An Efficient Method for Steganography in Videos
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 8
Abstract
This paper applies steganography algorithm in videos. In proposed method we are hiding the data in a compressed video by using optimal pixel adjustment process (OPAP). Secrete Message is first encrypted by using cryptography algorithm. This encrypted message is converted into bits and replaced with the least significant bits of discrete cosine transform coefficients of frames in a video. By using cryptography we can provide high security to the embedded data. This algorithm was tested on different types of videos. The proposed method is found to perform well and is compared to a Least Significant Bit replacement algorithm from the literature.
Authors and Affiliations
N. Sarath Babu, Dr. M. Sailaja
An Approach to Percolate Surplus Information Significances from OSN User Walls
As of Recent Years, Online Social Networks have transformed into a vital bit of step by step life for a few. One crucial issue in today user wall(s) is to give users the ability to control the messages posted in solitud...
INFORMATION RETRIEVAL FOR IMAGE MINING
Many areas of commerce, government, academia, and hospitals create large collections of digital images. Through digitization of data and developments in technology it is very easy to acquire and store large quantitie...
A System To Minimize The Storing And Managing Secret Keys Expense Using Kac In Cloud
Information outsourcing which helps in the arrangement need organization of corporate information. It is likewise utilized as a core innovation at the back of various online services for individual applications. Comm...
Cluster Based Shifting Technique For Arrange Data Units Into Different Groups In Web Databases
The techniques of a clustering based shifting method make use of more affluent yet automatically obtainable features. This method is capable of handling a variety of relationships between HTML text nodes and data uni...
Enhanced Intrusion Detection System with Mobile Agent
This electronic The widespread proliferation of Internet connections has made current computer networks more vulnerable to intrusions than before. In network intrusions, there may be multiple computing nodes that are...