A Novel Approach for Video Steganography using LSB Technique

Authors(3) :-Khalil Ahmad, Taseem Nazir, Junaid Farooq War

There are many kinds of steganography techniques available among which hiding data in video using logical operation by LSB substitution is a simple method. Here the information will be embedded using the stego key. Here 8 or 16-bit key is used. The input image or text file is encoded with the help of the secret key by performing logical operation using LSB substitution. By using this technique, capacity of embedding bits into the cover image can be increased and possibility of attacks can be decreased.

Authors and Affiliations

Khalil Ahmad
Department of CSE, BGSB University, Rajouri, J&K, India
Taseem Nazir
Department of CSE, BGSB University, Rajouri, J&K, India
Junaid Farooq War
Department of ECE, BGSB University, Rajouri, J&K, India

Steganography, LSB, Secret Key, Data hiding

  1. H. Qi, W. Snyder and W. Sander, “Blind Consistency Based Steganography for Information Hiding In DigitalIEEE International Conference on Multimedia and Expo, 2002. ICME'02. Proceedings 2002, Volume: 1 , pp: 585 – 588, August. 2002.
  2. A Survey on various types of Steganography and Analysis of Hiding Techniques Navneet Kaur, Sunny Behal. “International Journal of Engineering Trends and Technology (IJETT) – Volume 11 Number 8 - May 2014”
  3. G. Elmasry and Y. Shi, “2- D Interleaving for Enhancing the Robustness of Watermark Signals Embedded in Still Imag International Conference on Multimedia and Expo (II) pp. 731 – 734, 2000.
  4. Information hiding using audio steganography – a surveyThe. “International Journal of Multimedia & Its Applications (IJMA) Vol.3, No.3, August 2011 ”
  5. Hiding the Text Information using Steganography. “M.GraceVennice, Prof. T.V.Rao, M. Swapna, Prof. J.Sasikiran/ International Journal of Engineering Research and Applications (IJERA) ”
  6. Data Hiding Using Video Steganography - A Survey. “Swetha V et al | IJCSET(www.ijcset.net) | June 2015 | Vol 5, Issue 6,206 - 213 ”
  7. D. Kundur, D. Hatzinakos, “Digital Watermarking using Multi - resolution Wavelet Decomposition, ”In IEEE ICASSP'98, volume 5, pages 2659 – 26 62, Seattle, May 1998.
  8. H. Liu, J. Liu, J. Huang, D. Huang and Y. Shi, “A robust DWT - based blind data hiding algorithm,” IEEE International Symposium on Circuits and Systems, ISCAS 2002, Volume: 2, pp. II - 672 - II - 675, May 2002.
  9. C.C. Chang, T.C. Lu, “A difference expand oriented data hiding scheme for restoring the original host images”, J. Systftw... 79 so (12) (2006) 1754 – 1766.
  10. H. B. Kekre, Archana A. Athawale, Pallavi N. Halarnkar, “Increased Capacity of In Hiding in s LSB method for text and Image, International Journal of Electrical, Computer and Systems Engineering , volume 2, No. 4 http://www.waset.org/ijecse/v2/ v2 - 4 - 34.pdf (Europe) .
  11. S.D. Lin and C.F. Chen, A Robust DCT - based Watermarking for Copyright Protection, IEEE Transactions on Consumer Electron, vol. 46, no. 3, pp. 415 - 421, 2000.
  12. Navneet Kaur, Sunny Behal “A Survey on various types of Steganography and Analysis of Hiding Techniques”,International Journal of Engineering Trends and Technology (IJETT) – Volume 11 Number 8 - May 20 14.

The Rubik's Cube is not just a forgotten toy from the 80's. The fact is that it's even more popular than ever before.

Publication Details

Published in : Volume 4 | Issue 1 | March-April 2018
Date of Publication : 2018-04-25
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 253-257
Manuscript Number : CSEIT411842
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Khalil Ahmad, Taseem Nazir, Junaid Farooq War, "A Novel Approach for Video Steganography using LSB Technique", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 4, Issue 1, pp.253-257, March-April-2018.
Journal URL : http://ijsrcseit.com/CSEIT411842

Article Preview

Follow Us

Contact Us