We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

The Non-Tangible Masking of Confidential Information using Video Steganography

by Ramandeep Kaur, Pooja, Varsha
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 119 - Number 17
Year of Publication: 2015
Authors: Ramandeep Kaur, Pooja, Varsha
10.5120/21159-4187

Ramandeep Kaur, Pooja, Varsha . The Non-Tangible Masking of Confidential Information using Video Steganography. International Journal of Computer Applications. 119, 17 ( June 2015), 19-26. DOI=10.5120/21159-4187

@article{ 10.5120/21159-4187,
author = { Ramandeep Kaur, Pooja, Varsha },
title = { The Non-Tangible Masking of Confidential Information using Video Steganography },
journal = { International Journal of Computer Applications },
issue_date = { June 2015 },
volume = { 119 },
number = { 17 },
month = { June },
year = { 2015 },
issn = { 0975-8887 },
pages = { 19-26 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume119/number17/21159-4187/ },
doi = { 10.5120/21159-4187 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:04:18.191217+05:30
%A Ramandeep Kaur
%A Pooja
%A Varsha
%T The Non-Tangible Masking of Confidential Information using Video Steganography
%J International Journal of Computer Applications
%@ 0975-8887
%V 119
%N 17
%P 19-26
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Video Steganography is a new research area which is playing an important role in information hiding criteria. Nowadays security of confidential information is major issue over the internet. To protect the secret information from cyber criminals like attackers, hackers and data thefts, a secure and standardized methodology is used that is known as steganography. It is beneficial for society to secure private data from being misused by unauthorized person. It is used for providing authentication to right users. For example, we can protect our confidential emails from our rivals over network using steganography concept. In this paper, we present a basic review about video steganography. Our aim is to provide a full-fledged knowledge about the basis of video steganography. This paper includes basic information about video steganography, its techniques and steganalysis with all type of attacks and applications of steganography in real life.

References
  1. Sunil. K. Moon, Rajeshree. D. Raut, "Analysis of Secured Video Steganography Using Computer Forensics Technique for Enhance Data security", IEEE Second International Conference on image information processing, pp 660-665, 2013.
  2. K. Parvathi Divya, K. Mahesh, "Various Techniques in Video Steganography-A Review", International Journal of Computer & organization Trends, Vol. 5, pp 8-10, February 2014.
  3. Hemant Gupta, Setu Chaturvedi, "Video Steganography through LSB Based Hybrid Approach", International Journal of Computer Science and Network Security, Vol. 14, Issue 3, pp 99-106, March 2014.
  4. Mehdi Hussain and Mureed Hussain, "A Survey of Image Steganography Techniques", International Journal of Advanced Science and Technology, Vol. 54, pp 113-124, May, 2013.
  5. Babloo Saha and Shuchi Sharma. , "Steganographic Techniques of Data Hiding using Digital Images", Defense Science Journal, Vol. 62, Issue 1, January 2012, pp 11-18.
  6. A. Swathi 1, Dr. S. A. K Jilani, "Video Steganography by Substitution Using Different Polynomial Equations", International Journal of Computational Engineering Research, Vol. 2, Issue 5, September 2012.
  7. Geetha C. R. , H. D. Giriprakash, "Image Steganography by Variable Embedding and Multiple Edge Detection using Canny Operator", International Journal of computer Applications, Vol. 48, Issue 16, June 2012.
  8. Saurabh Singh, Ashutosh Datar, "Improved Hash Based Approach for Secure Color Image Steganography using Canny Edge Detection Method", International Journal of Computer Science and Network Security, Vol. 14, Issue 7, (July. 2014).
  9. K. V. Vinodkumar, V. Lokeswara Reddy, "A Novel Data Embedding Technique for Hiding Text in Video File using Steganography", International Journal of Computer Applications, Vol. 77, Issue 17, September 2013.
  10. M. Pavani, S. Naganjaneyulu, C. Nagaraju, "A Survey on LSB Based Steganography Methods", International Journal of Engineering and Computer Science, Vol. 2, Issue 8, August 2013 pp. 2464-2467.
  11. K. Naveen BrahmaTeja1, Dr. G. L. Madhumati 2, K. Rama Koteswara, "Data Hiding Using EDGE Based Steganography", International Journal of Emerging Technology and Advanced Engineering, Vol. 2, Issue 11, November 2012.
  12. Souvik Bhattacharyya, Indradip Banerjee and Gautam Sanyal, "A Survey of Steganography and Steganalysis Technique in Image, Text, Audio and Video as Cover Carrier", Journal of Global Research in Computer Science, Vol. 2, Issue 4, April 2011.
  13. Neethu Prabhakaran, D. Shanthi, "A New Cryptic Steganographic Approach using Video Steganography", International Journal of Computer Applications, Vol. 49, Issue 7, July 2012.
  14. Dimple Anandpara, Amit D. Kothari, "Working and Comparative Analysis of Various Spatial based Image Steganography Techniques", International Journal of Computer Applications, Vol. 113, Issue 12, March 2015.
  15. M. Jyotheeswari, V. Lokeswara Reddy, "A Novel Steganographic System for Data Hiding in Video/Audio", International Journal of Computer Application, Vol. 82, Issue 11, November 2013.
  16. Ranjeet Kumar Singh, Shikha Gupta, and Deepak Gupta, "A Secure Authentication Technique using Edge Detection in Watermarking", International Journal of Computer Applications, Vol. 61, Issue 11, January 2013.
  17. Anjula Gupta, Navpreet Kaur Walia, "A Survey on Data Hiding and Steganographic Techniques", International Journal for Scientific Research & Development, Vol. 2, Issue 2, 2014.
  18. Parul, Manju and Dr. Harish Rohil, "Optimized Image Steganography using Discrete Wavelet Transform (DWT)", International Journal of Recent Development in Engineering and Technology, Vol. 2, Issue 2, February 2014.
  19. Shivani Khosla, Paramjeet Kaur, "Secure Data Hiding Technique Using Video Steganography and Watermarking", International Journal of Computer Applications, Vol. 95, Issue 20, June 2014.
  20. Pooja Yadav, Nishchol Mishra, Sanjeev Sharma," A Secure Video Steganography with Encryption Based on LSB Technique", IEEE International Conference on Computational Intelligence and Computing Research, 2013.
  21. Arijit Basu, Gaurav Kumar, Soumyajit Sarkar, "A Video Steganography approach using Random Least Significant Bit Algorithm", International Journal of Science and Research (IJSR), Vol. 3, Issue 6, June 2014.
  22. Vijay Kumar Sharma, Vishal Shrivastva, "A steganography algorithm for hiding image in image improved LSB substitution by minimize Detection", Journal of Theoretical and Applied Information Technology, Vol. 36, Issue 1, February 2012.
  23. Atallah M. Al-Shatnawi, "A New Method in Image Steganography with Improved Image Quality", Applied Mathematical Sciences, Vol. 6, Issue 79, pp . 3907 – 3915, 2012.
  24. Mamta Juneja and Parvinder Singh Sandhu, "Improved LSB based Steganography Techniques for Color Images in Spatial Domain", International Journal of Network Security, Vol. 16, No. 6, pp. 452-462, Nov. 2014.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Watermarking Cryptography LSB DCT DWT Steganalysis attacks.