Video steganography -Information Security Perspective

Abstract

Security in digital multimedia content is inevitable in the era of Internet .Unauthorized person should not be able alter or receive the message .To address this issue many security mechanisms have evolved like encryption, watermarking, and steganography. The most trusted and reliable method of secured communication is Steganography. It is the science of covert communication which usually carries data in image, audio or video and conceals the existence of the data in that way it differs from cryptography. However this technique could be misused for ill intentions also. This paper gives a survey of current steganography techniques and proposed new method of data hiding using Saliency map technique .Robustness, Imperceptibility and capacity are the features considered in designing a steganography system. Bank transactions , Military communications , Government ,Business secrets , medical image transactions , individual or group communications are some of the major areas in which steganography is being used. Steganalysis is the science of breaking the steganography which is not concentrated in this paper, but this paper concludes with recommendation of robust steganography system that withstand against steganalysis and statiscal attacks. The metrics for evaluating the performance of Steganography is also emphasized in the concluding remarks.

Authors and Affiliations

Boopathy. R, Dr. Dhaya. R, Dr. Ramakrishnan. M , Dr. Victor. S. P

Keywords

Related Articles

Brief Review of Various Metrics to Achieve Reusability and Changeability of a Software

Component Based Software Engineering (CBSE) is one of the trending techniques that specifies upon the design and construction of large and complex software systems. The main objective is to minimize the changeability, c...

Performance Analysis and Heat Transfer Studies on Protruding Surfaces of Electronic Components through Forced Convection

Electronics equipment has made inroads in almost every aspect of modern life from toys and appliances to high power computer. Every electronic component depends on the passage of electric current to perform its duty, an...

Architecture of Windows NT Operating System

The architecture of Windows NT, a line of operating systems produced and sold by Microsoft, is a layered design that consists of two main components, user mode and kernel mode. It is a preemptive, reentrant operating sy...

Quasi Self Complementary (QSC) Ultra-Wide Band (UWB) Antenna Integrated with Bluetooth

This paper introduces UWB antenna integrated with Bluetooth. This can cover the band of Bluetooth application (2.4GHz) and the band of UWB application (3-12GHz). The proposed antenna consists of semi ring connected with...

An Ensemble Model for Identification of Phishing Website

Identification of phishing websites is very challenging task for every internet and e-mail users. To protect the information from unauthorized person classification of phishing websites is very important. In this resear...

Download PDF file
  • EP ID EP20885
  • DOI -
  • Views 279
  • Downloads 4

How To Cite

Boopathy. R, Dr. Dhaya. R, Dr. Ramakrishnan. M, Dr. Victor. S. P (2015). Video steganography -Information Security Perspective. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 3(6), -. https://europub.co.uk/articles/-A-20885