Comparative Study on different Video HidingTechniques
P.Saravanan 1 , K. K. Thyagarajan2
Section:Research Paper, Product Type: Journal Paper
Volume-6 ,
Issue-11 , Page no. 497-502, Nov-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i11.497502
Online published on Nov 30, 2018
Copyright © P.Saravanan, K. K. Thyagarajan . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: P.Saravanan, K. K. Thyagarajan, “Comparative Study on different Video HidingTechniques,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.497-502, 2018.
MLA Style Citation: P.Saravanan, K. K. Thyagarajan "Comparative Study on different Video HidingTechniques." International Journal of Computer Sciences and Engineering 6.11 (2018): 497-502.
APA Style Citation: P.Saravanan, K. K. Thyagarajan, (2018). Comparative Study on different Video HidingTechniques. International Journal of Computer Sciences and Engineering, 6(11), 497-502.
BibTex Style Citation:
@article{Thyagarajan_2018,
author = {P.Saravanan, K. K. Thyagarajan},
title = {Comparative Study on different Video HidingTechniques},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {11 2018},
volume = {6},
Issue = {11},
month = {11},
year = {2018},
issn = {2347-2693},
pages = {497-502},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3195},
doi = {https://doi.org/10.26438/ijcse/v6i11.497502}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i11.497502}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3195
TI - Comparative Study on different Video HidingTechniques
T2 - International Journal of Computer Sciences and Engineering
AU - P.Saravanan, K. K. Thyagarajan
PY - 2018
DA - 2018/11/30
PB - IJCSE, Indore, INDIA
SP - 497-502
IS - 11
VL - 6
SN - 2347-2693
ER -
VIEWS | XML | |
572 | 305 downloads | 251 downloads |
Abstract
In general, the data or information hiding mechanism with different perspective is a recent trend in the video data hiding and protection on-going research issues. For the most part of the video data hiding focuses on video content in different phases with modern cryptographic algorithms in order to secure from unauthorized access over the communication channel or network. In our previous research work contemplate its focuses on the data or textual content hiding mechanism over the content sharing among different clients through networks. The objective of the previous research is achieved with the help of data compression mechanism and hiding aspect in new direction regarding to protect the multimedia data content. This research paper describes the progress in the field of video steganography and intends to give the comparison between its different uses and techniques.
Key-Words / Index Term
Multimedia, Data, Content, Hiding and Compression
References
[1] Ramandeep Kaur, Pooja, “XOR Encryption Based Video Steganography”, International Journal of Science and Research (IJSR), Vol.4, Issue 11, November 2015.
[2] Pooja Jain and Navdeep Kanwal, “Image Steganography in RGB Color Components using Improved LSB Technique Image Pattern Compression using Weighted Principal Components Algorithm”, Indian Journal of Science and Technology, 9(45), 2016.
[3] J. Jeswani and D. T. Sarode, “A New DCT based Color Video Watermarking using Luminance Component,” IOSR Journal of Computer Engineering (IOSR-JCE), vol.16, no.2, pp. 83–90, 2014.
[4] S.R.Hallur, S. Kuri, G. S. Sudi, and D. G.H.Kulkarni, “A Robust Digital Watermarking For Gray Scale Image,” International Journal For Technological Research In Engineering, vol.2, no. 10, pp. 2440–2443,2015.
[5] O. S. Faragallah, “Efficient video watermarking based on singular value decomposition in the discrete wavelet transform domain,” AEU - International Journal of Electronics and Communications, vol.67, no.3, pp.189–196,2013.
[6]. R. J. Mstafa and K. M. Elleithy, “ A highly secure video stegnography using Hamming code (7, 4)” in Systems, Applications and Technology Conference (LISAT), 2014 IEEE Long Island, 2014, pp.1-6
[7]. Ms. Pooja Vilas Shinde and Dr. Tasneem Bano Rehman, “A Survey: Video Stegnography techniques” in International Journal of Engineering Research and General Science Volume 3, Issue 3, May-June, 2015 ISSN 2091-2730.
[ 8]. Syeda Musfia Nasreen,et al.,“A Study on Video Stegnography Techniques” in International Journal of Computational Engineering Research (IJCER), Vol 05, Issue 10, October–2015, ISSN (e): 2250–3005.
[9] H. Almara`beh “Steganography Techniques - Data Security Using Audio and Video” International Journal of Advanced Research in Computer Science and Software Engineering Volume 6, Issue 2, pp.45-50, February 2016.
[10] S. Kamesh, K. Durga Devi, S. N. V. P. Raviteja, “DWT based data hiding using video steganography”, International journal of engineering sciences & research technology, pp.361-367, 2017.
[11] Disha and K.Saini. "A review on video steganography techniques in spatial domain" IEEE Conference on Recent Developments in Control, Automation & Power Engineering , Noida, India, 2017.
[12] D. B. Suryawanshi and S. S. Belsare “An Efficient Implementation of Video Steganography on FPGA using DWT and LSB Algorithm”, International Journal of Scientific & Engineering Research, Vol.7, Issue.5, pp.450-453, 2016.
[13] Kousik Dasgupta, J.K. Mandal and Paramartha Dutta,” Hash based Least Significant Bit Technique”, International Journal of Security, Privacy and Trust Management ( IJSPTM), Vol. 1, No 2, April 2012
[14] A. Swathi, Dr. S.A.K Jilani,, “Video Steganography by LSB Substitution Using Different Polynomial national Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 5
[15] Mritha Ramalingam: Stego Machine – Video Steganography using Modified LSB Algorithm World Academy of Science, Engineering and Technology Vol:50 2011-02-26
[16] Ashawq T. Hashim*, Dr.Yossra H. Ali** & Susan S. Ghazoul*” Developed Method of Information Hiding in Video AVI File Based on Hybrid Encryption and Steganography” Engg.and tech journal, vol 29,No.2,2011.