental bases of most research applied on
secure data hiding in a stegano-graphic cover. Confidential
message in (data) bits are securely hidden in Motion Vector
with high frequency above some specified</p>
      <p>One data bit of the message is securely placed at the
Least Significant Bit (LSB) of each larger Candidate Motion
Vectors component, which is encoded as a unique area in a
specified location generated by where the motion estimation
generated motion vectors. Using the variable macro block 8
by 8, 8 by 16,16by 8 and16 by 16sizes of H.264, using each
2 bits from the data bit stream to choose one size out of the
four different sizes for the Motion Estimation process.
Carefully considering the angular (phase angle) difference
between two nearest CMV, we embed the massage inside the
sample video. These CMV were chosen according to the
respective motion vectors magnitude. Using the Phase Angle
Difference in sectors between CMV, the message bit stream
is encoded accordingly with initial constrain of the block
matching to search for a magnitude within the selected
region to be greater than the initial threshold as predefined.
This approach is focused on determining the direct reversible
technique to find, at the decoder the CMV which relied on
the motion vectors attributes.</p>
      <p>Achieving least level distortion to prediction error and
data size overhead was approached differently in this paper
which is based on the prediction error associated with each
block. The major constraint is difficulty of figuring out the
non-linear quantization process.</p>
      <p>II.</p>
      <p>A mechanism of data hiding in compressed domain that
makes use of encoding and compression sequences was
proposed in [2], this is usually applied during different
compression phase of after the compression phase of the
video
sequences. An
optimal output
with less image
distortions can</p>
      <p>me efficiently achieved when spatial and
temporal model usually known as spatiotemporal model are
concurrently used.</p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], a data hiding technique based on transformation
mechanism in which the Discrete Cosine Transform (DCT)
coefficient
modifications
are
done
through
sequential
compression steps was proposed. The technique transforms a
specified block of video frames (images) say 8 by 8 pixel
block into a 64 DCT coefficients of separate values. A
further systematic procedure is then carried out on the
compression process; this is the quantization process, which
is a usually based accurately calculated DCT coefficient. The
secure data hiding procedure which is performed on the LSB
of the frames immediately follow. It was observed that the
above mechanism can be more secured if the encryption of
secret data is done with pseudo-randomly generated secret
key.
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], the frames’ and macro-blocks’ indices represent
watermark
which are embedded into the quantized
DCT
value of the blocks (the non-zero value). A watermarking
process was used which is based on tampering detection
technique. By using a semi-fragile watermarking protoco l
the technique resulted in detecting temporal, spatial and
spatio-temporal tampering
region.
      </p>
      <p>After the   
and
quantization phases, follows the embedding process for some
4 by 4 block selected from each of 16 by 16 macro-blocks
for embedding macro-block where the blocks with the larges
Least Non Zero (   ) level arrangement are selected which
simply define the frequency sample. For every selected
block, 1 bit of message is embedded. The security of this
mechanism</p>
      <p>was improved by using the secretkey   for
authentication which is encrypted by a pseudo randomly
generated key   to designate  the watermark point.
  =  (  :   )
(1)</p>
      <p>
        Another approach of securely hiding information was
proposed in [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]
where the coefficients’ sign
of some
fundamental factors such as; the Motion Vector Difference
(MVD), Intra Prediction Mode (IPM), and DCTare encrypted
while data hiding is done on the DCT
magnitudes at a
specified threshold. The technique seems highly secure
based on the fact that encryption process and data hiding
mechanism
were
respectively
done
separately.
      </p>
      <p>This
technique was mathematically modeled as precisely stated
below, given that, watermark is represented as  
coefficient is of image Z, for every high security measure,  ,
encryption of watermark with a given a stream cipher before
and initial
the process, we have the following:</p>
      <p>Change in value of the coefficient is as:
 ′ =</p>
      <p>,   ┌( | |)┐ % 2 = 1
 .  .      ,  ,  

| | % 2 = 0
Where  =
┌</p>
      <p>┐ + 1</p>
      <p />
    </sec>
    <sec id="sec-2">
      <title>Otherwise,</title>
      <p>′ =
 .  .      ,  ,</p>
      <p>% 2 = 1     ≠ − (3)




 ,  
encrypted key is placed at the image corners and then the
hidden image is convey via a stego-cover. The recipient of
the message has a foreknowledge of all the encrypted keys
hidden at the corner of the image. A reverse technique called
Reverse Data Hiding (RDH) mechanism is applied to the
encrypted image which contains the original message; this is
only possible when all the encrypted corners are properly
decrypted to using the appropriate secret key.</p>
      <p>
        A new concept of data hiding using visual cryptography
was presented in [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] where encrypted video is split into
frames using FFMPEG tool. Randomly two frames are
selected to hide secure message and image, converting this
image to a grey scale and from grey scale to binary images
which is then split into two shares using visual cryptographic
scheme. The cipher text is embedded into the two shares. By
using invisible watermarking technique, those two shares
hidden in the selected frames and the image is hidden and
finally all the frames are again converted into video using the
FFMPEG tool and video is encrypted using the base64
encoder
with asymmetric
cryptographic technique.
      </p>
      <p>The
receiver system performs video decryption accordingly, via a
decryption splitting mechanism in which the system decrypts
and split received video into separate units of frames and
extracting various shares and data by selecting the frames
which was watermarked</p>
      <p>
        Another novel (and secure) data hiding mechanism was
suggested by [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] in which
embedding process of secret
message in digital videos is performed based on
magnitude
of the phase angle of each motion vector( in the
macroblock)found in each inter-frame. Selection of the candidate
motion vector is based on an initialized threshold  . The
mathematical representation of the phase angle in each
motion
      </p>
      <p>vector for carrying out embedding process is
calculated as follows:
 =      
   
   
Where;
    = the “vertical component of motion vector”  
    = the “horizontal component of motion vector”</p>
      <p>The mathematical steps for sequential data embedding
are stated thus:</p>
      <p>the range of;
</p>
      <p>For data bit = 0, search for   2 and   2 +1 within
0 &lt;  2 −  2 +1 ≤ 180

</p>
      <p>For data bit = 1, t search for   2 and   2 +1 within
the range of;
180 &lt;  2 −  2 +1 ≤ 360
(6)
For all condition = Null, calculate a pair of motion
vector that satisfied condition (i) and (ii) above.</p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], a temporal model based on H.264 encoder was
used for hiding data. In this model data hiding is based on
Variable Block Sizes (VBS). The model standard uses seven
un-identical but uniformly arranged block sizes 16 by16, 16
by 8, 8 by16, 8 by 8, 8 by 4, 4 by 8 and 4 by 4. The
fundamental principle of this mechanism is to develop an
encoder that will be forced to select a block type not just
based on a single condition of efficiency alone but also on
security parameters defined for the confidential data in
respect available data integrity threat. This objective was
achieved by assigning a randomly generated key in form of
binary code to each separate block type. Each block has a
unique binary code. For simplicity, a block of 4 by 4 sizes
was used [
        <xref ref-type="bibr" rid="ref9">10</xref>
        ][
        <xref ref-type="bibr" rid="ref10">11</xref>
        ]. The security of this mechanism lies in the
conversion process of the data before embedding process.
Here, the data is change to binary digits, which are then
grouped into various pairs and mapped into macro blocks
which are going to be motion compensated and thereafter
subjected to embedding process [
        <xref ref-type="bibr" rid="ref12">13</xref>
        ][
        <xref ref-type="bibr" rid="ref13">14</xref>
        ].
      </p>
      <p>III.</p>
      <p>OVERVIEW OF PROPOSED SYSTEM</p>
      <p>As shown in the figure below, the proposed confidential
data hiding approach in compressed video using secret key
has it input value as video. This input value is subjected to
separation process in which the motion images (video) are
split into image frames. The subjection process follows
immediately, which subjects the image frames to coding
process to produce a compressed frame (compressed video),
where the coding procedure is DCT and Huffman coding.
The next system stage is the application of secret key to the
frames. With key generation principle based on RSA
algorithm, a random secret key is generated, applied to the
secret data which is then securely inserted to the video cover
in the LSB of the frame through the implementation of LSB
algorithm. This automatically produces the new video
referred to as Stego-video. At the receiving end, the secret
data can be extracted by reversing the LBS procedure and
secret key process; this is also called inverse LSB and secret
key.</p>
      <sec id="sec-2-1">
        <title>A. Algorithm Title: LSB Algorithm.</title>
        <p>
          Confidential data is embedding process is don on two
separate pixels which are pixel andpixel as a cover for the
confidential data respectively [
          <xref ref-type="bibr" rid="ref14">15</xref>
          ]. Adjustment process
follows immediately on one of pixel  andpixel to embed
2bits of message  1and message  2. A flowchart
representing the embedding process is represented in figure
3.
Step 1: For LSB of pixel  = message 1, go to second step2.
        </p>
        <p>And for, of pixel  ≠ message 1, go to step 3.</p>
        <p>Step 2: For  ( ,  ) = message  2, all pixels remain
unchanged. If the value of  ( ,  )≠message 2,
pixel = +1 or -1
Step 3: For ( − 1,  )=message 2,pixel = -1. And</p>
        <p>For  ( − 1,  )≠message 2; pixel = +1
We mathematically state the function  ( ,  )as;
  ′ ,  ′ =     ′ +  ′
2
(7)</p>
        <p>From the above algorithm, since the new LSB method
for matching procedure is +1 or -1 based on pixel position,
mostly the adjacent pixels and the separate pixel within the
closet position between cover image tends to be very
insignificant. We can infer that while hiding data high
quality is maintained.</p>
      </sec>
      <sec id="sec-2-2">
        <title>B. Algorithm Title: LSB Algorithm Data Hiding Algorithm</title>
        <p>This algorithm take input value as video and produce
stegovideo as output. It also implements other simple encoding
procedures:
Step 1: Receive input value as video
Step 2: Perform separation process (video into frames)</p>
        <p>Perform secret key and data encryption.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Step 7: Insert data to LBS Step 8: Produce stago-video as output</title>
    </sec>
    <sec id="sec-4">
      <title>IDCT. data.</title>
      <sec id="sec-4-1">
        <title>C. Algorithm Title: Data Extraction Algorithm</title>
        <p>This algorithm take input value as Stego-video and
produce
implements other simple procedures.
Step 1: Randomly generate some large primes say  and  ,
nearer to a given key</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Step2:</title>
      <sec id="sec-5-1">
        <title>Step3:</title>
        <p>Select a key within the range of  and  ,
compute</p>
        <p>=  ∗  ,
Step 4: compute ( − 1)( − 1)</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>Step 5: Generate</title>
      <p>Assume  = 1;  = 1
While (    , 
= 0)
 =  + 1;</p>
    </sec>
    <sec id="sec-7">
      <title>Step 6:</title>
    </sec>
    <sec id="sec-8">
      <title>Generate</title>
      <p>Take  = 1 +  ∗ 
While     , 
= 0 ;
 =  + 1
 = 1 +  ∗ 
 =  /</p>
      <sec id="sec-8-1">
        <title>E. Our Greedy Search Algorithm</title>
        <p>Our greedy search algorithm takes the following steps
Step 1: For 9 + 8 = 17 as overall points, check the points
Step 2: When the central 8closest points on the 3 * 3 grid
concentrated at the middle nine points including
the product grid and the eight closest points to 9 *
9 grids. If the search window center =least block
distortion point (Integer DCT), terminate search; if
not, proceed to step 2.
is found to be the lowest in previous step, proceed
to step 3; if not forward to step immediate step
after step 3.</p>
        <p>Step 3: Search until for winning point in step 1 above = 1
for
window
center
in
3*3
searches.</p>
      </sec>
    </sec>
    <sec id="sec-9">
      <title>Search</title>
      <p>minimum of 3 based on position of winning point
=1. Then halt search.</p>
      <p>Step 4: Determine half of 9 * 9 search window sizes
choose center to be equal to
minimum
block
distortion measure point in step 1 and repeat search
procedure as step 2 and step 3 in Three Search Step</p>
      <p>A video stream of 89Mb was separated into three
different frames, compressed, converted into binary codes
using MATLAB) and subjected to message insertion (via
LSB algorithm). The frames were reconstructed and an
evaluation test of comparative
performance of the
reconstructed image frame (video) using size 256 X 256 for all
frames
from
sample
video
was
tested.</p>
      <p>With
the
transformation process on specific block size of 8 by 8, an
optimum result of the DCT coefficient was obtained. This
was found to be 64 coefficients. With the variation range of 1
and 64, the various</p>
      <p>and     of the reconstructed
image frames were compared with a defined standard image
frame for different range of 1-64 as earlier used (i.e.
excluding zero). The result obtained shows that data hidden
in LSB of compressed video has little or no distortion to the
original video. Based on the average PSNR estimation, a
high PSNR value was obtained which proves high image
quality of the reconstructed video which is similar to (if not
almost the same as) the original video. At the receiving end,
the whole insertion process was reversed. The experiment
shows that concealed confidential data will be un-noticed
even if the data is conveyed through an un-secured medium</p>
      <p>As a criterion for good image quality, the parameter MSE
(Mean Square Error) and PSNR (Peak Signal to Noise Ratio)
are express below;</p>
      <p>
        MSE(Mean Square Error) is an acronym for the
meansquared error. It measures the error difference between a
given
stego-image
and
it
covers [
        <xref ref-type="bibr" rid="ref15">16</xref>
        ].
      </p>
    </sec>
    <sec id="sec-10">
      <title>This can be mathematically defined as follows: 127 Where</title>
      <p>,</p>
      <p>=1  =1    −   
2
(9)
   =
   =</p>
      <p>Value of a given image in pixel at location  ,  in
the cover image
Value of a given image in pixel the same location
in the fitting stego-image.
   
(Peak to peak value of the original data )2
  
(8)
Where E= log10</p>
      <p>The standard unit of measuring PSNR is usually
designated as   value for quality consideration. This
means high value of PSNR signifies good quality of image</p>
      <p>ANALYSIS OF PSNR VALUES FOR DIFFERENT TEST</p>
      <p>SEQUENCES</p>
      <p>From the PSNR sequences graph, the sequence of Ship1
and Ship 3 has high motion dynamics while Ship 2 has
moderate upper finger motion. We evaluated this algorithm
and compared PSNR value of original information image
versus extracted image for different input videos</p>
      <p>V.</p>
      <p>CONCLUSION AND FUTURE WORK</p>
      <p>We were able to come up with an unfailing, optimally
secure technique for hiding confidential information in a
stego-medium. The above work still further it experiment via
a three step greedy search process to choose a suitable value
for threshold to be used in selecting macro-blocks that match
to a given CMV in order for identically identified of
candidates the decoder in-spite of the condition that a
macroblocks is not strongly compressed. The extraction of
embedded image was found to be easy with almost no
distortion to original message (massage integrity was
absolutely maintained). This approach was compared with
other massage hiding techniques gathered from different
literatures and it was found more efficient, robust and
reliable. Future work will focused on further increase in size
of the “embedded payload” while maintaining efficiency,
robustness and message integrity.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>K. S.</given-names>
            <surname>Anooplal</surname>
          </string-name>
          and
          <string-name>
            <surname>S.Girish “</surname>
          </string-name>
          <article-title>An infallible method to transfer confidential data using delta steganography”</article-title>
          ,
          <source>International Journal of Engineering Research and Technology (IJERT)</source>
          ,
          <source>vol.4</source>
          , pp.
          <fpage>1060</fpage>
          -
          <lpage>1063</lpage>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <string-name>
            <surname>M. P. Hemalatha</surname>
          </string-name>
          , R. Dinesh Kumar andD.
          <article-title>Vinoth kumar “Image steganography using HBC and RDH technique”</article-title>
          ,
          <source>International Journal of Computer Applications Technology and Research</source>
          ,vol.
          <volume>3</volume>
          , pp.
          <fpage>136</fpage>
          -
          <lpage>139</lpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>I. E. G.</given-names>
            <surname>Richardson</surname>
          </string-name>
          , “H.
          <article-title>264 and MPEG-4 Video Compression: VideoCoding for Next Generation Multimedia”</article-title>
          . Hoboken, NJ, USA: Wiley, pp.
          <fpage>260</fpage>
          -
          <lpage>273</lpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>A. A.</given-names>
            <surname>Hussein</surname>
          </string-name>
          ,“
          <article-title>Data hiding in motion vectors of compressed video based on their associated prediction error”</article-title>
          ,
          <source>IEEE Trans. Inf. Forensics Security</source>
          , vol.
          <volume>6</volume>
          , pp.
          <fpage>100</fpage>
          -
          <lpage>120</lpage>
          ,
          <year>March 2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>F.</given-names>
            <surname>Mehdi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Shirmohammadi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Semsarzadeh</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J</given-names>
            .
            <surname>Zhao</surname>
          </string-name>
          ,“
          <article-title>Tampering detection in compressed digital video using watermarking”</article-title>
          <source>IEEE Trans. Instrumentation and Measurement</source>
          , vol.
          <volume>63</volume>
          , pp.
          <fpage>65</fpage>
          -
          <lpage>70</lpage>
          , May 2014
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>S.M.</given-names>
            <surname>Poonkuzhali</surname>
          </string-name>
          , “
          <article-title>Data hiding using visual cryptography for secure transmission”</article-title>
          ,
          <source>International Journal of Advanced Research in Computer and Communication Engineering</source>
          , , vol.
          <volume>2</volume>
          , pp.
          <fpage>66</fpage>
          -
          <lpage>75</lpage>
          , April 2015
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>K</given-names>
            <surname>.. Spyridon</surname>
          </string-name>
          , , E. Eleni,
          <string-name>
            <given-names>N.</given-names>
            <surname>Athanassios</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Manjula</surname>
          </string-name>
          , and
          <string-name>
            <surname>K..</surname>
          </string-name>
          <article-title>Radhika “Data hiding in H.264 encoded video sequences”</article-title>
          ,
          <source>IEEE Proc. MMSP</source>
          <year>2012</year>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>S. G.</given-names>
            <surname>Lian</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z. X.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Ren</surname>
          </string-name>
          and
          <string-name>
            <given-names>H. L.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <article-title>"Secure advanced video coding based on selective encryption algorithms,"</article-title>
          <source>IEEE Trans. Consumer Electron.</source>
          , vol.
          <volume>52</volume>
          , pp.
          <fpage>621</fpage>
          -
          <lpage>629</lpage>
          , May
          <year>2014</year>
          [9]
          <string-name>
            <given-names>M.</given-names>
            <surname>Shahid</surname>
          </string-name>
          , Chaumont, and
          <string-name>
            <given-names>W.</given-names>
            <surname>Puech</surname>
          </string-name>
          ,
          <article-title>"Fast protection of H.264/AVC by selective encryption of CAVLC and CABAC for I and P frames,"</article-title>
          <source>IEEE Trans. Circuits Syst. Video Technol. Article in a conference proceedings: vol. 21</source>
          , pp.
          <fpage>565</fpage>
          -
          <lpage>576</lpage>
          , May 2011
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>T.</given-names>
            <surname>Shanableh</surname>
          </string-name>
          , “
          <article-title>Data hiding in MPEG video files using multivariate regression and flexible macroblock ordering</article-title>
          ,
          <source>” IEEE Trans. Inf. ForensicsSecurity</source>
          , vol.
          <volume>7</volume>
          , pp.
          <fpage>455</fpage>
          -
          <lpage>464</lpage>
          , Apr. 2012
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>S. E.</given-names>
            <surname>Thomas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. T.</given-names>
            <surname>Philip</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Nazar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Mathew</surname>
          </string-name>
          and
          <string-name>
            <given-names>N.</given-names>
            <surname>Joseph</surname>
          </string-name>
          , “
          <article-title>Advanced cryptographic steganography using multimedia files”</article-title>
          ,
          <source>International Conference on Electrical Engineering and Computer Science (ICEECS)</source>
          , pp.
          <fpage>239</fpage>
          -
          <lpage>242</lpage>
          , May
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>P. N.</given-names>
            <surname>Ghorpade</surname>
          </string-name>
          , “
          <article-title>Data hiding in compressed video using LSB algorithm”</article-title>
          ,
          <source>International Journal of Engineering Research &amp; Technology (IJERT)</source>
          ,
          <source>vol. 3</source>
          . pp.
          <fpage>346</fpage>
          -
          <lpage>349</lpage>
          , April,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>M. N.</given-names>
            <surname>Asghar</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Ghanbari</surname>
          </string-name>
          , “
          <article-title>An efficient security system for CABAC bin-strings of</article-title>
          H.264/SVC,”
          <source>IEEE Trans. Circuits Syst. Video Technol.</source>
          , vol.
          <volume>23</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>425</fpage>
          -
          <lpage>437</lpage>
          , Mar.
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>D.</given-names>
            <surname>Angadi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Pimpale</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Vibhute</surname>
          </string-name>
          and
          <string-name>
            <surname>B.S.Kamble.</surname>
          </string-name>
          “
          <article-title>Data hiding in motion vectors of compressed video”</article-title>
          ,
          <source>International Journal of Emerging Technology and Advanced Engineering</source>
          , vol.
          <volume>4</volume>
          , pp.
          <fpage>234</fpage>
          -
          <lpage>239</lpage>
          ,
          <year>February 2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>E.</given-names>
            <surname>Diana</surname>
          </string-name>
          and
          <string-name>
            <given-names>G. S.</given-names>
            <surname>Jenifer</surname>
          </string-name>
          , “
          <article-title>Encrypted data hiding in video stream using code word substitution”</article-title>
          ,
          <source>International Journal of Science Technology &amp; Engineering -IJSTE</source>
          , vol
          <volume>1</volume>
          , pp.
          <fpage>39</fpage>
          -
          <lpage>45</lpage>
          ,
          <year>March 2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>R.</given-names>
            <surname>Sridevi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. L.</given-names>
            <surname>Paruchuri</surname>
          </string-name>
          , and
          <string-name>
            <given-names>K.S.</given-names>
            <surname>Rao</surname>
          </string-name>
          , “
          <article-title>Image steganography combined with cryptography”</article-title>
          ,
          <source>International Journal of Computers &amp; Technology</source>
          , Vol.
          <volume>9</volume>
          , pp.
          <fpage>976</fpage>
          -
          <lpage>984</lpage>
          ,
          <fpage>July2001</fpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>