Video Steganography and Security Cryptography

Abstract

— Today’s world is growing rapidly over internet technologies. Steganography play an important role in the field of information security [1]. Video and images are very common choice for hiding data. In Visual cryptography we upload an image and embed encrypted data into color component using LSB audio steganography .The advantage of video cryptography is that, large amount of data can be hidden inside and the fact that it is a moving stream of images [2]. The data security approach when combined with encryption and steganography techniques for secret communication by hiding it inside the multimedia file. The data is hidden in horizontal and vertical components of the moving objects. The file such as images, audios and videos contains collection of bits that can further be translated into images, audios and videos. The file composed of insignificant bit and unused areas which can be used for overwriting of other data. This paper explains the algorithm using video steganography for enhancing data security. Key frame extraction technique is new in video steganography and is used.

Authors and Affiliations

Ezhilarasi c

Keywords

Related Articles

A Systematic Parameter Adaption Scheme in APSO

An adaption feature of particle swarm optimization features have better search efficiency than particle swarm optimization (PSO) is presented. It can perform a global search over the entire search space with faster conve...

Implementation of Video-Object Steganography Mechanism over Robust Remote Authentication via Biometrics

Remote verification over remote is a tested one. Many creators proposed a considerable measure of arrangements like, the remote human confirmation plot over remote channels under misfortune tolerant transmission conventi...

ஒப்பீட்டு நோக்கில் மெய்ப்பாட்டியல்

ஒப்பீட்டு நோக்கில் மெய்ப்பாட்டியல்

திருப்புகழ்:- பக்திக் கட்டமைப்பில் தொகைச் சொற்கள்

தமிழ்க் கடவுள் முருகப் பெருமானின் சிறப்புகளையும் செயல்களையும் பெருமைகளையும் எடுத்துரைப்பது திருப்புகழ். இத்திருப்புகழ் கட்டமைப்பில் தொகைச் சொற்களின் பங்கு அதிகமுள்ளது. தொகைச் சொற்களை விரிப்பதால் கிடைக்கும் தொகை வகைகளின்...

An Efficient Way of Finding Optimal Path using Protein Data Set: Ant Colony Optimization with Rough Set Theory for Feature Selection

Bioinformatics is one of the emerging technologies which is played an important role in the field of biology. The molecular biology and Bioinformatics information are extracted from the protein data set which is used for...

Download PDF file
  • EP ID EP642797
  • DOI -
  • Views 130
  • Downloads 0

How To Cite

Ezhilarasi c (2017). Video Steganography and Security Cryptography. International Journal of Linguistics and Computational Applications, 4(4), 98-100. https://europub.co.uk/articles/-A-642797