AbstractThis paper proposes a novel video steganography scheme for efficient and effective information hiding. In this era of Internet communication video is considered to be an effective and important tool for communication. Video steganography uses video as cover media for embedding secret data. A 3-3-2 LSB based scheme has been used as a base technique for video steganography. Imperceptibility and video quality are supposed to be two key parameters for deciding goodness of any steganographic scheme. Thus the base technique is enhanced using Genetic Algorithm (GA) which thrives to get an optimal imperceptibility of hidden data. An anti-steganalysis test is used to check for the innocence of the frame with respect to original frame. Experi...
AbstractThere is a large need of internet applications that requires data to be transmitted in a mor...
Steganography is the method employed to prevent unsolicited access and malicious use of sensitive in...
Internet simplified digital data transferring. This data needs to be secured; so securing digital da...
AbstractThis paper proposes a novel video steganography scheme for efficient and effective informati...
Abstract- This paper presents a comparison between un-optimized and optimized video steganography. I...
Currently, data such as text, images and video are very important. Therefore, data must be secured f...
The growth of high speed computing devices and Internet has made the Data communication very easy an...
This paper devotes itself to the study of secret message delivery using cover image and introduces a...
Now a day, it's terribly risky to handle the information in web against intruders. Information is mo...
In this study, a steganography method on digital images as anti-forensics by utilizing genetic algor...
Steganography is the art of hiding data in a cover medium such that the existence of the data remain...
Today, the digital and social media platforms are extremely trending, leading a demand to transmit k...
This paper applies steganography algorithm in videos. In proposed method we are hiding the data in a...
AbstractDue to the fast advancement of internet and digital technology, secured transmission of data...
Steganography is the idea of hiding private or sensitive data or information within something that a...
AbstractThere is a large need of internet applications that requires data to be transmitted in a mor...
Steganography is the method employed to prevent unsolicited access and malicious use of sensitive in...
Internet simplified digital data transferring. This data needs to be secured; so securing digital da...
AbstractThis paper proposes a novel video steganography scheme for efficient and effective informati...
Abstract- This paper presents a comparison between un-optimized and optimized video steganography. I...
Currently, data such as text, images and video are very important. Therefore, data must be secured f...
The growth of high speed computing devices and Internet has made the Data communication very easy an...
This paper devotes itself to the study of secret message delivery using cover image and introduces a...
Now a day, it's terribly risky to handle the information in web against intruders. Information is mo...
In this study, a steganography method on digital images as anti-forensics by utilizing genetic algor...
Steganography is the art of hiding data in a cover medium such that the existence of the data remain...
Today, the digital and social media platforms are extremely trending, leading a demand to transmit k...
This paper applies steganography algorithm in videos. In proposed method we are hiding the data in a...
AbstractDue to the fast advancement of internet and digital technology, secured transmission of data...
Steganography is the idea of hiding private or sensitive data or information within something that a...
AbstractThere is a large need of internet applications that requires data to be transmitted in a mor...
Steganography is the method employed to prevent unsolicited access and malicious use of sensitive in...
Internet simplified digital data transferring. This data needs to be secured; so securing digital da...