International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 122

Research Paper | Electronics & Communication Engineering | India | Volume 2 Issue 11, November 2013


Encryption of Text File in a Video Using Adaptive Compression of Video

Y. Satheesh | Shaik Taj Mahaoob


Abstract: Steganography, is the art of providing security to text file by embedding into a carrier which can be a text or an multimedia file. This paper proposes a method for the real-time embedding of information in a compressed video. Unlike images Video files are generally a collection of images which can be more eligible than other multimedia files, because of its size and memory requirements. The great advantages of video files are the large amount of data that can be hidden inside and the fact that it is a moving stream of image. This paper provides a new technique that is motion vector is used to embed the data in the moving objects. We focus on the Least Significant Bit (LSB) technique is an important insertion technique for embedding data into video file and comparing the qualitative and quantitative performance of algorithms (compression).


Keywords: Steganography, video processing, Motion vectors, DCT, DWT, LSB


Edition: Volume 2 Issue 11, November 2013,


Pages: 348 - 351


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Y. Satheesh, Shaik Taj Mahaoob, "Encryption of Text File in a Video Using Adaptive Compression of Video", International Journal of Science and Research (IJSR), Volume 2 Issue 11, November 2013, pp. 348-351, https://www.ijsr.net/get_abstract.php?paper_id=14111301

Similar Articles with Keyword 'Steganography'

Downloads: 95

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2276 - 2281

Skin based Data hiding in Images by Using Haar and db2 DWT Techniques

Swapnali Zagade | Smita Bhosale

Share this Article

Downloads: 106

Research Paper, Electronics & Communication Engineering, India, Volume 4 Issue 6, June 2015

Pages: 801 - 804

A Steganography Implementation Based On DCT Algorithm By Using MATLAB GUI Function

Er. Yashpal Lather | Er. Megha Goyal

Share this Article
Top