Please use this identifier to cite or link to this item: http://hdl.handle.net/2080/3658
Full metadata record
DC FieldValueLanguage
dc.contributor.authorDebnath, Sourabh-
dc.contributor.authorMohapatra, Ramesh Kumar-
dc.date.accessioned2022-04-08T10:03:48Z-
dc.date.available2022-04-08T10:03:48Z-
dc.date.issued2022-02-
dc.identifier.citation2nd International Conference on Artificial Intelligence and Signal Processing (AISP), Virtual Mode, 12th-14th February 2022en_US
dc.identifier.urihttp://hdl.handle.net/2080/3658-
dc.descriptionCopyright belongs to proceeding publisheren_US
dc.description.abstractThe basic fundamental of steganography is to conceal the confidential data in designated cover media which will carry the secret message in such a way that no one can suspect it. With the increase in multimedia content over the net, the probability of information being theft is increased. To make confidential communication secure, people choose different data hiding techniques. Recently, steganography has gained popularity in information hiding. Information hiding is a subject that manages the concealing of classified data from attackers and hackers. Though the secret messages are not visible to human eyes but can be noticeable under statistical representation of cover media. The coverless hiding technique doesn’t modify the cover object. However, the cover object is used to transfer confidential data. A mapping relationship is created among cover objects and confidential data by following the characteristics of cover media. The term “coverless” is without any modification in the cover image the confidential data can be sent. The prime advantage of using a coverless approach is, it cannot be detected under steganalysis as no embedding is performed in cover media. This technique has drawn more attention in the data hiding field. Currently, it has been observed that most of the research work in coverless hiding approaches selected text and image as cover media. A very few researchers have considered video as cover media in coverless approach which has plentiful contents and provides the opportunity to explore.en_US
dc.subjectCoverlessen_US
dc.subjectVideo Steganographyen_US
dc.subjectCover objecten_US
dc.titleA Study on Secret Data Sharing through Coverless Steganographyen_US
dc.typeBooken_US
Appears in Collections:Conference Papers

Files in This Item:
File Description SizeFormat 
2022_AISP_SDebnath_AStudy.pdf100.75 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.