Video steganography -Information Security Perspective
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 6
Abstract
Security in digital multimedia content is inevitable in the era of Internet .Unauthorized person should not be able alter or receive the message .To address this issue many security mechanisms have evolved like encryption, watermarking, and steganography. The most trusted and reliable method of secured communication is Steganography. It is the science of covert communication which usually carries data in image, audio or video and conceals the existence of the data in that way it differs from cryptography. However this technique could be misused for ill intentions also. This paper gives a survey of current steganography techniques and proposed new method of data hiding using Saliency map technique .Robustness, Imperceptibility and capacity are the features considered in designing a steganography system. Bank transactions , Military communications , Government ,Business secrets , medical image transactions , individual or group communications are some of the major areas in which steganography is being used. Steganalysis is the science of breaking the steganography which is not concentrated in this paper, but this paper concludes with recommendation of robust steganography system that withstand against steganalysis and statiscal attacks. The metrics for evaluating the performance of Steganography is also emphasized in the concluding remarks.
Authors and Affiliations
Boopathy. R, Dr. Dhaya. R, Dr. Ramakrishnan. M , Dr. Victor. S. P
slugSelf Organizing Network Functions in 4G (LTE)
This paper deals with Self Organizing Network (SON) and its functions which play a very important role in the cellular network. Now a day’s networks are getting more complex to configure, optimize and maintain. Manually...
A Review Paper on Performance of SCC Containing Lime Stone Powder and Quarry Dust
Self-Compacting Concrete (SCC) is highly flow able, stable concrete that can spread readily into place and fill the formwork without any consolidation and without undergoing any significant segregation. In recent years,...
slugIssues of Privacy and Confidentiality in Cloud Computing
Cloud computing means entrusting data to information systems that are managed by external parties on remote servers “in the cloud.”Webmail and online documents (such as Google Docs) are well - known ex...
Ground Bouncing Noise Reduction in Combinational Circuits
As technology scales into the nanometer regime ground bounce noise and noise immunity are becoming important metric of comparable importance to leakage current, active power, delay and area for the analysis and design o...
Collaborative Filtering Approach of Keyword Aware Service Recommendation for Big Data Applications on Map-Reduce
Recommender systems are shown as valuable tools for providing acceptable recommendations to users. Within the last decade, the number of customers shopping online, services and on-line data has grown quickly, yielding t...