Downloads: 147 | Views: 308
Survey Paper | Computer Science & Engineering | India | Volume 8 Issue 4, April 2019 | Popularity: 6.2 / 10
A Survey on Video Steganography
Angitha John, Anjana Baby
Abstract: For transmitting the secret data, security issues should be considered because hackers may use frail connection over correspondence system to take data. Steganography helps to send confidential data between two parties. Steganography can be classified as text, image, video and audio steganography. Video steganography is a field of steganography where videos are used to hide information. In a video steganography, we can hide large amount of data because it is the combination of image and sound. Therefore, image and audio steganography techniques can be occupied on the video. In this paper, we present a survey on different video steganography techniques.
Keywords: confidential, histogram, network, secret data, steganography, stego-file, motion vector
Edition: Volume 8 Issue 4, April 2019
Pages: 800 - 805
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 105
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1751 - 1754Joining Delay; Packet Delivery and Limitations of EGMP
G. Anandhi, Dr. S. K. Srivatsa
Downloads: 90 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020
Pages: 1626 - 1628Image Noise Reduction with Autoencoder using Tensor Flow
Jai Sehgal, Dr Yojna Arora
Downloads: 160 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017
Pages: 868 - 874Study of Power Management in Adhoc Networks
Anandhi Giri, S. K. Srivatsa
Downloads: 190 | Weekly Hits: ⮙6 | Monthly Hits: ⮙6
Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018
Pages: 81 - 84Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey
Priyanka H, Dr. Mary Cherian
Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 2246 - 2249Packet Analysis with Network Intrusion Detection System
Rashmi Hebbar, Mohan K