Skip to main content

Directed Graph Pattern Synthesis in LSB Technique on Video Steganography

  • Conference paper
Book cover Advances in Computer Science and Information Technology (AST 2010, ACN 2010)

Abstract

In this paper, we propose a data hiding and extraction procedure for high resolution AVI videos. Although AVI videos are large in size but it can be transmitted from source to target over network after processing the source video by using these Data hiding and Extraction procedure securely. There are two different procedures, which are used here at the sender’s end and receiver’s end respectively. The procedures are used here as the key of Data Hiding and Extraction.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bhattacharyya, D., Das, P., Mukherjee, S., Ganguly, D., Bandyopadhyay, S.K., Kim, T.-h.: A Secured Technique for Image Data Hiding. In: Communications in Computer and Information Science, vol. 29, pp. 151–159. Springer, Heidelberg (2009)

    Google Scholar 

  2. Bandyopadhyay, S.K., Bhattacharyya, D., Ganguly, D., Mukherjee, S., Das, P.: A Tutorial Review on Steganography. In: International Conference on Contemporary Computing (IC3 2008), Noida, India, August 7-9, pp. 105–114 (2008)

    Google Scholar 

  3. Krenn, J.R.: Steganography and Steganalysis (January 2004)

    Google Scholar 

  4. Kapotas, S.K., Varsaki, E.E., Skodras, A.N.: Data Hiding in H.264 Encoded Video Sequences. In: IEEE 9th Workshop on Multimedia Signal Processing, Crete, October 1-3, pp. 373–376 (2007)

    Google Scholar 

  5. Ker, A.: Steganalysis of Embedding in Two Least-Significant Bits. IEEE Trans. on Information Forensics and Security 2(1), 46–54 (2007)

    Article  Google Scholar 

  6. Bhaumik, A.K., Choi, M., Robles, R.J., Balitanas, M.O.: Data Hiding in Video. International Journal of Database Theory and Application 2(2) (June 2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bhattacharyya, D., Bhaumik, A.K., Choi, M., Kim, Th. (2010). Directed Graph Pattern Synthesis in LSB Technique on Video Steganography. In: Kim, Th., Adeli, H. (eds) Advances in Computer Science and Information Technology. AST ACN 2010 2010. Lecture Notes in Computer Science, vol 6059. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13577-4_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-13577-4_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-13576-7

  • Online ISBN: 978-3-642-13577-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics