International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Since Year 2012 | Open Access | Double Blind Reviewed

ISSN: 2319-7064



Downloads: 122

Research Paper | Electronics & Communication Engineering | India | Volume 2 Issue 11, November 2013


Encryption of Text File in a Video Using Adaptive Compression of Video

Y. Satheesh | Shaik Taj Mahaoob


Steganography, video processing, Motion vectors, DCT, DWT, LSB, video, processing, Motion, vectors,

Abstract: Steganography, is the art of providing security to text file by embedding into a carrier which can be a text or an multimedia file. This paper proposes a method for the real-time embedding of information in a compressed video. Unlike images Video files are generally a collection of images which can be more eligible than other multimedia files, because of its size and memory requirements. The great advantages of video files are the large amount of data that can be hidden inside and the fact that it is a moving stream of image. This paper provides a new technique that is motion vector is used to embed the data in the moving objects. We focus on the Least Significant Bit (LSB) technique is an important insertion technique for embedding data into video file and comparing the qualitative and quantitative performance of algorithms (compression).


Keywords: Steganography, video processing, Motion vectors, DCT, DWT, LSB


Edition: Volume 2 Issue 11, November 2013,


Pages: 348 - 351


How to Cite this Article?

Y. Satheesh, Shaik Taj Mahaoob, "Encryption of Text File in a Video Using Adaptive Compression of Video", International Journal of Science and Research (IJSR), Volume 2 Issue 11, November 2013, pp. 348-351, https://www.ijsr.net/get_abstract.php?paper_id=14111301

How to Share this Article?







Similar Articles with Keyword 'Steganography'

Downloads: 95

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2276 - 2281

Skin based Data hiding in Images by Using Haar and db2 DWT Techniques

Swapnali Zagade | Smita Bhosale

Share this Article

Downloads: 106

Research Paper, Electronics & Communication Engineering, India, Volume 4 Issue 6, June 2015

Pages: 801 - 804

A Steganography Implementation Based On DCT Algorithm By Using MATLAB GUI Function

Er. Yashpal Lather | Er. Megha Goyal

Share this Article


Top