XOR Encryption Based Video Steganography
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 11, November 2015

XOR Encryption Based Video Steganography

Ramandeep Kaur, Pooja

In this paper, an XOR encryption based video steganography scheme is put forward which encrypts the text secret message (.txt) and hide it using 1LSB substitution method behind the random frames of video file (.avi). The main motive of this methodology is to protect the confidential information from the attackers by hiding its presence from the human visual system (HVS) and secure the text data from cyber criminals. There are several algorithms are proposed in previous works which are not enough capable to secure the hidden data and are not much efficient for embedding high amount data behind career medium. So this work is used for embedding high payload and to provide security to text data. The result values are simulated on the basis of quality metrics such as PSNR, MSE, BER and histogram analysis.

Keywords: Least Significant Bits LSB, Encryption, Payload Capacity, Human Visual System HVS, Embedding, Secret Message, Random and dynamic frame selection, Secret Key

Edition: Volume 4 Issue 11, November 2015

Pages: 1467 - 1471

Share this Article

How to Cite this Article?

Ramandeep Kaur, Pooja, "XOR Encryption Based Video Steganography", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV151495, Volume 4 Issue 11, November 2015, 1467 - 1471

107 PDF Views | 76 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Encryption'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 470 - 478

Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT

Aditya Tiwari, Ayush Pandey

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1812 - 1814

A Survey on Deduplication Scheme in Cloud Storage

Deepa.D, Revathi.M

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1270 - 1273

A Review of Pairwise Key Establishment Techniques for Wireless Sensor Networks

Shishir Sharma, Gajendra Singh Chandel

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1737 - 1740

Enabling Data Dynamics and Achieving Access Control and Assured Deletion in Cloud

Nilam Musale, Vilas Gaikwad

Share this Article

Similar Articles with Keyword 'Payload Capacity'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1467 - 1471

XOR Encryption Based Video Steganography

Ramandeep Kaur, Pooja

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1367 - 1370

A Review on Various Approaches of Video Steganography

Sapanpreet Kaur, Mandeep Kaur

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 2, February 2013

Pages: 59 - 66

Object Oriented Steganography using Skin Tone Detection and RSA Encryption Scheme

Aruna Mittal

Share this Article

Research Paper, Computer Science & Engineering, Myanmar, Volume 8 Issue 3, March 2019

Pages: 1516 - 1520

Secure Data Transmission of Video Steganography by Hashing Pixel Values with DWT

Hnin Lai Nyo, Aye Wai Oo

Share this Article

Similar Articles with Keyword 'Embedding'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 470 - 478

Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT

Aditya Tiwari, Ayush Pandey

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2081 - 2083

Survey of Approximate Shortest Distance Computing Using Improved Shortest Path Tree

Sonali Malode, Mansi Bhonsle

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1175 - 1178

Steganographic Method of Data Hiding using JPEG Images

Shabana Vathelil Subair, Fathima A Muhammadali

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1467 - 1471

XOR Encryption Based Video Steganography

Ramandeep Kaur, Pooja

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1130 - 1132

Survey On: Reversible Data Hiding in Encrypted JPEG Images

N. B. Pokale, Sanjivani S. Koli

Share this Article

Similar Articles with Keyword 'Secret Message'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1175 - 1178

Steganographic Method of Data Hiding using JPEG Images

Shabana Vathelil Subair, Fathima A Muhammadali

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1467 - 1471

XOR Encryption Based Video Steganography

Ramandeep Kaur, Pooja

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2352 - 2357

RS and OFDM Methods Over Encrypted and Data Embedded Video Streams

Jithya J. Prakash, Hemand E. P.

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1944 - 1949

A Review of Privacy Protection of Cloud Storage and Steganography Techniques

Alok Ranjan, Mansi Bhonsle

Share this Article

Research Paper, Computer Science & Engineering, Iraq, Volume 4 Issue 1, January 2015

Pages: 1367 - 1372

Comparative Study for Steganography Techniques

Zainalabideen Abdual Samad Rasheed

Share this Article

Similar Articles with Keyword 'Secret Key'

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1270 - 1273

A Review of Pairwise Key Establishment Techniques for Wireless Sensor Networks

Shishir Sharma, Gajendra Singh Chandel

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1436 - 1439

Secure Transmission in Ad-hoc Network: Using Combined Cryptography

Nilesh T Patil

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1467 - 1471

XOR Encryption Based Video Steganography

Ramandeep Kaur, Pooja

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2242 - 2246

Efficient and Secure Auditing of Cloud Data with Key -Updating

Niranjana S, Manjusha M S

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1525 - 1529

Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image

Maulik P. Chaudhari, Neha Parmar

Share this Article
Top