2013 IEEE International Conference on Computational Intelligence and Computing Research 2013
DOI: 10.1109/iccic.2013.6724212
|View full text |Cite
|
Sign up to set email alerts
|

A secure video steganography with encryption based on LSB technique

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 54 publications
(21 citation statements)
references
References 4 publications
0
21
0
Order By: Relevance
“…Video steganography [7] is used to hide a secret video stream in cover video stream. Each frame of secret video is broken into individual components and then converted into 8-bit binary values and encrypted using XOR with secret key and encrypted frames will be hidden in the least significant bit of each frames using sequential encoding of Cover video.…”
Section: Literature Reviewmentioning
confidence: 99%
See 2 more Smart Citations
“…Video steganography [7] is used to hide a secret video stream in cover video stream. Each frame of secret video is broken into individual components and then converted into 8-bit binary values and encrypted using XOR with secret key and encrypted frames will be hidden in the least significant bit of each frames using sequential encoding of Cover video.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The pixel positions of both cover videos and a secret message are randomly chosen by using a private key to improve the system's security. After that the secret message is encoded by applying Hamming code (7,4) before the embedding process to make the message more secure. The obtained result of the encoded message then is added to random generated values by using XOR function.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Pooja Yadav et.al [20] proposed a method that hides a secret video stream in cover video stream. Each frame of secret video will be split into individual components which are further converted into 8-bit binary values, and encrypted by XOR operation with a secret key.…”
Section: Related Workmentioning
confidence: 99%
“…Yadav.P.et.al [1] proposed a technique in which each frame of secret video is broken down into individual components, then converted into 8 binary values, and encrypted using XOR with secret key, encrypted keys will be hidden in the LSB of each frames using sequential encoding of cover video. Balaji.R et.al [2] created an index for the secret information, placed in the frame of the video.…”
Section: Video Steganographymentioning
confidence: 99%