Secret channel using video steganography
Video steganography is about hiding the secret message into the video as the cover media. Steganography is a technique use to secure the transmission of secret information or hide their existence. Most of the steganography software such as DeEgger Embedder and OurSecret does not have encryption algo...
| Main Authors: | Lee, Kar Yee, Chuah, Chai Wen |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
JOIV
2017
|
| Subjects: | |
| Online Access: | http://eprints.uthm.edu.my/4817/ http://eprints.uthm.edu.my/4817/1/AJ%202017%20%28660%29.pdf |
Similar Items
A secured data hiding using affine transformation in video steganography
by: Ramalingam, Mritha, et al.
Published: (2020)
by: Ramalingam, Mritha, et al.
Published: (2020)
Video steganography based on DCT psychovisual and object motion
by: Muhammad, Fuad, et al.
Published: (2020)
by: Muhammad, Fuad, et al.
Published: (2020)
Effects on quality in audio steganography
by: Ho, Man Yen
Published: (2014)
by: Ho, Man Yen
Published: (2014)
An improved hiding information by modifying selected DWT coefficients in video steganography
by: Ernawan, Ferda
Published: (2023)
by: Ernawan, Ferda
Published: (2023)
A secure audio steganography approach
by: Zamani, Mazdak, et al.
Published: (2009)
by: Zamani, Mazdak, et al.
Published: (2009)
Steganography: Text File Hiding in Image
by: Yaw Choon, Kit
Published: (2013)
by: Yaw Choon, Kit
Published: (2013)
Data hiding in medical images using encryption and steganography techniques
by: Nur Athirah, Abdul Razak
Published: (2019)
by: Nur Athirah, Abdul Razak
Published: (2019)
Cryptography, Steganography, & Digital Watermarking for Text Documentation
by: Nurul Suzulyana, Zulkifley, et al.
Published: (2020)
by: Nurul Suzulyana, Zulkifley, et al.
Published: (2020)
Anti-forensic steganography method based on randomization
by: Khalaf, Emad Taha, et al.
Published: (2013)
by: Khalaf, Emad Taha, et al.
Published: (2013)
An approach to improve the robustness of substitution techniques of audio steganography
by: Zamani, Mazdak, et al.
Published: (2009)
by: Zamani, Mazdak, et al.
Published: (2009)
Reversible image steganography using ROI & RONI
by: Lim, Jee Chao
Published: (2019)
by: Lim, Jee Chao
Published: (2019)
Secured email using steganography / Syaiful Annuar Omar
by: Syaiful Annuar, Omar
Published: (2005)
by: Syaiful Annuar, Omar
Published: (2005)
Steganography application for x-ray image of the transferred patient using least significant bit method
by: Nur Shazana, Matri
Published: (2019)
by: Nur Shazana, Matri
Published: (2019)
An Improved RDWT-based Image Steganography Scheme with QR Decomposition and Double Entropy
by: Ng, Ke-Huey, et al.
Published: (2020)
by: Ng, Ke-Huey, et al.
Published: (2020)
Information Security Analysis and Solution using LSB Steganography and
AES Cryptographic Algorithm
by: Nurul Adha, Oktarini Saputri, et al.
Published: (2023)
by: Nurul Adha, Oktarini Saputri, et al.
Published: (2023)
Omega network hash construction
by: Chuah, Chai Wen
Published: (2009)
by: Chuah, Chai Wen
Published: (2009)
Video steganography based on DCT psychovisual and object motion
by: Muhammad, Fuad, et al.
Published: (2020)
by: Muhammad, Fuad, et al.
Published: (2020)
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
Steganography algorithm to hide secret message inside an image
by: Ibrahim, Rosziati, et al.
Published: (2011)
by: Ibrahim, Rosziati, et al.
Published: (2011)
Error-resilient transmission of resolution-scalable image and video over wireless channels
by: Al Muhit, Abdullah, et al.
Published: (2006)
by: Al Muhit, Abdullah, et al.
Published: (2006)
Identifying the pornographic video on youtube using vlog stream
by: Md Kamrul, Islam, et al.
Published: (2018)
by: Md Kamrul, Islam, et al.
Published: (2018)
L-CAQ: Joint link-oriented channel-availability and channel-quality based channel selection for mobile cognitive radio networks
by: Rahman, Md. Arafatur, et al.
Published: (2018)
by: Rahman, Md. Arafatur, et al.
Published: (2018)
Frames selection based on modified entropy and object motion in video steganography
by: Muhammad, Fuad, et al.
Published: (2019)
by: Muhammad, Fuad, et al.
Published: (2019)
Web Based Video Conferencing Application
by: Tan, Ying En
Published: (2021)
by: Tan, Ying En
Published: (2021)
Channel Availability for Mobile Cognitive Radio Networks
by: Cacciapuoti, Angela Sara, et al.
Published: (2015)
by: Cacciapuoti, Angela Sara, et al.
Published: (2015)
Video scene change detection based on histogram analysis for hiding message
by: M., Fuad, et al.
Published: (2021)
by: M., Fuad, et al.
Published: (2021)
Development and implementation of a video watermarking method based on DCT transform
by: Benziane, Ali, et al.
Published: (2021)
by: Benziane, Ali, et al.
Published: (2021)
Enhancement the video quality forwarding Using Receiver-Based Approach(URBA) in Vehicular Ad-Hoc Network
by: Hammood, Omar A., et al.
Published: (2017)
by: Hammood, Omar A., et al.
Published: (2017)
Effective marketing video application by using geotagged Twitter's status metadata
by: Limanto, Adrian Samuel *, et al.
Published: (2011)
by: Limanto, Adrian Samuel *, et al.
Published: (2011)
A secure HEVC video watermarking scheme for authentication and copyright purposes
by: Elrowayati, Ali Abdulhafid
Published: (2020)
by: Elrowayati, Ali Abdulhafid
Published: (2020)
Effect of Different Error Correction Algorithms on Video Quality over Heterogeneous Networks
by: Osamah, I. Khalaf, et al.
Published: (2015)
by: Osamah, I. Khalaf, et al.
Published: (2015)
Effects of Video Display Terminal Resolutions to the Legibility of Text on a Web Page
by: Ahmad Affendi, Hashim, et al.
Published: (2015)
by: Ahmad Affendi, Hashim, et al.
Published: (2015)
New hybrid deep learning method to recognize human action from video
by: Md Shofiqul, Islam, et al.
Published: (2021)
by: Md Shofiqul, Islam, et al.
Published: (2021)
e-Forensics steganography systems for secret information retrieval
by: Potdar, Vidyasagar, et al.
Published: (2005)
by: Potdar, Vidyasagar, et al.
Published: (2005)
Analysis of Linguistic Steganography Tools
by: Shaifizat, Mansor
Published: (2004)
by: Shaifizat, Mansor
Published: (2004)
Analysis of natural language steganography
by: Mansor, Shaifizat, et al.
Published: (2009)
by: Mansor, Shaifizat, et al.
Published: (2009)
A new embedding technique based on psychovisual threshold for robust and secure compressed video steganography
by: Ferda, Ernawan, et al.
Published: (2020)
by: Ferda, Ernawan, et al.
Published: (2020)
Unidirectional and bidirectional optimistic modes IP header compression for real-time video streaming
by: Bouthiba Farouq, Douma, et al.
Published: (2020)
by: Bouthiba Farouq, Douma, et al.
Published: (2020)
Taylor-newton homotopy method for computing the depth of flow rate for a channel
by: Hasan, Talib Hashim, et al.
Published: (2010)
by: Hasan, Talib Hashim, et al.
Published: (2010)
Analysis of joint channel estimation and joint data detection in TD-SCDMA systems
by: Marzook, Ali K., et al.
Published: (2011)
by: Marzook, Ali K., et al.
Published: (2011)
Similar Items
-
A secured data hiding using affine transformation in video steganography
by: Ramalingam, Mritha, et al.
Published: (2020) -
Video steganography based on DCT psychovisual and object motion
by: Muhammad, Fuad, et al.
Published: (2020) -
Effects on quality in audio steganography
by: Ho, Man Yen
Published: (2014) -
An improved hiding information by modifying selected DWT coefficients in video steganography
by: Ernawan, Ferda
Published: (2023) -
A secure audio steganography approach
by: Zamani, Mazdak, et al.
Published: (2009)