A Review on Various Approaches of Video Steganography
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Views: 131 , Downloads: 107 | CTR: 82 % | Weekly Popularity: ⮙3

Review Papers | Computer Science & Engineering | India | Volume 5 Issue 7, July 2016

A Review on Various Approaches of Video Steganography

Sapanpreet Kaur, Mandeep Kaur

Steganography is the art and science of invisible communication. In recent years, the rapid growth of information technology and digital communication has become very important to secure information transmission between the sender and receiver. Therefore, steganography introduces strongly to hide information and to communicate a secret data in an appropriate multimedia carrier, e.g., image, audio and video files. In this paper, a new algorithm for image steganography has been proposed to hide a large amount of secret data presented by secret color image. This algorithm is based on different size image segmentations (DSIS) and modified least significant bits (MLSB), where the DSIS algorithm has been applied to embed a secret image randomly instead of sequentially, this approach has been applied before embedding process. The number of bit to be replaced at each byte is non uniform, it bases on byte characteristics by constructing an effective hypothesis. The simulation results justify that the proposed approach is employed efficiently and satisfied high imperceptible with high payload capacity reached to four bits per byte.

Keywords: Steganography, image segmentation, LSB, MLSB, DSIS

Edition: Volume 5 Issue 7, July 2016

Pages: 1367 - 1370

Share this Article

How to Cite this Article?

Sapanpreet Kaur, Mandeep Kaur, "A Review on Various Approaches of Video Steganography", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART2016333, Volume 5 Issue 7, July 2016, 1367 - 1370

131 PDF Views | 107 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Steganography'

Views: 136 , Downloads: 99 | CTR: 73 % | Weekly Popularity: ⮙2

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1175 - 1178

Steganographic Method of Data Hiding using JPEG Images

Shabana Vathelil Subair, Fathima A Muhammadali

Share this Article

Views: 134 , Downloads: 101 | CTR: 75 % | Weekly Popularity: ⮙4

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1526 - 1530

A New Meaningful Adaptive Region Incrementing Visual Secret Sharing Based on Error Diffusion and Permutation Encoding with Cheating Prevention

Anju Mohan

Share this Article

Views: 137 , Downloads: 102 | CTR: 74 % | Weekly Popularity: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1537 - 1542

A Survey on Steganography Techniques

Amruta B. Bhojane, Priti A. Kodake

Share this Article

Views: 142 , Downloads: 102 | CTR: 72 % | Weekly Popularity: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1944 - 1949

A Review of Privacy Protection of Cloud Storage and Steganography Techniques

Alok Ranjan, Mansi Bhonsle

Share this Article

Views: 121 , Downloads: 103 | CTR: 85 % | Weekly Popularity: ⮙4

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2541 - 2544

Reversible Data Embedding using F5 Algorithm

Sanjivani Koli, N. B. Pokale

Share this Article

Similar Articles with Keyword 'image segmentation'

Views: 129 , Downloads: 102 | CTR: 79 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1602 - 1605

Usability of Cluster Based Co-Saliency in Video Foreground Detection

Merin Joseph, Anil A. R.

Share this Article

Views: 144 , Downloads: 102 | CTR: 71 % | Weekly Popularity: ⮙3

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1647 - 1650

MRI Brain Tumor Classification Using SVM and Histogram Based Image Segmentation

Chinnu A

Share this Article

Views: 142 , Downloads: 103 | CTR: 73 % | Weekly Popularity: ⮙2

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1830 - 1834

Figure-Ground Segmentation Techniques

Snehal P. Ambulkar, Nikhil S. Sakhare

Share this Article

Views: 136 , Downloads: 103 | CTR: 76 % | Weekly Popularity: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 7 Issue 9, September 2018

Pages: 1095 - 1102

Implementation on Feature Selection for Image Segmentation

Aditi Tiwari, Rupali Bhartiya

Share this Article

Views: 144 , Downloads: 104 | CTR: 72 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1611 - 1615

Image Segmentation Using Glowworm Swarm Optimization for Finding Initial Seed

Dr. L. Sankari

Share this Article

Similar Articles with Keyword 'LSB'

Views: 132 , Downloads: 102 | CTR: 77 % | Weekly Popularity: ⮙6

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 1062 - 1064

Enriching Process of Image Encryption and Compression Using Hierarchical Decomposition

Devashri Anil Vyawahare, Prof. Anil Gujar

Share this Article

Views: 137 , Downloads: 102 | CTR: 74 % | Weekly Popularity: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1537 - 1542

A Survey on Steganography Techniques

Amruta B. Bhojane, Priti A. Kodake

Share this Article

Views: 117 , Downloads: 103 | CTR: 88 % | Weekly Popularity: ⮙4

Research Paper, Computer Science & Engineering, Iraq, Volume 5 Issue 11, November 2016

Pages: 1654 - 1660

An Adaptive Use of Deffie Hellman Algorithm by Digital Images for Generating Secure Shared Key

Zainalabideen Abdullsamd Rasheed

Share this Article

Views: 123 , Downloads: 105 | CTR: 85 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1976 - 1979

Implementation of MLMS base Information Security in Combination with HLSB Data Hiding Method

Ekata S. Bele, Chetan Bawankar

Share this Article

Views: 120 , Downloads: 105 | CTR: 88 %

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 2101 - 2105

Implementation of Steganography with ETC System for Different Data Transmission

Gauri Chavan, S. S. Vairagar

Share this Article

Similar Articles with Keyword 'MLSB'

Views: 131 , Downloads: 107 | CTR: 82 % | Weekly Popularity: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1367 - 1370

A Review on Various Approaches of Video Steganography

Sapanpreet Kaur, Mandeep Kaur

Share this Article

Views: 122 , Downloads: 108 | CTR: 89 %

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3099 - 3106

Separable Reversible Data Hiding In Encrypted Image Using Modified Least Significant Bit and Virtual Embedding

Shreya M. S., Sandeep Kumar S

Share this Article

Views: 132 , Downloads: 111 | CTR: 84 % | Weekly Popularity: ⮙2

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 2024 - 2028

A Review on Various Approaches for Image Steganography

Urvashi, Amninder Kaur

Share this Article

Views: 131 , Downloads: 116 | CTR: 89 % | Weekly Popularity: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 626 - 631

Data Hiding In Digital Image Using MD5 and DES

Harsimranjeet Kaur

Share this Article

Views: 140 , Downloads: 119 | CTR: 85 % | Weekly Popularity: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 9, September 2016

Pages: 668 - 673

Secure Secret Information Transmission with Audio-Video Steganography Using Encryption and Data Authentication

Mandeep Singh, Garima Mahajan

Share this Article
Top