Downloads: 118 | Views: 279
Research Paper | Computer Science & Engineering | India | Volume 3 Issue 6, June 2014 | Popularity: 6.3 / 10
A Video Steganography Approach using Random Least Significant Bit Algorithm
Arijit Basu, Gaurav Kumar, Soumyajit Sarkar
Abstract: Steganography is the art of hiding information. It is derived from the Greek word Steganos which means covered writing; a science of secret communication. It is a tool for hiding information in a medium so that the information does not appear to exist. The idea of data hiding is not a novelty; it has been used for centuries all across the world under different regimes- but to date it is still unknown to most people. It is a tool for hiding information so that it does not even appear to exist. However Steganography operates at more complex level as detection is dependent on recognizing the underlying hidden data. The message to be hidden is known as the embedded data; the medium for hiding is known as the cover medium and the encoded medium is known as the stego-object. In this paper we present a video steganographic process using the Random Least Significant Bit algorithm and hence perform a careful analysis of the same with the Sequential Least Significant Bit algorithm.
Keywords: Steganography, Steganalysis, LSB, RLSB, RGB, PSNR, MSE
Edition: Volume 3 Issue 6, June 2014
Pages: 1811 - 1816
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 656 | Views: 2002
Computer Science & Engineering, India, Volume 9 Issue 7, July 2020
Pages: 1454 - 1458Heart Disease Prediction with Machine Learning Approaches
Megha Kamboj
Downloads: 401 | Views: 719
Computer Science & Engineering, India, Volume 7 Issue 11, November 2018
Pages: 1951 - 1955Hadoop Performance Improvement using Metadata and Securing with Oauth Token
Swapnali A. Salunkhe, Amol B. Rajmane
Downloads: 386 | Views: 700
Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1 - 3Comparative Study of Conventional Desktop Computer and Compute Stick
Aadarsh Sooraj, Sooraj G.
Downloads: 354 | Views: 698
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 629 - 632Review Paper on Secure Hashing Algorithm and Its Variants
Priyanka Vadhera, Bhumika Lall
Downloads: 336 | Views: 688
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2148 - 2152The Impact and Application of 3D Printing Technology
Thabiso Peter Mpofu, Cephas Mawere, Macdonald Mukosera