An Efficient And Secure Data Hiding Technique : Video Steganography

Main Article Content

K.Sailaja, N.Madhavi, Dr K.Sreeramamurthy, Dhanaraju Murala, K Ashwini, Swapna Vanguru

Abstract

 Now a days, most of the people are using internet in which security is the major issue which has to be maintained. Digital data, which must be protected from eavesdroppers when being stored or sent during communication via an insecure network, is the main source of information in the internet age. As the use of internet is increased, the rate at which the data is transmitted per day is also increased. Various approaches, including steganography, cryptography, and watermarking, are employed in the security sector to secure digital data inside a network.


In this paper will use a technique which is steganography-based steganography based on text, picture, audio, and video is used in safety devices. Essentially, a thorough explanation of video steganography in both the compressed and unfiltered domains is provided.


Considering a variety of transform coefficients, the suggested approach presents video steganography within a condensed domain. The confidential information is hidden by using the conversion coefficients of the non-dynamic and dynamic “Region of Interest” (ROI) of the concealed cover video screen as an intermediary subject. Through the use of powerful secret keys and efficient embedding and extraction algorithms, the suggested video steganography becomes more efficient. The suggested video steganography's level is assessed using three parameters: "robustness", which is determined by “bit error rate” (BER) and “similarity” (Sim), "embedding capacity", which is determined by "hiding ratio" (HR), and "imperceptibility", which is determined by "mean square error" (MSE) and “peak signal-to-noise ratio" (PSNR). Both a real-time video sample and a well-defined conventional video dataset have been used in experiments using the suggested technique. A thorough elaboration of the pertinent research in the domain of compressed video steganography is provided, and the outcomes are contrasted with the suggested approach using quality assessment criteria.

Article Details

Section
Articles