R. Poovendran, M. Sangeetha, G. Saranya, G. Vennila
{"title":"A video steganography using Hamming Technique for image Processing using optimized algorithm","authors":"R. Poovendran, M. Sangeetha, G. Saranya, G. Vennila","doi":"10.1109/ICSCAN49426.2020.9262341","DOIUrl":null,"url":null,"abstract":"Right now, steganography is gotten a standard choice for puzzle data correspondence. The introduction of the steganography computation relies upon the inserting effectiveness, installing payload, and power against assailants. At the present time, propose another video steganography estimation on the distinctive thing following computation and Hamming codes. The proposed figuring fuses four particular sections. In first place, the puzzle message is already processed, and Hamming codes (n, k) are given to convey the encoding message. Backing, a thought on different thing following figuring is applied on spread chronicles in order to recognize the territories of eagerness of the articles.","PeriodicalId":6744,"journal":{"name":"2020 International Conference on System, Computation, Automation and Networking (ICSCAN)","volume":"28 1","pages":"1-5"},"PeriodicalIF":0.0000,"publicationDate":"2020-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 International Conference on System, Computation, Automation and Networking (ICSCAN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSCAN49426.2020.9262341","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Right now, steganography is gotten a standard choice for puzzle data correspondence. The introduction of the steganography computation relies upon the inserting effectiveness, installing payload, and power against assailants. At the present time, propose another video steganography estimation on the distinctive thing following computation and Hamming codes. The proposed figuring fuses four particular sections. In first place, the puzzle message is already processed, and Hamming codes (n, k) are given to convey the encoding message. Backing, a thought on different thing following figuring is applied on spread chronicles in order to recognize the territories of eagerness of the articles.