CFP last date
20 December 2024
Reseach Article

Trends in Digital Video Steganography: A Survey

by Namrata Singh, Virendra Kumar Yadav
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 169 - Number 7
Year of Publication: 2017
Authors: Namrata Singh, Virendra Kumar Yadav
10.5120/ijca2017914786

Namrata Singh, Virendra Kumar Yadav . Trends in Digital Video Steganography: A Survey. International Journal of Computer Applications. 169, 7 ( Jul 2017), 6-18. DOI=10.5120/ijca2017914786

@article{ 10.5120/ijca2017914786,
author = { Namrata Singh, Virendra Kumar Yadav },
title = { Trends in Digital Video Steganography: A Survey },
journal = { International Journal of Computer Applications },
issue_date = { Jul 2017 },
volume = { 169 },
number = { 7 },
month = { Jul },
year = { 2017 },
issn = { 0975-8887 },
pages = { 6-18 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume169/number7/27995-2017914786/ },
doi = { 10.5120/ijca2017914786 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:16:43.872123+05:30
%A Namrata Singh
%A Virendra Kumar Yadav
%T Trends in Digital Video Steganography: A Survey
%J International Journal of Computer Applications
%@ 0975-8887
%V 169
%N 7
%P 6-18
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography is the science of hiding data by embedding it in cover files without altering it. The cover media may be text, image, voice or video streams in a digitized format. Steganography is used to prevent unauthorized users from becoming aware of the very existence of a message, let alone what it contains. These new techniques makes hidden message indistinguishable from the white noise. Even after suspicion of the presence of message, there is no proof of its existence. There are various methods to implement this, based on the cover file used. Image steganography is when an image is used as a cover file. Similarly, if video is used as the cover file, it is known as video steganography and similarly, text and audio techniques. The amount of data that can be effectively hidden in a given medium is restricted by the size of the medium itself. The fewer the constraints that exist on the integrity of the medium, the more potential it has for hiding data. This paper presents a survey on video steganography and its various techniques along with the applications, limitations and comparison.

References
  1. Manpreet Kaur, Amandeep Kaur (October 2014) Research Article / Survey Paper : Case Study On Improved Security Mechanism Of Text In Video Using Steganographic Technique. International Journal Of Advance Research In Computer Science And Management Studies,
  2. Hemalatha Sa. l , U. Dinesh Acharyaa , Renuka Aa Procedia B.V. Wavelet Transform Based Steganography Technique To Hide Audio Signals In Image. 47 ( 2015 ) 272 – 281 1877-0509 © 2015 Elsevier.
  3. Vipula Madhukar Wajgade, Dr. Suresh Kumar. Enhancing Data Security Using Video Steganography, International Journal Of Emerging Technology And Advanced Engineering Volume 3, Issue 4, April 2013.
  4. Heena Goyal, Preeti Bansal; Video Steganography Using Neural Network And Genetic Algorithm, International Journal Of Emerging Technology And Innovative Engineering Volume 1, Issue 9, September 2015 (Issn: 2394 – 6598)
  5. Miss. Rushvi Rajkumar Jaiswal, P.R.Pote Coem, Prof. Vijay B, Video Steganography: A Method For Providing Improved Security, International Journal On Recent And Innovation Trends In Computing And Communication ,IJRITCC, April 2016
  6. Dimple Lalwani, Manasi Sawant, Mitali Rane Vandana Jogdande, S.B.Ware, Secure Data Hiding In Audio-video Steganalysis By Anti-forensic Technique, International Journal Of Engineering And Computer Science Issn:2319-7242 Volume -5 Issue - 3 March, 2016 Page No. 15996-16000
  7. Savkar Tushar, Dhanak Prasad, Jadhav Gaurav, Salunke Sachin, Application Of Data Hiding In Audio-video Using Anti Forensics Technique For Authentication And Data , National Conf. on Recent Innovations in Science Engineering & Technology(NCRISET), 16th Nov.-2014, Pune, India,
  8. Praveen. P Arun. R, Audio-video Crypto Steganography Using Lsb Substitution And Advanced Chaotic Algorithm, International Journal Of Engineering Inventions E-issn: 2278-7461, P-issn: 2319-6491 Volume 4, Issue 2 (August 2014) Pp: 01-07.
  9. Aniket G Meshram And Prof Rahul Patil, Secure Secret Key Transfer Using Modified Hash Based Lsb Method (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (6) , 2014, 7683-7685.
  10. Prof. Dr. P. R. Deshmukh , Bhagyashri Rahangdale, Hash Based Least Significant Bit Technique For Video Steganography, Journal Of Engineering Research And Applications Www.Ijera.Com Issn : 2248-9622, Vol. 4, Issue 1( Version 3), January 2014, Pp.44-49.
  11. Kousik Dasgupta, J.K. Mandal And Paramartha Dutta, Hash Based Least Significant Bit Technique For Video Steganography(Hlsb). International Journal Of Security, Privacy And Trust Management ( Ijsptm), Vol. 1, No 2, April 2012 Doi : 10.5121/Ijsptm.2012.2201 1
  12. G.R.Manjula1 And Ajitdanti, A Novel Hash Based Least Significant Bit (2-3-3) Image Steganography In Spatial Domain, International Journal Of Security, Privacy And Trust Management (Ijsptm) Vol 4, No 1, February 2015 Doi : 10.5121/Ijsptm.2015.4102 11
  13. Rajalakshmi, Sowjanya, Hemanth kumar, Image Steganography Using H-lsb Technique For Hiding Image And Text Using Dual Encryption Method, Ssrg International Journal Of Electronics And Communication Engineering (Ssrg-ijece) – Volume 2 Issue 5 – May 2015 Issn: 2348 – 8549
  14. Anush Kolakalur, Ioannis Kagalidis, And Branislav Vuksanovic, Wavelet Based Color Video Steganography, Iacsit International Journal Of Engineering And Technology, Vol. 8, No. 3, June 2016.
  15. Barnali Gupta Banik, Prof. Samir K. Bandopadhyay; A Dwt Method For Image Steganography, International Journal Of Advanced Research In Computer Science And Software Engineering Volume 3, Issue 6, June 2013 Issn: 2277 128
  16. Abhinav Thakur, Harbinder Singh, Shikha Sharda; Secure Video Steganography Based On Discrete Wavelet Transform And Arnold Transform, International Journal Of Computer Applications (0975 – 8887) Volume 123 – No.11, August 2015.
  17. Abhinav Thakur Harbinder Singh Shikha Sharda Different Techniques Of Image And Video Steganography: A Review, Volume 2, Spl. Issue 2 (2015) E-issn: 1694-2310 | P-issn: 1694-2426.
  18. Sumeet Gupta Dr. Namrata Dhanda; Audio Steganography Using Discrete Wavelet Transformation(Dwt) & Discrete Cosine Transformation (Dct), Iosr Journal Of Computer Engineering (Iosr-jce) E-issn: 2278-0661,P-issn: 2278-8727, Volume 17, Issue 2, Ver. V (Mar – Apr. 2015), Pp 32-44.
  19. Shivani Khosla, Secure Data Hiding Technique Using Video Steganography And Watermarking, International Journal Of Computer Applications (0975 – 8887) Volume 95– No.20, June 2014.
  20. Sherly A P And Amritha P P, A Compressed Video Steganography Using Tpvd, International Journal Of Database Management Systems ( Ijdms ) Vol.2, No.3, August 2010 Doi : 10.5121/Ijdms.2010.2307 67.
  21. Pooja Shinde and Tasneem Bano Rehman; A Novel Video Steganography Technique, Volume 5, Issue 12, December 2015 Issn: 2277 128x International Journal Of Advanced Research In Computer Science And Software Engineering.
  22. Bharti Chandel, Dr. Shailey Jain ; Video Steganography :A Survey; Iosr Journal Of Computer Engineering (Iosr-jce) E-issn: 2278-0661,P-issn: 2278-8727, Volume 18, Issue 1, Ver. iii (Jan – Feb. 2016), Pp 11-17.
  23. Hemant Gupta, Dr. Setu Chaturvedi; Video Data Hiding Through Lsb Substitution Technique, Research Inventy: International Journal Of Engineering And Science Vol.2, Issue 10 (April 2013), Pp 32-39 Issn(E): 2278-4721, Issn(P):2319-6483.
  24. Regunathan Radhakrishnan, Mehdi Kharrazi And Nasir Memon, Data Masking: A New Approach For Steganography, Volume 4, Issue 5, May 2014 Issn: 2277 128x International Journal Of Advanced Research In Computer Science And Software Engineering Research.
  25. Hemang A. Prajapati , Dr. Nehal G. Chitaliya; Secured And Robust Dual Image Steganography: A Survey, International Journal Of Innovative Research In Computer And Communication Engineering (An Iso 3297: 2007 Certified Organization) Vol. 3, Issue 1, January 2015.
  26. Root Souvik Roya, P.Venkateswaranb, Modeling Techniques And Applications (Cimta) 2013 A Text Based Steganography Technique With Indian, International Conference On Computational Intelligence.
  27. Arun Kejariwal, Paolo D’alberto Alexandru Nicolau Constantine, A Geometric Approach For Partitioning N-dimensional Non-rectangular Iteration Spaces, D. Polychronopoulos Center For Embedded Computer Systems University Of California At Irvine Irvine, Ca 92697, 2005
  28. Pritish Bhautmage, Prof. Amutha Jeyakumar, Ashish Dahatonde, Digital Steganographic Encoder Advanced Video Steganography Algorithm, International Journal Of Engineering Research And Applications (Ijera) Issn: 2248-9622 Vol. 3, Issue 1, January -february 2013, Pp.1641-1644 .
  29. Ms. Pooja Vilas Shinde, Dr.Tasneem Bano Rehman, A Survey : Video Steganography Techniques, International Journal Of Engineering Research And General Science Volume 3, Issue 3, May-june, 2015 Issn 2091-2730 1457.
  30. Pravin R. Kamble, Prakash S. Waghamode, Vilas S Gaikwad, Ganesh B. Hogade; Steganography Techniques: A Review, International Journal Of Engineering Research & Technology (Ijert) Issn: 2278-0181 Vol. 2 Issue 10, October 2013.
  31. Mehdi Hussain And Mureed Hussain Shaheed Zulfiqar Ali Bhutto, A Survey Of Image Steganography Techniques, International Journal Of Advanced Science And Technology Vol. 54, May, 2013.
  32. Abbas Cheddad, Joan Condell, Kevin Curran And Paul Mc Kevitt Digital “Image Steganography: Survey And Analysis Of Current Methods” Volume 90, Issue 3, March 2010 Page 727.
  33. Mrudul Dixit, Nikita Bhide, Sanika Khankhoje, Rajashwini Ukarande, Video Steganography, International Conference On Pervasive Computing (Icpc), 2015.
  34. Arvind Kumar, Km. Pooja; Steganography- A Data Hiding Technique, International Journal Of Computer Applications (0975 – 8887), Volume 9– No.7, November 2010.
  35. Sabu M Thampi, Information Hiding Techniques: A Tutorial Review, Sabu M Thampi . ISTE-STTP on Network Security & Cryptography, LBSCE 2004.
  36. Bharti Chandel, Dr.Shaily Jain, Video Steganography: A Survey, IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 1, Ver. III (Jan – Feb. 2016), PP 11-17
Index Terms

Computer Science
Information Sciences

Keywords

Discrete wavelet transform Distortion technique Hash-LSB Embedding payload Network steganography Steganography Stego-Video.