Video Steganography: A Survey
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 1
Abstract
Abstract: Recent advances in information technology have made quick delivery and sharing of multimedia information possible. But these advances in technology are leading breaches to information security and personal information. Digital Steganography provides capability to protect private communication that has become necessity in today’s Internet era. Steganography is a technique to protect and conceal multimediainformation in disguised manner or we can say it is the study of invisible communication. Steganography is a mixture of compression, encryption, watermarking and cryptography. Generally sharing of information takesplace in the form of text, image, audio and video. Steganography uses image, text, video and audio to disguise secret information. In this paper we have analyzed only video steganography. In video steganography secretinformation is enveloped inside a video to make it safe from intruders. In this paper we have critically analyzed fundamental concepts, performance metrics and security aspects of video steganography. Different methods used for protecting secret information by using a video as cover media are explored. Comparisons between different video steganography techniques are also provided. Steganalysis is also discussed in brief
Authors and Affiliations
Bharti Chandel , Dr. Shaily Jain
Handwritten Kannada Document Image Processing using Optical Character Recognition
Abstract: The objective of Optical Character Recognition (OCR) is automatic reading of optically sensed document text materials to translate human-readable characters to machine- readable codes. In Optical Character Reco...
Achieving Privacy in Publishing Search logs
The “database of intentions,” collects by the search engine companies for the histories of their users search queries. These searchlogs are a gold mine for researchers. The Search engine companies, howev...
Congestion Controlled d-Adapt-OR for Adhoc Networks
Abstract: Opportunistic routing scheme is used to route data packet from source to destination. Broadcasting nature of the wireless networks is utilized here to send data packets. A suitable forwarder node is selec...
Auto Mutating Cryptosystem- An approach towards better security
Abstract: The concept of learning systems has been an intriguing one since first appearance of Artificial Intelligence (AI) in literature. With the progress in each decade of research, new systems have been developed to...
Cuckoo Search based Optimal Elliptic Curve Cryptography (OECC) for Text Encryption
Abstract : The Cryptography converts our original text information into non understandable form of text that is cipher text which is more powerful because which is not understandable. . In this work we are implemented th...