Video steganography -Information Security Perspective

Abstract

Security in digital multimedia content is inevitable in the era of Internet .Unauthorized person should not be able alter or receive the message .To address this issue many security mechanisms have evolved like encryption, watermarking, and steganography. The most trusted and reliable method of secured communication is Steganography. It is the science of covert communication which usually carries data in image, audio or video and conceals the existence of the data in that way it differs from cryptography. However this technique could be misused for ill intentions also. This paper gives a survey of current steganography techniques and proposed new method of data hiding using Saliency map technique .Robustness, Imperceptibility and capacity are the features considered in designing a steganography system. Bank transactions , Military communications , Government ,Business secrets , medical image transactions , individual or group communications are some of the major areas in which steganography is being used. Steganalysis is the science of breaking the steganography which is not concentrated in this paper, but this paper concludes with recommendation of robust steganography system that withstand against steganalysis and statiscal attacks. The metrics for evaluating the performance of Steganography is also emphasized in the concluding remarks.

Authors and Affiliations

Boopathy. R, Dr. Dhaya. R, Dr. Ramakrishnan. M , Dr. Victor. S. P

Keywords

Related Articles

Traffic Assignment:A Case Study Of Avkuda

Traffic assignment is a part of travel demand models. For traffic assignment various input data are required such as road type ,link length ,carriageway ,width , link capacity ,free flow speed ,travel time ,OD matrix et...

Construction of control chart based on six sigma initiatives for Cumulative – Sum

A control chart is a statistical device used for the study and control of repetitive process. W.A. Shewhart [6] of Bell Telephone Laboratories suggested control charts based on the 3 sigma limits. Now the companies in d...

Rotor Angle Stability Improvement of DFIG Using Grid Side and Rotor Side Converter Control

Wind energy generation with Doubly Fed Induction Generator is dominant one in wind farms. High penetration of DFIG is creating more instability in rotor side and grid side. Applying a set of optimized control parameter,...

Design and Analysis of Exhaust Manifold in Diesel Engine

This project aims in re-designing an exhaust manifold by determining the thermal stresses and deflections exhibited under various operating conditions with different materials and temperatures. The objective is to ensur...

New Approach on Hybrid Image Compression

Digital images are used in many applications. Large amount of data is necessary to represent the digital images so the transmission and storage of such images are time-consuming and infeasible. Hence the information in...

Download PDF file
  • EP ID EP20885
  • DOI -
  • Views 234
  • Downloads 4

How To Cite

Boopathy. R, Dr. Dhaya. R, Dr. Ramakrishnan. M, Dr. Victor. S. P (2015). Video steganography -Information Security Perspective. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 3(6), -. https://europub.co.uk/articles/-A-20885