CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Secure Data Hiding Technique using Video Steganography and Watermarking

by Shivani Khosla, Paramjeet Kaur
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 95 - Number 20
Year of Publication: 2014
Authors: Shivani Khosla, Paramjeet Kaur
10.5120/16708-6861

Shivani Khosla, Paramjeet Kaur . Secure Data Hiding Technique using Video Steganography and Watermarking. International Journal of Computer Applications. 95, 20 ( June 2014), 7-12. DOI=10.5120/16708-6861

@article{ 10.5120/16708-6861,
author = { Shivani Khosla, Paramjeet Kaur },
title = { Secure Data Hiding Technique using Video Steganography and Watermarking },
journal = { International Journal of Computer Applications },
issue_date = { June 2014 },
volume = { 95 },
number = { 20 },
month = { June },
year = { 2014 },
issn = { 0975-8887 },
pages = { 7-12 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume95/number20/16708-6861/ },
doi = { 10.5120/16708-6861 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:19:55.886381+05:30
%A Shivani Khosla
%A Paramjeet Kaur
%T Secure Data Hiding Technique using Video Steganography and Watermarking
%J International Journal of Computer Applications
%@ 0975-8887
%V 95
%N 20
%P 7-12
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The rapid development of data transfer through internet made it easier to send the data accurate and faster to the destination. Besides this, anyone can modify and misuse the valuable information through hacking at the same time. This paper presents video steganography with digital watermarking techniques as an efficient and robust tool for protection. This paper is a combination of Steganography and watermarking; which provides a strong backbone for its security. Here considers video as set of frames or images and any changes in the output image by hidden data is not visually recognizable. This proposed system not only hides large volume of data within a video; but also limits the perceivable distortion that might occur while processing it.

References
  1. Muhammad Abdul Qadir, Ishtiaq Ahmad (2005) "digital text watermarking: secure content delivery and data hiding in digital documents "IEEE.
  2. Jayeeta Majumder, Sweta Mangal (2012) "An Overview of Image Steganography using LSB Technique "IJCA.
  3. Vladimír BÁNOCI, Gabriel BUGÁR, Dušan LEVICKÝ (2011) "A Novel Method of Image Steganography in DWT Domain" IEEE.
  4. Arvind kumar, km. Pooja (2010) "Steganography – A Data Hiding Technique" IJCA volume 9, issue 7.
  5. Hamdy M. Kelash , Osama F. Abdel Wahab ,Osama A. Elshakankiry ,Hala S. El-sayed (2013) "Hiding Data in Video Sequences Using Steganography Algorithms" IEEE.
  6. Nikita Kashyap, G. R. Sinha (2012) "Image Watermarking Using 3-Level Discrete Wavelet Transform (Dwt)" IJMECS.
  7. Blossom Kaur,Amandeep Kaur2, Jasdeep Singh (2011) "steganographic approach for hiding image in dct domain" IJAET, Vol. 1,Issue 3.
  8. Sunil. K. Moon , Rajeshree. D. Raut (2013) "Analysis of Secured Video Steganography Using Computer Forensics Technique for Enhance Data Security" IEEE
  9. Anuj Bhardwaj and Rashid Ali (2009) "Image Compression Using Modified Fast Haar Wavelet Transform" World Applied Sciences Journal 7 (5).
  10. Rini T Paul (2011) "Review of Robust Video Watermarking Techniques" IJCA.
  11. S. M. Masud Karim, Md. Saifur Rahman, Md. Ismail Hossain (2011) "A New Approach for LSB Based Image Steganography using Secret Key" IEEE.
  12. Masoud Nosrati Ronak Karimi Mehdi Hariri (2012) "Audio Steganography: A Survey on Recent Approaches" World Applied Programming, Vol (2), No (3)
  13. Munesh Chandra", Shikha Pandel, Rama Chaudhar (2010) "Digital Watermarking Technique for Protecting Digital Images" IEEE.
  14. Reena Anju and Vandana (2013) "Modified Algorithm for Digital Image Watermarking Using Combined DCT and DWT" IJICT Volume 3 number 7.
  15. Usha Pal , Dinesh Chandra (2012) "Survey Of Digital Watermarking Using Dct" IJCSE Volume 4.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Digital watermarking Least Significant Bit Discrete Wavelet Transform Discrete Cosine Transform