Secret Channel using Video Steganography
DOI: http://dx.doi.org/10.30630/joiv.1.4-2.71
Abstract
Keywords
Full Text:
PDFReferences
W. Stallings, Cryptography and Network Security: Principles and Practices 7th Edition, Pearson Education India, 2017.
H. Delfs and H. Knebl, Symmetric-key Encryption, Journal of Introduction to Cryptography, Publisher Springer, pp. 11-31, 2007.
N. Daswani, C. Kern and A. Kesavan, Asymmetric Key Cryptography, Journal of Foundations of Security: What Every Programmer Needs to Know, Publisher Springer, pp221-226, 2007
C. D. Canniere and B. Preneel, Trivium, Journal in New Stream Cipher Designs, Publisher Springer, pp. 224-266, 2008.
M. Hell, T. Johansson and W. Meier, Grain: A Stream Cipher for Constrained Environments, Journal in International Journal of Wireless and Mobile Computing, Publisher Inderscience, Vol 2, No. 1, pp. 86-93, 2007.
J. Neil F and J. Sushil, Exploring Steganography: Seeing the Unseen, Journal of Computer, Publisher IEEE, Vol. 31, No. 2, 1998.
P. Fabien AP, A. Ross J and K. Markus G, Information Hiding-A Survey, Proceeding of the IEEE, Publisher IEEE, Vol. 87, No. 7, pp. 1062-1078, 1999.
BS. Champakamala, K. Padmini and DK. Radhika, Least Significant Bit Algorithm for Image Steganography, Journal of International Journal of Advance Computer Technology, Vol. 3, No. 4, pp.34-38, 2013.
AP. Sherly and PP. Amritha, A Compressed Video Steganography Using TPVD, International Journal of Database Management System (IJDMS), Vol. 2, No. 3, 2010.
J. P. Cruz, N. J. Libatique and G. Tangonan, Steganography and Data Hiding in Flash Video (FLV), TENCON 2012-2012 IEEE Region 10 Conference, pp. 1-6, 2012.
DeEgger Embedder, (2017). URL: http://deegger-embedder.findmysoft.com/.
OurSecret, (2017). URL: http://oursecret.soft112.com/.
J. B. Dundas, Object-Oriented Software Development Life Cycle, Proceedings of the 2nd National Conference, INDIACom, 2008.