Article Version 1 Preserved in Portico This version is not peer-reviewed
A Graphical Based Video Steganography
Version 1 : Received: 6 May 2021 / Approved: 10 May 2021 / Online: 10 May 2021 (11:21:29 CEST)
How to cite: Bandyopadhyay, S.; Bose, P.; Goyel, V. A Graphical Based Video Steganography. Preprints 2021, 2021050176. https://doi.org/10.20944/preprints202105.0176.v1. Bandyopadhyay, S.; Bose, P.; Goyel, V. A Graphical Based Video Steganography. Preprints 2021, 2021050176. https://doi.org/10.20944/preprints202105.0176.v1.
In today’s digital media data communication over the internet increasing day by day. Therefore the data security becomes the most important issue over the internet. With the increase of data transmission, the number of intruders also increases. That’s the reason it is needed to transmit the data over the internet very securely. Steganography is a popular method in this field. This method hides the secret data with a cover medium in a way so that the intruders cannot predict the existence of the data. Here a steganography method is proposed which uses a video file as a cover medium. This method has five main steps. First, convert the video file into video frames. Then a particular frame is selected for embedded the secret data. Second, the Least Significant Bit (LSB) Coding technique is used with the double key security technique. Third, an 8 characters password verification process. Fourth, reverse the encrypted video. Fifth, signature verification process to verify the encryption and decryption process. These five steps are followed by both the encrypting and decrypting processes.
Video Steganography, Least Significant Bit (LSB) Coding, Double key Encryption, Decryption, Password Verification, Signature Verification
Copyright: This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.Leave a public comment
Send a private comment to the author(s)