CFP last date
20 May 2024
Reseach Article

Secure Video Transmission

by Manveen Kaur, Anchal Maheshwari, Nidhi Anand
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 116 - Number 8
Year of Publication: 2015
Authors: Manveen Kaur, Anchal Maheshwari, Nidhi Anand
10.5120/20360-2562

Manveen Kaur, Anchal Maheshwari, Nidhi Anand . Secure Video Transmission. International Journal of Computer Applications. 116, 8 ( April 2015), 35-37. DOI=10.5120/20360-2562

@article{ 10.5120/20360-2562,
author = { Manveen Kaur, Anchal Maheshwari, Nidhi Anand },
title = { Secure Video Transmission },
journal = { International Journal of Computer Applications },
issue_date = { April 2015 },
volume = { 116 },
number = { 8 },
month = { April },
year = { 2015 },
issn = { 0975-8887 },
pages = { 35-37 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume116/number8/20360-2562/ },
doi = { 10.5120/20360-2562 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:56:35.391562+05:30
%A Manveen Kaur
%A Anchal Maheshwari
%A Nidhi Anand
%T Secure Video Transmission
%J International Journal of Computer Applications
%@ 0975-8887
%V 116
%N 8
%P 35-37
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Nowadays, as the technology has developed, methods need to be found out that not only hide the information but also hide the existence of that information. The art of hiding information is known as steganography. Till now many algorithms have been proposed for steganography but they suffer few or more drawbacks. This paper uses F5 algorithm for information hiding. F5 offers huge capacity for steganography. F5 is based on matrix encoding. The proposed system is evaluated on the basis of its ability to hide and retrieve the information correctly. In recent days video steganography is considered as a boon for secure and secret transmission of data. The main aim of this paper is to provide new ways of improving the existing methodologies to hide information. In continuation with this, we start by first describing the previously used algorithms and then enhancing them by describing the use of F5.

References
  1. Ross J. Anderson and Fabien A. P. Petit colas, "On the limits of steganography," IEEE Journal on Selected Areas in Communications(J-SAC), Special Issue on Copyright & Privacy Protection, vol. 16 no. 4, pp 474-481, May 1998.
  2. T Mrkel,JHP Eloff and MS Olivier. "An Overview Of Image Steganography," in Proceedings of the fifth annual Information Security South Africa Conference, 2005.
  3. B. Chen and G. W. Wornell. Quantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding. In IEEE Trans. Information Theory, volume 47, no. 4, pages 1423–1443, 2001.
  4. Johnson N. and Jajodia S. , "Steganography: Seeing the Unseen," IEEE Computer Magazine, vol. 25 , no. 4, pp. 26-34,1998.
  5. Simon Singh. The code book. In Fourth Estate, London, 1999.
  6. Bruce Schneier. Applied Cryptography: Protocols, Algorithms, and Source Code in C. In Wiley, 2nd Edition, 1994.
  7. Wenbo Mao. Modern cryptography: Theory and practice. Prentic Hall, 1st edition, 2003.
  8. C. Xu, X. Ping, and T. Zhang. Steganography in compressed video stream. In Innovative Computing, Information and Control, 2006. ICICIC'06. First International Conference on, volume 1, pages 269–272. IEEE, 2006.
  9. N. Johnson. Steganography, George Mason University. Information System and Software Engineering, www. jjtc. com/stegdoc/steg1995. html, 1995.
  10. ShengDun Hu,"Novel Video Steganography based on Non-uniform Rectangular Partition" Proceedings of International Conference on Computational Science and Engineering, pp. 57-61, 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Cryptography F5 algorithm.