{"title":"A Survey of different video steganography approaches against man-in-the middle attacks","authors":"V. Annapurna, S. Nagaraja Rao, M. N. Giriprasad","doi":"10.1109/I-SMAC52330.2021.9640974","DOIUrl":null,"url":null,"abstract":"Steganography is necessary to encrypt data efficiently between different organizations. Steganography can have significant use in transmitting secret data through videos. However, this is susceptible to third party attacks such as video change, copyright change, security update changes etc. Numerous cryptographic algorithms have been proposed to be incorporated into data hiding techniques. As the number of sensitive data required is large, these models require powerful computer memory and high processing cycles to process. In that case, these cryptographic models could not be applied to large video data for integrity computation and encryption. In this paper, different video steganography approaches and their limitations are studied on the video databases.","PeriodicalId":178783,"journal":{"name":"2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/I-SMAC52330.2021.9640974","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Steganography is necessary to encrypt data efficiently between different organizations. Steganography can have significant use in transmitting secret data through videos. However, this is susceptible to third party attacks such as video change, copyright change, security update changes etc. Numerous cryptographic algorithms have been proposed to be incorporated into data hiding techniques. As the number of sensitive data required is large, these models require powerful computer memory and high processing cycles to process. In that case, these cryptographic models could not be applied to large video data for integrity computation and encryption. In this paper, different video steganography approaches and their limitations are studied on the video databases.