Encryption of Text File in a Video Using Adaptive Compression of Video
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Downloads: 122

Research Paper | Electronics & Communication Engineering | India | Volume 2 Issue 11, November 2013

Encryption of Text File in a Video Using Adaptive Compression of Video

Y. Satheesh, Shaik Taj Mahaoob

Steganography, is the art of providing security to text file by embedding into a carrier which can be a text or an multimedia file. This paper proposes a method for the real-time embedding of information in a compressed video. Unlike images Video files are generally a collection of images which can be more eligible than other multimedia files, because of its size and memory requirements. The great advantages of video files are the large amount of data that can be hidden inside and the fact that it is a moving stream of image. This paper provides a new technique that is motion vector is used to embed the data in the moving objects. We focus on the Least Significant Bit (LSB) technique is an important insertion technique for embedding data into video file and comparing the qualitative and quantitative performance of algorithms (compression).

Keywords: Steganography, video processing, Motion vectors, DCT, DWT, LSB

Edition: Volume 2 Issue 11, November 2013

Pages: 348 - 351

Share this Article

How to Cite this Article?

Y. Satheesh, Shaik Taj Mahaoob, "Encryption of Text File in a Video Using Adaptive Compression of Video", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=14111301, Volume 2 Issue 11, November 2013, 348 - 351

Enter Your Email Address




Similar Articles with Keyword 'Steganography'

Downloads: 95

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2276 - 2281

Skin based Data hiding in Images by Using Haar and db2 DWT Techniques

Swapnali Zagade, Smita Bhosale

Share this Article

Downloads: 106

Research Paper, Electronics & Communication Engineering, India, Volume 4 Issue 6, June 2015

Pages: 801 - 804

A Steganography Implementation Based On DCT Algorithm By Using MATLAB GUI Function

Er. Yashpal Lather, Er. Megha Goyal

Share this Article

Downloads: 106

Review Papers, Electronics & Communication Engineering, India, Volume 5 Issue 3, March 2016

Pages: 1551 - 1554

A Review on Implementation of Cryptographic Method for Secure Audio Data Hiding in Digital Images

Pranjali Ihare, V. T. Gaikwad

Share this Article

Downloads: 108 | Weekly Hits: ⮙2

Research Paper, Electronics & Communication Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2200 - 2202

Security Enhanced RDH Image Steganography by RRBE

Saranya.M, Aswani.K

Share this Article

Downloads: 108

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 6 Issue 5, May 2017

Pages: 1420 - 1426

A Chosen-Plaintext Attack on Permutation-Only Image Encryption Schemes and Steganography on Images

Soja Prasannan, Devi Murali

Share this Article

Similar Articles with Keyword 'video processing'

Downloads: 108

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1765 - 1769

Implementation of H.264 Video Codec for Block Matching Algorithms

Vivek Sinha, Dr. K. S. Geetha

Share this Article

Downloads: 111

Research Paper, Electronics & Communication Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1699 - 1704

Algebraic Integer based 2-D DCT Computation using Single Channel Architecture

B. Uday, P. Apsar

Share this Article

Downloads: 118

Research Paper, Electronics & Communication Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2221 - 2224

Multi-Feature Based Fire Detection Using Video Image Processing

Hemangi Tawade, R. D. Patane

Share this Article

Downloads: 119

Research Paper, Electronics & Communication Engineering, India, Volume 2 Issue 10, October 2013

Pages: 210 - 216

Performance Evaluation of 1-Bit Full Adder using Hybridizing PTL and GDI Techniques

K. Mallikarjuna, V. LakshmiVasudha

Share this Article

Downloads: 122

Research Paper, Electronics & Communication Engineering, India, Volume 2 Issue 11, November 2013

Pages: 348 - 351

Encryption of Text File in a Video Using Adaptive Compression of Video

Y. Satheesh, Shaik Taj Mahaoob

Share this Article

Similar Articles with Keyword 'Motion vectors'

Downloads: 108

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1765 - 1769

Implementation of H.264 Video Codec for Block Matching Algorithms

Vivek Sinha, Dr. K. S. Geetha

Share this Article

Downloads: 116

Research Paper, Electronics & Communication Engineering, India, Volume 8 Issue 11, November 2019

Pages: 1321 - 1324

A Lossless Data Hiding Scheme in the Predicted Frames

K. Sridhar, Dr. Syed Abdul Sattar, Dr. M. Chandra Mohan

Share this Article

Downloads: 119

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 3 Issue 11, November 2014

Pages: 213 - 216

A Secured Data Hiding Technique Using Video Sequences

Y. Mahendhar, B. Satish Chandra

Share this Article

Downloads: 122

Research Paper, Electronics & Communication Engineering, India, Volume 2 Issue 11, November 2013

Pages: 348 - 351

Encryption of Text File in a Video Using Adaptive Compression of Video

Y. Satheesh, Shaik Taj Mahaoob

Share this Article

Downloads: 134

Research Paper, Electronics & Communication Engineering, India, Volume 3 Issue 1, January 2014

Pages: 115 - 118

Quantitative Analysis of Digital Image Stabilization

K. Dastagiri

Share this Article

Similar Articles with Keyword 'DCT'

Downloads: 105

Research Paper, Electronics & Communication Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1957 - 1963

PAPR Reduction in OFDM System Using PTS+DCT+SLM Technique

Sweety Narula, Ritesh Beohar

Share this Article

Downloads: 106

Research Paper, Electronics & Communication Engineering, India, Volume 4 Issue 6, June 2015

Pages: 801 - 804

A Steganography Implementation Based On DCT Algorithm By Using MATLAB GUI Function

Er. Yashpal Lather, Er. Megha Goyal

Share this Article

Downloads: 110

Research Paper, Electronics & Communication Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1804 - 1807

LSB and DCT Steganographic Detection Using Compressive Sensing

Anju.C.K, Lekshmy.S

Share this Article

Downloads: 110

Research Paper, Electronics & Communication Engineering, Egypt, Volume 5 Issue 6, June 2016

Pages: 1854 - 1857

A Proposed Hybrid Method for Airtarget Acoustic Signature Diagnosis

Mazhar Taylel, Mahmoud Sabry

Share this Article

Downloads: 111

Research Paper, Electronics & Communication Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1699 - 1704

Algebraic Integer based 2-D DCT Computation using Single Channel Architecture

B. Uday, P. Apsar

Share this Article

Similar Articles with Keyword 'DWT'

Downloads: 95

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2276 - 2281

Skin based Data hiding in Images by Using Haar and db2 DWT Techniques

Swapnali Zagade, Smita Bhosale

Share this Article

Downloads: 107 | Weekly Hits: ⮙2 | Monthly Hits: ⮙8

Research Paper, Electronics & Communication Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2159 - 2163

Performance Analysis of Multi-Carrier Modulation Techniques Using FFT, DWT and DT-WPT

Chitakani Ravi Kishore, Gadhe Jayanth Reddy, Murali Mohan K.V

Share this Article

Downloads: 107

Research Paper, Electronics & Communication Engineering, India, Volume 5 Issue 10, October 2016

Pages: 1780 - 1785

Error Tolerant Digital Watermarking System for the Application of Noisy RGB Images

Bharti Mishra, Rashmi Kashyap

Share this Article

Downloads: 108

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2837 - 2839

Types of Three Filter Banks in FPGA

Tasneem Kausar

Share this Article

Downloads: 109

Review Papers, Electronics & Communication Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1391 - 1397

A 3-Stage Pipeline VLSI Architecture for Fast Computation of the 2-D Discrete Wavelet Transform

Harshitha S, Gopalakrishna K

Share this Article

Similar Articles with Keyword 'LSB'

Downloads: 1

Survey Paper, Electronics & Communication Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1067 - 1069

A Secure Text (Missile Co-ordinate) Transmission Using Digital Watermarking

Jagtap. D. V, M. D. Patil

Share this Article

Downloads: 110

Research Paper, Electronics & Communication Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1804 - 1807

LSB and DCT Steganographic Detection Using Compressive Sensing

Anju.C.K, Lekshmy.S

Share this Article

Downloads: 110

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 3 Issue 11, November 2014

Pages: 230 - 233

Security Enhancement System through Reversible Data Embedding Technique in Encrypted Images

E. Famidha, G. Gajalakshmi, S. Devisaranya

Share this Article

Downloads: 110

Research Paper, Electronics & Communication Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2023 - 2026

12Bit, 80MHz, 230mW Pipeline ADC using 3Bit Flash ADC

Himanshu Raj Pashine, Jayanthi K Murthy

Share this Article

Downloads: 111

Informative Article, Electronics & Communication Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1976 - 1978

Improved Edge Based Steganography Scheme for GrayScale Images in Spatial Domain

Dr. R. R Dube, M. A. Lalkot

Share this Article



Top