Site Loader
Rock Street, San Francisco

There are many techniques for hiding data in a digital container ?le. Although this project focuses solely on using a video container ?le, there are techniques in audio and image steganography that still bear relevance to video ?le formats. Furthermore, video can be divided into two components: the audio and the picture. To work with video steganography, it is important that we understand the audio and image techniques .
This section presents the research work of some authors in the same field and explains a short description of various techniques used for video compression as well as embedding.

1. An Approach Towards Image, Audio and Video Steganography 4
In this paper author has demonstrated the use of steganography in such a way that the video intended to be encoded is divided into frames. Each frame of the video is considered to be a single RGB image. The frames is then converted into number of sound files. Later the sound files are decrypted and combined in the original sequence to retrieve back the video using the reverse technique. Again ordinary sound files containing speech and music were also tried to encode into a RGB image, which was later retrieved by running the decoding procedure.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!

order now

2. Compressed and raw video steganography techniques: a comprehensive survey and analysis 5
In this paper the author has provided a comprehensive study and analysis of many cutting edge video steganography methods and their performance evaluations from literature. Both compressed and raw video steganography methods are surveyed. In addition, the main confusion between steganography, cryptography, and watermarking techniques was removed.

3. Steganography over Video File using Random Byte Hiding and LSB Technique 6
In this paper, the hidden message is text and it is implemented over video file. The traditional well known method uses image as cover which has the problem or disadvantage of embedding dimension. So, cover should be a video to overcome the limitation of embedding dimension. Nowadays, the use of a video based steganography is common and numbers of steganalysis tools are available to check whether the video is stego-video or not. Most of the tools check for information hided by LSB, DCT, Frequency Domain Analysis etc and finds whether the video has hidden or secret data or not. In this paper the author has demonstrated the use of LSB and Random Byte Hiding techniques and MATLAB based implementation is done to find the results.

4. A new approach to video steganography using pixel pattern matching and key segmentation 7.
In this paper the author proposes a video steganography method using pixel pattern matching and key segmentation. In the proposed system, the data is first encrypted using Advanced Encryption Standard and then divided using arithmetic division method. In this approach, the data is stored in the form of divisor, quotient & remainder. The location key is distributed, encrypted and stored in different frames. Pattern matching is also used to avoid distortion of the video frame. This system will be difficult to crack since the location key is divided as well as encrypted and stored in different video frames along with this the secret message is stored in the form of a quotient, a divisor and remainder. If the system is attacked or hacked the chances of the attacker to analyze or predict the pattern will be very difficult as the secret data is embedded with twofold protection.

5. Lazy Wavelet Transform Based Steganography in Video 8
One of the most commonly used technique is Least Significant Bit steganography. In this paper an encoding technique is used which first changes the video using a Lazy Lifting Wavelet transform and then adds the LSB technique in the subparts of the video that has been obtained. This approach to video steganography uses the visual and the audio components. The lazy wavelet transform is first applied to the frames, and then the data is stored in the coefficients of the visual component. The length till which it is stored is hidden using LSB in the audio part .

Post Author: admin


I'm Avery

Would you like to get a custom essay? How about receiving a customized one?

Check it out