Review On Cryptography and Steganography Techniques in Video

被引:0
|
作者
Aiswarya, S. [1 ]
Gomathi, R. [1 ]
机构
[1] Univ Coll Engn Dindigul, Dept ECE, Dindigul, Tamil Nadu, India
关键词
Data Hiding; Cryptography; Steganography; Video Steganography;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Secure data transmission over the unsecured internet is an important aspect in data communication. Nowadays, authenticity, secrecy, confidentiality are the most important concern in the secure data communication. To provide these concerns, data hiding techniques are used. Cryptography, Steganography and Watermarking techniques are used for data hiding and secure data transmission. Cryptography is the technique of modification or encrypting the secret data in an unreadable form. Steganography is the process of covering the secret data within a carrier file such as text, image, audio and video. Watermarking is a protection technique to shield the information from intruders. For secure data transmission, combinations of cryptography and steganography techniques are most widely used. The secret data is first encrypted using cryptography technique and it is embedded into cover file using steganography technique. In this paper, various techniques for cryptography and steganography are analyzed for secure data transmission over video.
引用
收藏
页码:30 / 33
页数:4
相关论文
共 50 条
  • [1] Review on lightweight cryptography techniques and steganography techniques for IoT environment
    Supriya, K. Sangeetha
    Lovesum, S. P. Jeno
    [J]. INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2024, 15 (09) : 4210 - 4228
  • [2] A Review on Steganography and Cryptography
    Mishra, Rina
    Bhanodiya, Praveen
    [J]. 2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER ENGINEERING AND APPLICATIONS (ICACEA), 2015, : 119 - 122
  • [3] A Review of Combined Effect of Cryptography & Steganography Techniques to Secure the Information
    Mustafa, Ghulam
    Ashraf, Rehan
    Ul Haq, Inam
    Khalid, Yusra
    Ul Islam, Rafiq
    [J]. 2019 5TH INTERNATIONAL CONFERENCE ON COMPUTING, ENGINEERING, AND DESIGN (ICCED), 2019,
  • [4] A Review on Video Steganography Techniques in Spatial Domain
    Disha
    Saini, Khushil
    [J]. 2017 RECENT DEVELOPMENTS IN CONTROL, AUTOMATION AND POWER ENGINEERING (RDCAPE), 2017, : 366 - 371
  • [5] Data Security Using Cryptography and Steganography Techniques
    Saleh, Marwa E.
    Aly, Abdelmgeid A.
    Omara, Fatma A.
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (06) : 390 - 397
  • [6] Enhancing security of images by Steganography and Cryptography techniques
    Bukhari, Sadaf
    Arif, Muhammad Shoaib
    Anjum, M. R.
    Dilbar, Samia
    [J]. 2016 SIXTH INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING TECHNOLOGY (INTECH), 2016, : 531 - 534
  • [7] Video steganography: A review
    Liu, Yunxia
    Liu, Shuyang
    Wang, Yonghao
    Zhao, Hongguo
    Liu, Si
    [J]. NEUROCOMPUTING, 2019, 335 : 238 - 250
  • [8] A Review: Cryptography and Steganography Algorithm for Cloud Computing
    Singla, Surbhi
    Bala, Anju
    [J]. PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 953 - 957
  • [9] A Video Steganography Scheme Based on Post-Quantum Cryptography
    Huang, Yiming
    Lei, Zhongkui
    Song, Zhufu
    Guo, Yueru
    Li, Yihang
    [J]. 2021 IEEE INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND SOFTWARE ENGINEERING (ICICSE 2021), 2021, : 83 - 87
  • [10] Cryptography and steganography
    [J]. 2018, Institute of Telecommunications Professionals (12):