A Video Steganography Approach using Random Least Significant Bit Algorithm
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Computer Science & Engineering | India | Volume 3 Issue 6, June 2014

A Video Steganography Approach using Random Least Significant Bit Algorithm

Arijit Basu, Gaurav Kumar, Soumyajit Sarkar

Steganography is the art of hiding information. It is derived from the Greek word Steganos which means covered writing; a science of secret communication. It is a tool for hiding information in a medium so that the information does not appear to exist. The idea of data hiding is not a novelty; it has been used for centuries all across the world under different regimes- but to date it is still unknown to most people. It is a tool for hiding information so that it does not even appear to exist. However Steganography operates at more complex level as detection is dependent on recognizing the underlying hidden data. The message to be hidden is known as the embedded data; the medium for hiding is known as the cover medium and the encoded medium is known as the stego-object. In this paper we present a video steganographic process using the Random Least Significant Bit algorithm and hence perform a careful analysis of the same with the Sequential Least Significant Bit algorithm.

Keywords: Steganography, Steganalysis, LSB, RLSB, RGB, PSNR, MSE

Edition: Volume 3 Issue 6, June 2014

Pages: 1811 - 1816

Share this Article

How to Cite this Article?

Arijit Basu, Gaurav Kumar, Soumyajit Sarkar, "A Video Steganography Approach using Random Least Significant Bit Algorithm", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=2014655, Volume 3 Issue 6, June 2014, 1811 - 1816

53 PDF Views | 44 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Steganography'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 647 - 651

Frequency Domain Based Robust Digital Image Watermarking Resilient to Desynchronization Attacks

Mahesh R. Shimpi, S. V. Gumaste

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1132 - 1134

An Improvement on the Security of Odd-Even-LSB Based Steganography by Adding Encryption

Ayda Alizadeharasi, Maryam Safaei Rizi

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3099 - 3106

Separable Reversible Data Hiding In Encrypted Image Using Modified Least Significant Bit and Virtual Embedding

Shreya M. S., Sandeep Kumar S

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2382 - 2385

Data Sharing through Multimedia Steganocryptic and Visual Cryptography System

Gajangi Rahul Kumar, U.Shivaji

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2541 - 2544

Reversible Data Embedding using F5 Algorithm

Sanjivani Koli, N. B. Pokale

Share this Article

Similar Articles with Keyword 'Steganalysis'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1319 - 1323

Advanced Technique for Comprehensive Data Security

Pramendra Kumar, Vijay Kumar Sharma

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1811 - 1816

A Video Steganography Approach using Random Least Significant Bit Algorithm

Arijit Basu, Gaurav Kumar, Soumyajit Sarkar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2319 - 2323

Performance Enhancement of a Transform Domain Based SteganographicTechnique Using Segmentation

Harjeet Kaur, Er Divya Goyal

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 743 - 747

Secure Spread Spectrum Data Embedding and Extraction

Vaibhav Dhore, Pathan Md. Arfat

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3198 - 3203

A Study and Review of Techniques of Spatial Steganography

Ravneet Kaur, Bhavneet Kaur

Share this Article

Similar Articles with Keyword 'LSB'

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1132 - 1134

An Improvement on the Security of Odd-Even-LSB Based Steganography by Adding Encryption

Ayda Alizadeharasi, Maryam Safaei Rizi

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3099 - 3106

Separable Reversible Data Hiding In Encrypted Image Using Modified Least Significant Bit and Virtual Embedding

Shreya M. S., Sandeep Kumar S

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1467 - 1471

XOR Encryption Based Video Steganography

Ramandeep Kaur, Pooja

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 198 - 201

Comparison of PNG & JPEG Format for LSB Steganography

Bharat Sinha

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2469 - 2473

High Security of Data Using Steganography with Hybrid Algorithm

Madhugeeta Verma, Poonam Dhamal

Share this Article

Similar Articles with Keyword 'RGB'

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1915 - 1919

Optimized Content Based Image Retrieval System using Colored Features with IWD

Damandeep Singh, Nitin Bhagat

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 2, February 2016

Pages: 1867 - 1871

Enhanced Multi Secret Image Sharing Scheme for Gray and RGB Images

Amit Patel

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2657 - 2659

An Outline of Various Secret Sharing Techniques

Kavita Choudhary, Kumar Vaibhav

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 85 - 87

Survey Paper of Indian Sign Language Gesture System Weighted Euclidean Distance Based

Er. Vandana Soni, Dr. Tripti Arjariya

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 3, March 2016

Pages: 1847 - 1849

Traffic Light Control Using Image Processing

Jaya Singh, S. K. Singh

Share this Article

Similar Articles with Keyword 'PSNR'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1330 - 1335

Efficient Image Encryption EIE - Compression System Using Haar Wavelets Using Matlab

Kavita, Anil Vadhwa

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3075 - 3078

Secret Data Hiding in Compressed Video Bit Streams for Privacy Information Protection

B. Vengadalakshmi, S. Abiramasundari

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1132 - 1134

An Improvement on the Security of Odd-Even-LSB Based Steganography by Adding Encryption

Ayda Alizadeharasi, Maryam Safaei Rizi

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 7 Issue 6, June 2018

Pages: 1536 - 1539

Research on Joint Watermarking & Lossless Compression for Image

Bharti Verma, Somesh Dewangan, Sachin Harne

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 150 - 155

Enhanced Watermarking Technique using Computational Wavelet and Cosine Transformation

Harmandeep Kaur, Simarjeet Kaur

Share this Article

Similar Articles with Keyword 'MSE'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1330 - 1335

Efficient Image Encryption EIE - Compression System Using Haar Wavelets Using Matlab

Kavita, Anil Vadhwa

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1227 - 1231

An Efficient Clustering Based High Utility Infrequent Weighted Item Set Mining Approach

Dr. N. Umadevi, A. Gokila Devi

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 5, May 2013

Pages: 297 - 300

Balancing the Trade-Offs between Data Availability and Query Delay in MANET's

Umar I. Masumdar, N. S. Killarikar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2734 - 2838

Efficient Techniques for Mining High Utility Itemsets from Transactional Databases: A Survey

Ganesh Sawant, Bhawana Kanawde

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2791 - 2796

Design and Implementation of Association Rules Based System for Evaluating WSD

Samit Kumar, Dr. S. Niranjan

Share this Article
Top