International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 147

Survey Paper | Computer Science & Engineering | India | Volume 8 Issue 4, April 2019


A Survey on Video Steganography

Angitha John | Anjana Baby


Abstract: For transmitting the secret data, security issues should be considered because hackers may use frail connection over correspondence system to take data. Steganography helps to send confidential data between two parties. Steganography can be classified as text, image, video and audio steganography. Video steganography is a field of steganography where videos are used to hide information. In a video steganography, we can hide large amount of data because it is the combination of image and sound. Therefore, image and audio steganography techniques can be occupied on the video. In this paper, we present a survey on different video steganography techniques.


Keywords: confidential, histogram, network, secret data, steganography, stego-file, motion vector


Edition: Volume 8 Issue 4, April 2019,


Pages: 800 - 805


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Angitha John, Anjana Baby, "A Survey on Video Steganography", International Journal of Science and Research (IJSR), Volume 8 Issue 4, April 2019, pp. 800-805, https://www.ijsr.net/get_abstract.php?paper_id=ART20196891

Similar Articles with Keyword 'confidential'

Downloads: 0

Informative Article, Computer Science & Engineering, United States of America, Volume 13 Issue 3, March 2024

Pages: 422 - 426

Enhancing Cybersecurity in Cloud - Based Banking - Best Practices and Technologies

Ravi Jagadish [2]

Share this Article

Downloads: 0

Informative Article, Computer Science & Engineering, India, Volume 11 Issue 8, August 2022

Pages: 1497 - 1500

Innovative Approach to Mitigate Man-in-the-Middle Attacks in Secure Communication Channels

Arnab Dey [7]

Share this Article
Top