• Ms Shruti


Information security has become the area of concern as a result of widespread use of communication medium over the internet. This paper focuses on the data security approach when combined with encryption and steganographic techniques for secret communication by hiding it inside the multimedia files. The high results are achieved by providing the security to data before transmitting it over the internet. The files such as images, audio, video contains collection of bits that can be further translated into images, audio and video. The files composed of insignificant bits or unused areas which can be used for overwriting of other data. This paper explains the proposed algorithm using video steganography for enhancing data security.


Download data is not yet available.


Nutzinger,M.C.Fabian, and M.Marschalek. â€Secure Hybrid Spread Spectrum System for Steganography in Auditive Mediaâ€. In Intelligent Information Hiding and Multimedia Signal Processing(IIH-MSP), 2010 Sixth International Conference.

Abbas Cheddad,Joan Condell,Kevin Curran,Paul Kevitt,â€Enhancing Steganography In Digital Imagesâ€.Proc.Canadian Conference on Computer and Robot Vision. [

B.Dunbar.A Detailed look at steganographic techniques and their use in an Open-Systems Environment,Sans Institute,1(2002).

Alain,C.Brainos,â€A study of Steganography and Art Of Hiding Information,â€East Carolina University.

Bender,W,Grulh,D,Morimoto,N. & Lu,A.,â€Techniques for Data Hidingâ€,IBM Systems Journal,Vol 35,1996.

Dunbar,B.,â€Steganography Techniques and their use in an Open-Systems environmentâ€,SANS Institute,January 2002.

Marvel,L.,M.,Boncelet Jr.,C.G.& Retter,C.,â€Spread Spectrum Steganographyâ€,IEEE Transactions on Image Processing,1999.

Wang,H & Wang,S,â€Cyber Warfare:Steganography vs. Steganalysisâ€,Communications of the ACM,47:10,October 2004.

Stefan Katznbeisser, Fabien.A., P.Petitcolas editors, Information Hiding Techniques for Steganography and Digital Watermarking,Artech House, Boston.London,2000.

Jamil,T.,â€Steganography:The art of Hiding Information is Plain Sightâ€,IEEE Potentials,18:01,1999.

B.Pfitzmann,â€Information Hiding Terminology,â€proc.First Int’l Workshop Information Hiding,Lecturer Notes in Computer Science No.1,174,Spring –Verlag,Berlin,1996,pp.347-356.

Yeuan-Kuen Leea and Ling-Hwei Cheng,â€High capacity steganographic modelâ€,IEEE Proc.Visual Image Signal Process.,Vol.147,No.3,June 2000.

Ross J.Anderson,Fabien A.P.Petitcols,on The limits of steganography,IEEE Journal of Selected Areas in Communication,16(4);474-481,May 1998.

M.Ashourian,R.C. Jain,and Y.H.Ho,Dithered Quantization for Image Data Hiding In DCT domain,Proc.of IST2003,2003,171-175.

C.C.lin,P.F.Shiu,High Capacity Data Hiding scheme for DCT-based images.Journal of Information Hiding and Multimedia Signal Processing,1(3),2010,314-323.

A.Nag,S.Biswas,D.Sarkar,P.Sarkar,A Novel Technique for Image Steganography based on Block-DCT and Huffman Encoding,International Journal of Computer Science and Information Technology.

C.C.Chang,C.C.Lin,C.S.Tseng,and W.L.Tai Reversible hiding in DCT-based Compressed Images,Information Sciences Journal,177(13),2007,2768-2786.

M.Iwata,k.miyake,A. Shiozaki,Digital Steganography utilizing Features of JPEG Images,IEICE Trans.Fundamentals,E87-A,2004,929-936.

C.C. Chang,T.S.Chen,and L.Z. Chung,A Steganographic Method Based Upon JPEG quantization table modification,Information Sciences Journal,2002,141(1,2),123-138.

Kumar.B.,D.,Bhattacharya,P.Das,D.Ganguly and S.Mukherjee,†A tutorial review on Steganographyâ€,International Conference on Contemporary Computing (IC3-2008),Noida,India,August 7-9,2008,pp.105-114.

How to Cite
Shruti, M. (2015). ENHANCED DATA SECURITY USING DIGITAL MEDIA-VIDEO STEGNOGRAPHY. COMPUSOFT: An International Journal of Advanced Computer Technology, 4(7). Retrieved from https://www.ijact.in/index.php/ijact/article/view/24