Trends in Digital Video Steganography: A Survey

  title={Trends in Digital Video Steganography: A Survey},
  author={Namrata Singh and Virendra Kumar Yadav},
  journal={International Journal of Computer Applications},
Steganography is the science of hiding data by embedding it in cover files without altering it. The cover media may be text, image, voice or video streams in a digitized format. Steganography is used to prevent unauthorized users from becoming aware of the very existence of a message, let alone what it contains. These new techniques makes hidden message indistinguishable from the white noise. Even after suspicion of the presence of message, there is no proof of its existence. There are various… Expand
Video Steganography using Curvelet Transform and Elliptic Curve Cryptography
  • Sonali Rout, R. Mohapatra
  • Computer Science
  • 2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT)
  • 2020
A secure video steganography method has been proposed which uses Curvelet Transform for secret data embedding, Elliptic Curve Cryptography for stego key encryption and a threshold algorithm for the determination of the amount of secret data to be encoded per frame. Expand
Comparative Analysis for Steganographic LSB Variants
The proposed work uses the traditional LSB approach as basic steganographic model and inference on the basis of parameters concludes that the randomized LSB shows better results than the sequential LSB scheme. Expand


Digital image steganography: Survey and analysis of current methods
This paper provides a state-of-the-art review and analysis of the different existing methods of steganography along with some common standards and guidelines drawn from the literature and some recommendations and advocates for the object-oriented embedding mechanism. Expand
Steganography- A Data Hiding Technique
An in-depth look at how digital images can be used as a carrier to hide messages is discussed and the performance of some of the steganography tools are analyzed. Expand
A Survey on Image Steganography Techniques
A survey on digital images steganography and covering its fundamental concepts is delivered, the development of image steganographic methods in spatial representation, in JPEG format is discussed and significant research developments are also discussed. Expand
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Cosine Transformation (DCT)
Steganography is an art and a science of communicating in a way, which hides the existence of the communication. It is also called as “covered writing”, because it uses a “cover” of a message forExpand
A Survey of Image Steganography Techniques
This paper critically analyzed various steganographic techniques and also has covered steganography overview its major types, classification, applications. Expand
Video Steganography: A Survey
Recent advances in information technology have made quick delivery and sharing of multimedia information possible. But these advances in technology are leading breaches to information security andExpand
A Survey : Video Steganography techniques
Video Steganography is a method for hiding data in a video file and hence it reduces the chance of access by unauthorized user. In steganography various carrier file formats can be used, among whichExpand
Hash Based Least Significant Bit Technique For Video Steganography
A Hash based least significant bit technique for video steganography has been proposed whose main goal is to embed a secret information in a particular video file and then extract it using a stego key or password. Expand
Wavelet Transform Based Steganography Technique to Hide Audio Signals in Image
An image steganography technique is proposed to hide audio signal in image in the transform domain using wavelet transform and it is found that the technique is robust and it can withstand the attacks. Expand
Secure Data Hiding Technique using Video Steganography and Watermarking
This proposed system not only hides large volume of data within a video; but also limits the perceivable distortion that might occur while processing it, which provides a strong backbone for its security. Expand