Video Steganography Used for Hiding Video Data
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 5
Abstract
Internet is behaved as a backbone for the current modern technologies; it is globally connected, unsecure network. We can transfer the data through internet for data accurate and faster to the destination. Besides this, anyone can modify and misuse the valuable information through hacking at the time. Steganography is an art of hiding the secret data or information inside the digitally covered information. The hidden message can be text, image, speech or even video and the cover scan be chosen accordingly from either a text, an image, an audio or video. Steganography is a type of cryptography in which the secret message is hidden in a digital picture but here in this project video steganography is applied on video which is transfer from sender side to receiver side. Nowadays, the use of a video based steganography is common and numbers of steganalysis tools are available to check whether the video is stego-video or not. Most of the tools are checking for information hided by lsb, dct, frequency domain analysis etc. Here consider video as set of frames or images and any changes in the output image by hidden data is not visually recognizable.
Authors and Affiliations
Prachi P. Sadawarte, Prof. P. A. Tijare
Data Hiding Using Blind Algorithm of Steganography
The process of hiding messages or information within other non-secret text or data is called steganography. Steganography may be text, image, audio or video steganography. Digital image Steganography is popular because...
Numerical Investigation of Velocity and Pressure Fluctuations in the Wake of a Circular Cylinder Due To Transient Laminar Flow
2D incompressible and transient flow around a circular cylinder has been carried out numerically by using CFD fluent. The wake is generated by a uniform laminar flow of Reynolds number (Re) 150 based on the characterist...
slugIssues of Privacy and Confidentiality in Cloud Computing
Cloud computing means entrusting data to information systems that are managed by external parties on remote servers “in the cloud.”Webmail and online documents (such as Google Docs) are well - known ex...
A Comparative Study between Hamming Code and Reed-Solomon Code in Byte Error Detection and Correction
This work concerns the comparative study between Hamming code and Reed-Solomon (RS) code in byte error detection and correction. Data are either stored in storage applications or transferred through a media. In either c...
Improving Incremental Conductance Control Method of Solar Energy Conversion
Solar energy is a potential energy source in India. A photovoltaic is needed to harvest this kind of energy, and to be able to gather the most, the PV must have a good efficiency. The maximum efficiency is achieved when...