The development of technology in the era of data transfer technologies over the internet has increased interest in data preservation. This data can contain sensitive and personal data such as medical data, personal photos, and bank information. However, the data is always at risk, it can be used to steal, blackmail, or even threaten safety. Video steganography is the most interesting hiding method to conserve data by hiding secret information in video frames. The video has a complex structure and can have a large amount of confidential data, making it better than other hiding techniques such as text and images. Moreover, data protection will double if this data is encrypted before the merge with video steganography. This paper focuses on comparing various video steganography and cryptography techniques. Also, an analysis of the evaluation parameters for cryptography and steganography techniques. Overall, this paper gives a comprehensive understanding of data protection techniques.
Skip Nav Destination
Article navigation
11 October 2024
THE FIFTH SCIENTIFIC CONFERENCE FOR ELECTRICAL ENGINEERING TECHNIQUES RESEARCH (EETR2024)
15–16 June 2024
Baghdad, Iraq
Research Article|
October 11 2024
Hybrid video steganography and cryptography techniques: Review paper
Noor Dheyaa Majeed;
Noor Dheyaa Majeed
a)
1
Electrical Engineering Technical College, Middle Technical University
, Baghdad, Iraq
a)Corresponding Author: [email protected]
Search for other works by this author on:
Ali Al-Askery;
Ali Al-Askery
b)
1
Electrical Engineering Technical College, Middle Technical University
, Baghdad, Iraq
Search for other works by this author on:
Fadhil Sahib Hasan
Fadhil Sahib Hasan
c)
2
Mustansiriyah University
, Baghdad, Iraq
Search for other works by this author on:
AIP Conf. Proc. 3232, 020013 (2024)
Citation
Noor Dheyaa Majeed, Ali Al-Askery, Fadhil Sahib Hasan; Hybrid video steganography and cryptography techniques: Review paper. AIP Conf. Proc. 11 October 2024; 3232 (1): 020013. https://doi.org/10.1063/5.0236185
Download citation file:
Pay-Per-View Access
$40.00
Sign In
You could not be signed in. Please check your credentials and make sure you have an active account and try again.
16
Views
Citing articles via
Design of a 100 MW solar power plant on wetland in Bangladesh
Apu Kowsar, Sumon Chandra Debnath, et al.
Inkjet- and flextrail-printing of silicon polymer-based inks for local passivating contacts
Zohreh Kiaee, Andreas Lösel, et al.
Production and characterization of corncob biochar for agricultural use
Praphatsorn Rattanaphaiboon, Nigran Homdoung, et al.
Related Content
A systematic literature review on combined framework of secure communication using steganography and cryptography
AIP Conf. Proc. (November 2023)
Enhancing security in public cloud using novel cryptography and enhanced steganography with E-Lsb encoding comparing with traditional steganography
AIP Conf. Proc. (May 2023)
Enhancing medical data security using tiny encryption algorithm and least significant bit steganography
AIP Conf. Proc. (July 2023)
A survey report on cloud based cryptography and steganography procedures
AIP Conf. Proc. (June 2024)
A review of steganography techniques
AIP Conf. Proc. (February 2024)