2010
DOI: 10.3923/jas.2010.1644.1649
|View full text |Cite
|
Sign up to set email alerts
|

Hiding Data in Video File: An Overview

Abstract: The aim of this review is to study the methods of steganography using the video file as a cover carrier. The steganography is the art of protecting the information through embedding data in medium carrier, for instants this study illustrate historically this art, as well as the study describes methods as a review for this art in the video file. The video based steganography can be used as one video file, separated images in frames or images and audio files. Since that, the use of the video based steganography … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
10

Relationship

0
10

Authors

Journals

citations
Cited by 68 publications
(8 citation statements)
references
References 36 publications
0
8
0
Order By: Relevance
“…Video steganography is the field of digital steganography that is less researched than image steganography, yet it provides a set of benefits [4]:…”
Section: Video Steganographymentioning
confidence: 99%
“…Video steganography is the field of digital steganography that is less researched than image steganography, yet it provides a set of benefits [4]:…”
Section: Video Steganographymentioning
confidence: 99%
“…Seganography plays a major part in defending privacy for different applications. In the last decade there were many researches done on improving steganography applications that are used in: Online transactions, military communication, ownership of digital images, authentication, copyright, data integrity, adding captions to images, etc [10,11]. In this research, video (multimedia) steganography is used as a media for our proposed covert channel due to the fast increase in movies shared over the Internet [8].…”
Section: Covert Channels Backgroundmentioning
confidence: 99%
“…Customer should submit this code along with his fingerprint features through a BAC file to the server to be validated and verified. The model also includes web pages to generate the FP-TAC and verifies the credit card (CC) information (Ahmed et al, 2010;Al-Frajat et al, 2010).…”
Section: Introductionmentioning
confidence: 99%