ABSTRACT
Video steganography is all about transmission of streaming data, in its real-time nature.
Though subject to bandwidth constraints, I propose a MPEG-2 compliant decoder which uses data hiding to transmit additional data with no extra bandwidth while creating an almost imperceptible degradation of the picture. The additional data can be anything from subtitles to correction signals and watermarking.
TABLE OF CONTENT
TITLE PAGE
CERTIFICATION
APPROVAL
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
TABLE OF CONTENT
CHAPTER ONE
1.0 INTRODUCTION
1.1 STATEMENT OF PROBLEM
1.2 PURPOSE OF STUDY
1.3 AIMS AND OBJECTIVES
1.4 SCOPE/DELIMITATIONS
1.5 LIMITATIONS/CONSTRAINTS
1.6 DEFINITION OF TERMS
CHAPTER TWO
2.0 LITERATURE REVIEW
CHAPTER THREE
3.0 METHODS FOR FACT FINDING AND DETAILED DISCUSSIONS OF THE SYSTEM
3.1 METHODOLOGIES FOR FACT-FINDING
3.2 DISCUSSIONS
CHAPTER FOUR
4.0 FUTURES, IMPLICATIONS AND CHALLENGES OF THE SYSTEM
4.1 FUTURES
4.2 IMPLICATIONS
4.3 CHALLENGES
CHAPTER FIVE
5.0 RECOMMENDATIONS, SUMMARY AND CONCLUSION
5.1 RECOMMENDATION
5.2 SUMMARY
5.3 CONCLUSION
5.4 REFERENCES
Disclaimer: Note this academic material is intended as a guide for your academic research work. Do not copy word for word. Note: For Computer or Programming related works, some works might not contain source codes
CITE THIS WORK
(2014, 08). Embedding In Video Steganography.. ProjectStoc.com. Retrieved 08, 2014, from https://projectstoc.com/read/2844/embedding-in-video-steganography-1504
"Embedding In Video Steganography." ProjectStoc.com. 08 2014. 2014. 08 2014 <https://projectstoc.com/read/2844/embedding-in-video-steganography-1504>.
"Embedding In Video Steganography.." ProjectStoc.com. ProjectStoc.com, 08 2014. Web. 08 2014. <https://projectstoc.com/read/2844/embedding-in-video-steganography-1504>.
"Embedding In Video Steganography.." ProjectStoc.com. 08, 2014. Accessed 08, 2014. https://projectstoc.com/read/2844/embedding-in-video-steganography-1504.
- Related Works
- Provision Of A Mobile Value Added Location Based Services Of Hotels Within New Haven And Independence Layout In Enugu State
- Public Key Validation For Dns Security Extensions
- Workflow Based Complaint Management System
- An Anti Phishing Strategy Based On Visual Similarity Assessment
- Addressing Principles Used In Tcp/ip Protocols
- Computer Forensics
- Design And Implementation Of An On-line Lan Knowledge-based System
- Reducing Delay And Enhancing Dos Resistance In Multicast Authentication Through Multigrade Security (case Study Of Pressure World Cafee )
- Design And Implementation Of Parallel Processing Implementation Of The Mandelbrot Set On Gpu For Online Payment (case Study Of Imt Enugu)
- The Design And Implementation Of A Software For Automobile Insurance Scheme In Nigeria. A Case Study Of Motor Insurance Departmetn Of Universal Insurance Company Ltd Enugu.