Review On Cryptography and Steganography Techniques in Video

被引:0
|
作者
Aiswarya, S. [1 ]
Gomathi, R. [1 ]
机构
[1] Univ Coll Engn Dindigul, Dept ECE, Dindigul, Tamil Nadu, India
关键词
Data Hiding; Cryptography; Steganography; Video Steganography;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Secure data transmission over the unsecured internet is an important aspect in data communication. Nowadays, authenticity, secrecy, confidentiality are the most important concern in the secure data communication. To provide these concerns, data hiding techniques are used. Cryptography, Steganography and Watermarking techniques are used for data hiding and secure data transmission. Cryptography is the technique of modification or encrypting the secret data in an unreadable form. Steganography is the process of covering the secret data within a carrier file such as text, image, audio and video. Watermarking is a protection technique to shield the information from intruders. For secure data transmission, combinations of cryptography and steganography techniques are most widely used. The secret data is first encrypted using cryptography technique and it is embedded into cover file using steganography technique. In this paper, various techniques for cryptography and steganography are analyzed for secure data transmission over video.
引用
收藏
页码:30 / 33
页数:4
相关论文
共 50 条
  • [21] A Review on Various Approaches in Video Steganography
    Ratna, S. Raja
    Loret, J. B. Shajilin
    Gethsy, D. Merlin
    Krishnan, P. Ponnu
    Prabu, P. Anand
    [J]. INTELLIGENT COMMUNICATION TECHNOLOGIES AND VIRTUAL MOBILE NETWORKS, ICICV 2019, 2020, 33 : 626 - 632
  • [22] Video Steganography Techniques: Taxonomy, Challenges, and Future Directions
    Mstafa, Ramadhan J.
    Elleithy, Khaled M.
    Abdelfattah, Eman
    [J]. 2017 IEEE LONG ISLAND SYSTEMS, APPLICATIONS AND TECHNOLOGY CONFERENCE (LISAT), 2017,
  • [23] Hiding Data Using Efficient Combination of RSA Cryptography, and Compression Steganography Techniques
    Wahab, Osama Fouad Abdel
    Khalaf, Ashraf A. M.
    Hussein, Aziza I.
    Hamed, Hesham F. A.
    [J]. IEEE ACCESS, 2021, 9 : 31805 - 31815
  • [24] A Review on Security Techniques in Image Steganography
    Ghoul, Sami
    Sulaiman, Rossilawati
    Shukur, Zarina
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (06) : 361 - 385
  • [25] Secure Data Transfer in IoT environment: adopting both Cryptography and Steganography techniques
    Das, Ria
    Das, Indrajit
    [J]. 2016 SECOND IEEE INTERNATIONAL CONFERENCE ON RESEARCH IN COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (ICRCICN), 2016, : 296 - 301
  • [26] Visual Cryptography and Steganography Based on Intensity Transformations and Dispersed Dot Halftoning Techniques
    Liu, Ping Feng
    Li, Fang Yu
    Shu, Hou
    Dong, Zhi Hong
    [J]. INTERNATIONAL ACADEMIC CONFERENCE ON THE INFORMATION SCIENCE AND COMMUNICATION ENGINEERING (ISCE 2014), 2014, : 534 - 539
  • [27] CASCADED DNA CRYPTOGRAPHY AND STEGANOGRAPHY
    Shweta
    Indora, Sanjeev
    [J]. 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), 2015, : 104 - 107
  • [28] Optical ghost cryptography and steganography
    Liu, Hong-Chao
    Chen, Wen
    [J]. OPTICS AND LASERS IN ENGINEERING, 2020, 130
  • [29] CLOUD COMPUTING IN CRYPTOGRAPHY AND STEGANOGRAPHY
    Zadiraka, V. K.
    Kudin, A. M.
    [J]. CYBERNETICS AND SYSTEMS ANALYSIS, 2013, 49 (04) : 584 - 588
  • [30] Steganography over Video Files Using Menezes Vanstone Elliptic Curve Cryptography Algorithm
    Kurt, Meltem
    Duru, Nevcihan
    [J]. 2014 22ND SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2014, : 1195 - 1198