Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

A Graphical Based Video Steganography

Version 1 : Received: 6 May 2021 / Approved: 10 May 2021 / Online: 10 May 2021 (11:21:29 CEST)

How to cite: Bandyopadhyay, S.; Bose, P.; Goyel, V. A Graphical Based Video Steganography. Preprints 2021, 2021050176. https://doi.org/10.20944/preprints202105.0176.v1 Bandyopadhyay, S.; Bose, P.; Goyel, V. A Graphical Based Video Steganography. Preprints 2021, 2021050176. https://doi.org/10.20944/preprints202105.0176.v1

Abstract

In today’s digital media data communication over the internet increasing day by day. Therefore the data security becomes the most important issue over the internet. With the increase of data transmission, the number of intruders also increases. That’s the reason it is needed to transmit the data over the internet very securely. Steganography is a popular method in this field. This method hides the secret data with a cover medium in a way so that the intruders cannot predict the existence of the data. Here a steganography method is proposed which uses a video file as a cover medium. This method has five main steps. First, convert the video file into video frames. Then a particular frame is selected for embedded the secret data. Second, the Least Significant Bit (LSB) Coding technique is used with the double key security technique. Third, an 8 characters password verification process. Fourth, reverse the encrypted video. Fifth, signature verification process to verify the encryption and decryption process. These five steps are followed by both the encrypting and decrypting processes.

Keywords

Video Steganography, Least Significant Bit (LSB) Coding, Double key Encryption, Decryption, Password Verification, Signature Verification

Subject

Computer Science and Mathematics, Computer Vision and Graphics

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.