Open Access
MATEC Web of Conferences
Volume 57, 2016
4th International Conference on Advancements in Engineering & Technology (ICAET-2016)
Article Number 02003
Number of page(s) 6
Section Information Systems & Computer Science Engineering
Published online 11 May 2016
  1. P. Selvigrija and E. Ramya, “Video by Linked List Method,” no. March, (2015)
  2. M. Hussain and M. Hussain, “A Survey of video Steganography Techniques,” Int. J. Adv. Sci. Technol., vol. 54, pp. 113–124,(2013)
  3. G. Kaur and A. Kochhar, “A Steganography Implementation based on LSB & DCT,” vol.4, no. 1, pp. 35–41, (2012)
  4. P. Chen and H. Lin, “A DWT Based Approach for Image Steganography,” Int. J. of Applied Sci. Eng., vol. 4, no. 3, pp. 275–290, (2006)
  5. M. Juneja and P. S. Sandhu, “An Improved LSB Based Steganography Technique for RGB Color Images,” Int. J. Comput. Commun. Eng., vol. 2, no. 4, pp. 513–517, (2013) [CrossRef]
  6. kaur Amandeep kaur, manpreet, “Improved Security Mechanism of Text in Video using Steganographic Technique,” Int. J. Adv. Res. Comput. Sci. Softw. Eng., vol. 7782, no. 5, pp. 44–51, (2014)
  7. M. Dixit, N. Bhide, S. Khankhoje, and R. Ukarande, “Video Steganography,” 2015 Int. Conf. Pervasive Comput., vol. 00, no. c, pp. 1–4, (2015)
  8. R. J. Mstafa and I. Studen, “A High Payload Video Steganography Algorithm in DWT Domain Based on BCH Codes (15, 11),” (2015)
  9. J. Gupta, “A Review on Steganography techniques and methods,” vol. 1, no. 1, pp. 1–4, (2015)
  10. C. Science and B. Bridgeport, “A Novel Video Steganography Algorithm in the Wavelet Domain Based on the KLT Tracking Algorithm and BCH Codes,”(2015)