Currently, data such as text, images and video are very important. Therefore, data must be secured from unauthorized parties. In this paper, we propose a number of security levels, first using compression techniques on the data that will be hidden to reduce the size of the data, second using encryption techniques on data that has been compressed so that data is more secure, third using video steganography techniques on compressed and encrypted data so that unauthorized parties are increasingly difficult to extract data. Measurement of differences in quality of cover-video and stego-video using MSE (Mean Square Error), PSNR (Peak Signal to Noise Ratio), evolution histogram of video tags, and video playback. The results show that the proposed...
Now a day, it's terribly risky to handle the information in web against intruders. Information is mo...
AbstractThis paper proposes a novel video steganography scheme for efficient and effective informati...
Abstract: This paper proposes an adaptive steganographic algorithm that embeds secret data in a comp...
ABSTRACT- Steganography is an excellent means of conversing if there is guarantee on the integrity o...
This paper applies steganography algorithm in videos. In proposed method we are hiding the data in a...
Abstract- This paper presents a comparison between un-optimized and optimized video steganography. I...
ABSTRACT: In recent years there has been an increasing interest in using the technology of multimedi...
Abstract: Steganography, is the art of providing security to text file by embedding into a carrier w...
This article presents design of steganographic method, which uses video container as cover data. Vid...
Nowadays, video steganography has become important in many security applications. The performance of...
Steganography is a process of hiding important message or data inside other data to protect the impo...
Steganography is a process of hiding important message or data inside other data to protect the impo...
The interest in the digital videos confidentiality in the current electronic and interrelated world ...
Steganography, embedding secret data into unsuspected objects, has emerged as a significant sub-disc...
In the era of fast information interchange, videoSteganography and data hiding techniques havebecome...
Now a day, it's terribly risky to handle the information in web against intruders. Information is mo...
AbstractThis paper proposes a novel video steganography scheme for efficient and effective informati...
Abstract: This paper proposes an adaptive steganographic algorithm that embeds secret data in a comp...
ABSTRACT- Steganography is an excellent means of conversing if there is guarantee on the integrity o...
This paper applies steganography algorithm in videos. In proposed method we are hiding the data in a...
Abstract- This paper presents a comparison between un-optimized and optimized video steganography. I...
ABSTRACT: In recent years there has been an increasing interest in using the technology of multimedi...
Abstract: Steganography, is the art of providing security to text file by embedding into a carrier w...
This article presents design of steganographic method, which uses video container as cover data. Vid...
Nowadays, video steganography has become important in many security applications. The performance of...
Steganography is a process of hiding important message or data inside other data to protect the impo...
Steganography is a process of hiding important message or data inside other data to protect the impo...
The interest in the digital videos confidentiality in the current electronic and interrelated world ...
Steganography, embedding secret data into unsuspected objects, has emerged as a significant sub-disc...
In the era of fast information interchange, videoSteganography and data hiding techniques havebecome...
Now a day, it's terribly risky to handle the information in web against intruders. Information is mo...
AbstractThis paper proposes a novel video steganography scheme for efficient and effective informati...
Abstract: This paper proposes an adaptive steganographic algorithm that embeds secret data in a comp...