DOI:10.20894/IJCNES.
Periodicity: Bi Annual.
Impact Factor:
SJIF:5.217
Submission:Any Time
Publisher:IIR Groups
Language:English
Review Process:
Double Blinded

News and Updates

Author can submit their paper through online submission. Click here

Paper Submission -> Blind Peer Review Process -> Acceptance -> Publication.

On an average time is 3 to 5 days from submission to first decision of manuscripts.

Double blind review and Plagiarism report ensure the originality

IJCNES provides online manuscript tracking system.

Every issue of Journal of IJCNES is available online from volume 1 issue 1 to the latest published issue with month and year.

Paper Submission:
Any Time
Review process:
One to Two week
Journal Publication:
June / December

IJCNES special issue invites the papers from the NATIONAL CONFERENCE, INTERNATIONAL CONFERENCE, SEMINAR conducted by colleges, university, etc. The Group of paper will accept with some concession and will publish in IJCNES website. For complete procedure, contact us at admin@iirgroups.org

Paper Template
Copyright Form
Subscription Form
web counter
web counter
Published in:   Vol. 4 Issue 2 Date of Publication:   December 2015

Achieving Secret Communication on Video Files Using Steganography

R.Umadevi,G.M.Nasira

Page(s):   82-85 ISSN:   2278-2397
DOI:   10.20894/IJCNES.103.004.002.007 Publisher:   Integrated Intelligent Research (IIR)


  1. Wei-Jen Wang., Cheng-Ta Huang., and Shiuh-Jeng Wang,   "VQ Applications in Steganographic Data Hiding Upon Multimedia Images",   IEEE Systems Journal   ,Vol.5   ,2011
    View Artical

  2. Hussein A. Aly,   "Data Hiding in Motion Vectors of Compressed Video Based on Their Associated Prediction Error",   IEEE Transactions On Information Forensics And Sec   ,2011
    View Artical

  3. WeiqiLuo, Fangjun Huang, Member, and Jiwu Huang,   "Edge Adaptive Image Steganography Based on LSB Matching Revisited",   IEEE Transactions On Information Forensics And Sec   ,2010
    View Artical

  4. Yong Feng Huang, Shanyu Tang, and Jian Yuan,   "Steganography in Inactive Frames of VoIP Streams Encoded by Source Codec",   IEEE Transactions On Information Forensics And Sec   ,Vol.6   ,2011
    View Artical

  5. H S Manjunatha Reddy, K B Raja,   "Wavelet based Secure Steganography with Scrambled Payload",   International Journal of Innovative Technology and   ,2012
    View Artical

  6. RatnakirtiRoya, AnirbanSarkara, SuvamoyChangder,   "Chaos based Edge Adaptive Image Steganography",   International Conference on Computational Intellig   ,2013
    View Artical

  7. KousikDasguptaa, Jyotsna Kumar Mondalb, ParamarthaDuttac,   "Optimized Video Steganography using Genetic Algorithm (GA)",   International Conference on Computational Intellig   ,2013
    View Artical

  8. Hamdy M. Kelash, Osama F. Abdel Wahab , Osama A. Elshakankiry, Hala S. El-sayed,   "Utilization of Steganographic Techniques in Video Sequences",   International Journal of Computing and Network Tec   ,2014
    View Artical

  9. Steganography For Two And Three LSBs Using Extended Substitution Algorithm,   "ICTACT Journal On Communication Technology   ,2013
    View Artical

  10. Dubravko Culibrk, Milan Mirkovic,VladimirZlokolica, MajaPokric, Vladimir Crnojevic, DraganKukolj,   "Salient Motion Features for Video Quality Assessment",   IEEE Transactions on Image Procesing   ,Vol.201   ,2011
    View Artical