Volume 1, Issue 1, 2021
Articles

Secure Communication through Data Hiding based on Video Steganography

R. Umadevi
Assistant Professor & Head, Department of Computer Science and Application, Vivekanandha College for Women, Unjanai, Namakkal, Tamilnadu

Published 2021-01-28

Keywords

  • Secure Communication, Steganography, Transmission, Embedding Capacity, Video.

How to Cite

Umadevi, R. (2021). Secure Communication through Data Hiding based on Video Steganography. Kristu Jayanti Journal of Computational Sciences (KJCS), 1(1), 77–82. https://doi.org/10.59176/kjcs.v1i1.2184

Abstract

In the rapid sharing system there are many kind of inputs like text, image, audio or video, but the user’s needs are mainly focused on secure communication over the internet and intranet. We well thought-out for this kind of problem and this research are conceded for improving the security sharing. I proposed the system called Unified Mesh Steganography (UMS) technique. In this techniques some modern fashion used for implementation and the experimental evaluations are made using MATLAB. The technique attains some parameters like Embedding Capacity Level (ECL) and Transmission Ratio Level (TRL).

Downloads

Download data is not yet available.

References

[1]. Yu et al, “Digital Watermarking Based on Neural Networks for Color Images”, Elsevier Signal Processing, 81 (2001), p.p. 663-671.

[2]. Wen-Jan Chen, Chin-Chen Chang, T. Hoang Ngan Le,” High payload steganography mechanism using hybrid edge detector”, Expert Systems with Applications, Elsevier, Mar 2010.

[3]. Weiqi Luo, Fangjun Huang, Member, and Jiwu Huang,” Edge Adaptive Image Steganography Based on LSB Matching Revisited”, IEEE Transactions On Information Forensics And Security, vol. 5, no. 2, June 2010.

[4] R.Umadevi, G.M.Nasira, “Secure Irreversible Rapid Fourier Transform For Secure Communication In Video Steganography, International Journal of Computational Intelligence and Informatics Vol. 5: No. 1, June 2015.

[5] R.Umadevi, G.M.Nasira, “Video Steganography Based on Hash Polynomial Function for Secure Communication”, Indian Journal of Science and Technology, Vol.8 (23), September 2015.

[6] Zhe-Ming Lu, Shi-Ze Guo,” Lossless Information Hiding in Images on the Spatial Domain” in Lossless Information Hiding in Images, 2017.

[7] Hiba Abdel-Nabi, Ali Al-Haj, “Frequency domain based data hiding for encrypted medical images“ in Intelligent Data Security Solutions for e-Health Applications, 2020.