International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064




Downloads: 109

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 11, November 2015


XOR Encryption Based Video Steganography

Ramandeep Kaur, Pooja


Abstract: In this paper, an XOR encryption based video steganography scheme is put forward which encrypts the text secret message (. txt) and hide it using 1LSB substitution method behind the random frames of video file (. avi). The main motive of this methodology is to protect the confidential information from the attackers by hiding its presence from the human visual system (HVS) and secure the text data from cyber criminals. There are several algorithms are proposed in previous works which are not enough capable to secure the hidden data and are not much efficient for embedding high amount data behind career medium. So this work is used for embedding high payload and to provide security to text data. The result values are simulated on the basis of quality metrics such as PSNR, MSE, BER and histogram analysis.


Keywords: Least Significant Bits LSB, Encryption, Payload Capacity, Human Visual System HVS, Embedding, Secret Message, Random and dynamic frame selection, Secret Key


Edition: Volume 4 Issue 11, November 2015,


Pages: 1467 - 1471


How to Cite this Article?

Ramandeep Kaur, Pooja, "XOR Encryption Based Video Steganography", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=NOV151495, Volume 4 Issue 11, November 2015, 1467 - 1471

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'Encryption'

Downloads: 119 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Similar Articles with Keyword 'Payload Capacity'

Downloads: 108

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1367 - 1370

A Review on Various Approaches of Video Steganography

Sapanpreet Kaur, Mandeep Kaur

Share this Article

Downloads: 125

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 2, February 2013

Pages: 59 - 66

Object Oriented Steganography using Skin Tone Detection and RSA Encryption Scheme

Aruna Mittal

Share this Article

Similar Articles with Keyword 'Embedding'

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 10, October 2021

Pages: 1137 - 1146

Time Series Visualization using Transformer for Prediction of Natural Catastrophe

Shivam Pandey, Mahek Jain

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 12, December 2021

Pages: 1257 - 1264

Digital Image Watermarking Technique Using Discrete Wavelet Transform and Discrete Cosine Transform

Bhupendra Ram

Share this Article

Similar Articles with Keyword 'Secret Message'

Downloads: 103

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1175 - 1178

Steganographic Method of Data Hiding using JPEG Images

Shabana Vathelil Subair, Fathima A Muhammadali

Share this Article

Downloads: 104

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1944 - 1949

A Review of Privacy Protection of Cloud Storage and Steganography Techniques

Alok Ranjan, Mansi Bhonsle

Share this Article

Similar Articles with Keyword 'Secret Key'

Downloads: 99

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2242 - 2246

Efficient and Secure Auditing of Cloud Data with Key -Updating

Niranjana S, Manjusha M S

Share this Article

Downloads: 101

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1525 - 1529

Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image

Maulik P. Chaudhari, Neha Parmar

Share this Article

Similar Articles with Keyword 'Least'

Downloads: 98

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1380 - 1385

Selecting Effectual Peers in P2P Webs for Task Calculating

Rajalakshmi.V, Gayathri, Swathi Durga, M. Narayanan

Share this Article

Downloads: 105

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 1062 - 1064

Enriching Process of Image Encryption and Compression Using Hierarchical Decomposition

Devashri Anil Vyawahare, Prof. Anil Gujar

Share this Article

Similar Articles with Keyword 'Significant'

Downloads: 156

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017

Pages: 338 - 384

Managing Uncertainty in Supply Chain Operating Cost Using Genetic Algorithm

Dr. Niju P. Joseph, Dr. Priyanka Surendran

Share this Article

Downloads: 0

Student Project, Computer Science & Engineering, India, Volume 11 Issue 1, January 2022

Pages: 455 - 459

Real World IoT Applications in Daily Domain

Eega Vivek Reddy, J Bala Krishna, Huzaifa Saad

Share this Article

Similar Articles with Keyword 'Bits'

Downloads: 2

Survey Paper, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 948 - 951

Survey on Various Image Segmentation Techniques

Babita Chauhan

Share this Article

Downloads: 6

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 314 - 318

Parkinson Disease Detection Using Machine Learning Algorithms

Yatharth Nakul, Ankit Gupta, Hritik Sachdeva

Share this Article

Similar Articles with Keyword 'LSB'

Downloads: 105

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 1062 - 1064

Enriching Process of Image Encryption and Compression Using Hierarchical Decomposition

Devashri Anil Vyawahare, Prof. Anil Gujar

Share this Article

Downloads: 107

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1976 - 1979

Implementation of MLMS base Information Security in Combination with HLSB Data Hiding Method

Ekata S. Bele, Chetan Bawankar

Share this Article
Top