Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Data Hiding Into Video Using Steganography

Author : Poonam Pate 1 Apurva Varade 2 Madhuri Aher 3 Pawan Pate 4

Date of Publication :7th February 2015

Abstract: This paper proposes a novel scheme to hide a data in video. Todays world is known as world of Internet, but exchanging data over internet is not secure. Many times problem arise related to data security. So to secure data (message) the concept of Steganography is used. In this system sender encode the data in video. & saves the data encoded video. Sender sends the video to receiver using exiting mail system. Receiver now decodes the data encoded in video. Data encoding & decoding into video can be done by using LSB Replacement / Substitution Techniques. There is no difference in a video & video encoded with data.

Reference :

    1. X. Zhang, ―Separable Reversible data hiding in encrypted image,‖ IEEE Trans. Inform. Forensics Security, vol. 7, no. 2, pp. 826– 832, Apr. 2012
    2. W. Liu, W. Zeng, L. Dong, and Q. Yao, ―Efficient compression of encrypted grayscale images,‖ IEEE Trans. Image Process., vol. 19, no. 4, pp. 1097–1102, Apr. 2010.
    3. X. Zhang, ―Lossy compression and iterative reconstruction for encrypted image,‖ IEEE Trans. Inform. Forensics Security, vol. 6, no. 1, pp. 53–58, Feb. 2011.
    4. Kessler, G. An Overview of Steganography for the Computer Forensics Examiner. [online] 2004 February. Available at http://www.garykessler.net/library/fsc_stego.html; Accessed on 02 July 2004
    5. M. Johnson, P. Ishwar, V. M. Prabhakaran, D. Schonberg, and K. Ramchandran, ―On compressing encrypted data,‖ IEEE Trans. Signal Process., vol. 52, no. 10, pp. 2992–3006, Oct. 2004.
    6. W. Liu, W. Zeng, L. Dong, and Q. Yao, ―Efficient compression of encrypted grayscale images,‖ IEEE Trans. Image Process., vol. 19, no. 4,pp. 1097–1102, Apr. 2010.
    7. X. Zhang, ―Lossy compression and iterative reconstruction for encrypted image,‖ IEEE Trans. Inform. Forensics Security, vol. 6, no. 1,pp. 53–58, Feb. 2011.
    8. T. Bianchi, A. Piva, and M. Barni, ―On the implementation of the discrete Fourier transform in the encrypted domain,‖ IEEE Trans. Inform. Forensics Security, vol. 4, no. 1, pp. 86–97, Feb. 2009
    9. T. Bianchi, A. Piva, and M. Barni, ―Composite signal representation for fast and storage-efficient processing of encrypted signals,‖ IEEE Trans. Inform. Forensics Security, vol. 5, no. 1, pp. 180–187, Feb. 2010
    10. N. Memon and P. W. Wong, ―A buyer-seller watermarking protocol,‖ IEEE Trans. Image Process., vol. 10, no. 4, pp. 643– 649, Apr. 2001.

Recent Article