Encryption of Text File in a Video Using Adaptive Compression of Video
Journal Title: UNKNOWN - Year 2013, Vol 2, Issue 11
Abstract
Steganography, is the art of providing security to text file by embedding into a carrier which can be a text or an multimedia file. This paper proposes a method for the real-time embedding of information in a compressed video. Unlike images Video files are generally a collection of images which can be more eligible than other multimedia files, because of its size and memory requirements. The great advantages of video files are the large amount of data that can be hidden inside and the fact that it is a moving stream of image. This paper provides a new technique that is motion vector is used to embed the data in the moving objects. We focus on the Least Significant Bit (LSB) technique is an important insertion technique for embedding data into video file and comparing the qualitative and quantitative performance of algorithms (compression).
Algorithm for License Plate Localization and Recognition for Tanzania Car Plate Numbers
Algorithm for License Plate Localization and Recognition for Tanzania Car Plate Numbers
A Novel Approach of Modified Run Length Encoding Scheme for High Speed Data Communication Application
This paper presents a Modified Run Length Encoding (RLE) Scheme for High Speed Data Compression. Compression is efficient technique to reduce the memory occupancy and to improve the performance of the system from many av...
Data Mining: Finding Outliers from Different Types of Data using Dissimilarity Data Structure
Data Mining: Finding Outliers from Different Types of Data using Dissimilarity Data Structure
Characteristics of ZnO-based semiconductor ceramics doped with GeO2 and PbO
The effect of GeO2 and PbO on physical, microstructure, and the electrical properties of ZnO based ceramics is investigated. A decrease in water absorption was recorded with rise in maturing temperature and increase in...
Advanced Persistent Threat Detection System
The Advanced Persistent Threat has quickly risen as a top-level concern for organizations of all types and sizes. Under today's security paradigm, determined attackers will eventually find their way into their target-s n...