Video Steganography Using LSB Matching Revisited Algorithm
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 6
Abstract
Abstract: Video Steganography deals with hiding secret data or information within a video. In this paper, a spatial domain technique for LSB Matching Revisited algorithm (LSBMR) has been proposed, where the secret information is embedded in the cover frames. LSB Matching Revisited(LSBMR) algorithm selects the embedding regions according to the size of secret message and the difference between two consecutive pixels in the cover image. For embedding rates is lower , only sharper edge regions are used while keeping the other smoother regions as they are. In the proposed approach, LSB Matching Revisited algorithm is used to embed the secret message into the video. Hence large amounts of data can be embedded and also preserving higher visual quality of stego images at the same time.The proposed method is analyzed in terms of both Peak Signal to Noise Ratio (PSNR) compared to the original cover video as well as the Mean Squared Error (MSE) measured between the original and steganographic files averaged over all video frames.
Authors and Affiliations
R. Shanthakumari , Dr. S. Malliga
A survey on recommendation system
Abstract: In this paper, we give a brief introduction about recommendation systems, components of recommendation systems i.e. items, users and user-item matching algorithms, various approaches of recommendation systems i...
A Survey Report on the Novel Approach on Use ofRecommendation Outline in Query Recommender System
Abstract: The DBMS applications are becoming increasingly popular in the scientific community to supportthe interactive exploration of huge data. A result of heavy usage has also lead to a lot of tavles generated i...
oncept Drift for obtaining Accurate Insight on ProcessExecution
Abstract: Most business processes update with respect time, existing or old process mining strategies used toresolve those processes when they are under the stable position. My attempt is to improve the existing DriftDet...
Protecting the movable Endeavor with Network-Based validation and Virtual Computing
A new security architecture for the mobile enterprise which uses network-based security and cloud computing has been proposed in these paper. This newly proposed architecture is mainly for both simplifying ...
[u][/u]Effect of Different Mobility Patterns on AODV and OLSR using Different TCP variants
Abstract: In this paper the effect of TCP variant (new reno, tahoe and Sack) is analyzed by using karan’s and nagle theorem by moving nodes at different mobility models on OLSR and AODV protocol. In this nagle theorem is...