Video Steganography using Zero Order Hold Method for Secured Data Transmission
نویسندگان
چکیده
منابع مشابه
LSB Based Steganography using Genetic Algorithm and Visual Cryptography for Secured Data Hiding and Transmission
A large number of commercial steganographic programs use the Least Significant Bit(LSB) embedding as the method of choice for hiding data as it has low computation complexity and high embedding capacity. Although there has been an extensive research work in the past, but majority of the work has no much optimal consideration for robust security towards the encrypted image. The proposed system p...
متن کاملImage Steganography Technique Using Sudoku Puzzle and Ecc Algorithm for Secured Data Transmission
Nowadays, Data transmission is becoming very important among humans. So there are many modes of data transmission introduced. Some of the modes of data transmission are through copper wires, wireless channels, computer buses, etc. Though there are certain modes of transmission, secured data transmission is an important thing what everyone needs, because everyone wants their data to transmit sec...
متن کاملA Practical Approach for Secured Data Transmission using Wavelet based Steganography and Cryptography
Steganography and cryptography methods are used together with wavelets to increase the security of the data while transmitting through networks. In the discrete wavelet transform, an image signal can be analyzed by passing it through an analysis filter bank. This analysis filter bank consists of a low pass and a high pass filter at each decomposition stage. Another technology, the digital water...
متن کاملA secured representation of data hiding in wavelet transform domain using video steganography
Hiding data in digital multimedia pertaining to text, image, audio and video plays a significant role in current trend for providing secured communication. Video Steganography is one of the emerging methods of sharing secret data by concealing the existence of data inside video files. The greatest advantage of using video for Steganography is that the large amount of data can be hidden into vid...
متن کاملFour key Secured Data Transfer Using Steganography and Cryptography
Steganography and cryptography are used to send the data in a confidential way. Steganography hides the existing message and cryptography will confuse the message. The transformation of plain text to cipher text is called as encryption. The transformation of cipher text to plain text is called decryption. Encryption and decryption are controlled by keys. Hashing, symmetric and asymmetric algori...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2017
ISSN: 0975-8887
DOI: 10.5120/ijca2017915587