Security in Video Conferencing Using Video Stegnography

Abstract

I describe a steganographic system which embeds secret messages into a video stream.I examine the signal path which typically includes discrete cosine transformation (DCT) based, lossy compression. Result is the technical realisation of a steganographic algorithm whose security is established by indeterminism within the signal path.

Authors and Affiliations

dr. Shruti

Keywords

Related Articles

A Real Time Telehelth Monitoring System

Now a day's healthcare industry is to provide better healthcare to people anytime and anywhere in the world in a more economic and patient friendly manner. In the present paper the physiological parameters such as ECG, P...

A surveillance of MRSA nasal carriage in Community and Health Care Workers

Staphylococcus aureus (S. aureus) is both a human commensal & an important pathogen in disease. It is a frequent cause of infections in both community and hospital. Being the principal habitant in human nares, S. aureus...

Fusarium Wilt of Garden Egg (Solanum melongena) At Imawa Village of Kura Local Government of Kano State, Nigeria

This was a Survey of fusarium wilt of Solanum melongena at Imawa village of Kura Local Government area located on N11o 47’56.8” and 008o 27’33.7”. During the survey, Four (4) plots were visited weekly for 8 weeks. Sympto...

Semi-Structured Data Structured Data Conversion Using Data Mining Methods

Emerging technologies of semi-structured data have attracted a wide attention like networks, e-commerce, information retrieval and databases. In these applications, the data are modeled not as static collections but as t...

Analysis of J48 Algorithm in Classification-Ebola Virus

Data mining is the rising research area to overcome various queries and classification. It is one of the major problems in the area of data mining. In this article, we used J48 algorithm of the WEKA interface. It can be...

Download PDF file
  • EP ID EP241942
  • DOI -
  • Views 87
  • Downloads 0

How To Cite

dr. Shruti (2015). Security in Video Conferencing Using Video Stegnography. International journal of Emerging Trends in Science and Technology, 2(8), 3054-3059. https://europub.co.uk/articles/-A-241942