Improved Video Steganography for Secured Communication Using Clustering and Chaotic Mapping

Author(s):  
Lakshmi Harika Palivela ◽  
M.R. Sumalatha ◽  
A. Naveen ◽  
S. Maithreyan ◽  
S.V. Vijay
2020 ◽  
Author(s):  
Prashnatita Pal ◽  
Dr.Bikash Chandra Sahana ◽  
Dr. Amiya Kumar Mallick ◽  
Dr. Jayanta Poray

Author(s):  
Shivaprasad More ◽  
Rahul Sonkamble ◽  
Udaykumar Naik ◽  
Shraddha Phansalkar ◽  
Priyanka More ◽  
...  

Author(s):  
Mrudul Dixit ◽  
Nikita Bhide ◽  
Sanika Khankhoje ◽  
Rajashwini Ukarande
Keyword(s):  

2014 ◽  
Vol 984-985 ◽  
pp. 1357-1363
Author(s):  
M. Vinothini ◽  
M. Manikandan

During real time there are problems in transmitting video directly to the client. One of the main problems is, intermediate intelligent proxy can easily hack the data as the transmitter fails to address authentication, and fails to provide security guarantees. Hence we provide steganography and cryptography mechanisms like secure-code, IP address and checksum for authentication and AES algorithm with secret key for security. Although the hacker hacks the video during transmission, he cannot view the information. Based on IP address and secure-code, the authenticated user only can get connected to the transmitter and view the information. For further improvement in security, the video is converted into frames and these frames are split into groups and separate shared key is applied to each group of frames for encryption and decryption. This secured communication process is applied in image processing modules like face detection, edge detection and color object detection. To reduce the computation time multi-core CPU processing is utilized. Using multi-core, the tasks are processed in parallel fashion.


Sign in / Sign up

Export Citation Format

Share Document