International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 147 | Views: 308

Survey Paper | Computer Science & Engineering | India | Volume 8 Issue 4, April 2019 | Popularity: 6.2 / 10


     

A Survey on Video Steganography

Angitha John, Anjana Baby


Abstract: For transmitting the secret data, security issues should be considered because hackers may use frail connection over correspondence system to take data. Steganography helps to send confidential data between two parties. Steganography can be classified as text, image, video and audio steganography. Video steganography is a field of steganography where videos are used to hide information. In a video steganography, we can hide large amount of data because it is the combination of image and sound. Therefore, image and audio steganography techniques can be occupied on the video. In this paper, we present a survey on different video steganography techniques.


Keywords: confidential, histogram, network, secret data, steganography, stego-file, motion vector


Edition: Volume 8 Issue 4, April 2019


Pages: 800 - 805



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Angitha John, Anjana Baby, "A Survey on Video Steganography", International Journal of Science and Research (IJSR), Volume 8 Issue 4, April 2019, pp. 800-805, https://www.ijsr.net/getabstract.php?paperid=ART20196891, DOI: https://www.doi.org/10.21275/ART20196891



Similar Articles

Downloads: 105

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1751 - 1754

Joining Delay; Packet Delivery and Limitations of EGMP

G. Anandhi, Dr. S. K. Srivatsa

Share this Article

Downloads: 90 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020

Pages: 1626 - 1628

Image Noise Reduction with Autoencoder using Tensor Flow

Jai Sehgal, Dr Yojna Arora

Share this Article

Downloads: 160 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Downloads: 190 | Weekly Hits: ⮙6 | Monthly Hits: ⮙6

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article



Top