International Journal of Engineering and Techniques - Volume 4 Issue 1, Jan – Feb 2018 ISSN: 2395-1303 http://www.ijetjournal.org Page 98 Video Steganography using Mid-Point Circle Algorithm and Spatial Domain Technique M.Mary Shanthi Rani 1 , S.Lakshmanan 2 and G.Deepalakshmi 3 1 Assistant Professor, Department of Computer Science and Applications, The Gandhigram Rural Institute – Deemed to be University, Tamil Nadu, India 2 Research Scholar, Department of Computer Science and Applications, The Gandhigram Rural Institute – Deemed to be University, Tamil Nadu, India 3 M.Phil Scholar, Department of Computer Science and Applications, The Gandhigram Rural Institute – Deemed to be University, Tamil Nadu, India I. INTRODUCTION This Computer security, also known as cyber security or IT security is the safeguard of computer systems from the theft or spoil to the hardware, software or the information, as well as from interruption or misdirection of the services they provide. Recent advances in information technology have made quick release and sharing of multimedia information is possible. Now days, it is very unsafe to handle the data in internet against intruders. Data is generally in the form of text, audio, video and image. The two types of information security technique are Cryptography and Steganography [1]. The principle reason for Cryptography is to enhance Confidentiality, Integrity, Non-repudiation and Authentication. The operation of a cipher usually depends on a piece of auxiliary information, called a key. The encoding method is differed relying upon the key, which changes the itemized operation of the algorithm. A key must be chosen before utilizing a figure to scramble a message [2]. Without information of the key, it is to a great degree troublesome, if certainly feasible, to decode the subsequent cipher text into readable plaintext. "Steganography" originates from "Greek". The word stego implies cover and grafia implies writing which signifies Covered writing” [3]. Steganography aims at hiding the existence of the authentic communication. Steganography has developed into one of the most robust and efficient methods to send secret or sensitive data to another party without the knowledge of any interceptor. In steganography, the sender uses usual file like video, image, audio and text known as cover file which would appear to be of no importance to any interceptor. Video Steganography is defined as the art and science of embedding secret data into videos. A video file is a set of frames (still-images) [4]. Some techniques hide data in the individual frames of the video which is known as video steganography as the extension of image steganography. RESEARCH ARTICLE OPEN ACCESS Abstract: Recent advances in information innovation have made quick delivery and sharing of interactive media information possible. In any case, these advances in innovation are leading breaches to information security and personal information. Nowadays, it is exceptionally dangerous to deal with the information on the web against hackers. Researchers are exploring new techniques for concealing message as well as concealing the presence of message. Steganography is the way toward concealing secret information inside an information source which is referred as a cover medium. Steganography has applications in various fields, like medical field, military etc. It is mainly utilized as a part of circumstances where the privacy of data is of prime significance in correspondence. Different types of steganography are introduced based on the sort of cover medium like sound, video, content, picture etc. Video Steganography is the procedure in which message is embedded inside the video kind of cover medium in such manner that is existence. In this paper, Mid-point circle algorithm is used with LSB technique to enhance the efficiency of the embedding process with low distortion . Keywords — Steganography, Spatial domain technique, Least Significant Bit, Midpoint Circle, PSNR, MSE.