Asian Journal of Applied Science and Technology (AJAST) (Open Access Quarterly International Journal) Volume 2, Issue 2, Pages 901-908, April-June 2018 901 | P age Online ISSN: 2456-883X Impact Factor: 1.805 Website: www.ajast.net Enhanced Video Steganography with Text Perturbation in Encoded AVI Video Streams C.B.Syamsudha 1 and S.Prabagar 2 1 UG Student, Department of CSE, Excel Engineering College, Pallakapalayam, Tamilnadu, India. 2 Assistant Professor, Department of CSE, Excel Engineering College, Pallakapalayam, Tamilnadu, India. Article Received: 27 January 2018 Article Accepted: 23 February 2018 Article Published: 23 May 2018 1. INTRODUCTION Image Processing is a technique to enhance raw images received from cameras/sensors placed on satellites, space probes and aircrafts or pictures taken in normal day-to- day life for various applications. Various techniques have been developed in Image Processing during the last four to five decades. Most of the techniques are developed for enhancing images obtained from unmanned spacecrafts, space probes and military reconnaissance flights. Image Processing systems are becoming popular due to easy availability of powerful personnel computers, large size memory devices and graphics software. As an effective and popular means for privacy protection, encryption converts the ordinary signal into unintelligible data, so that the traditional signal processing usually takes place before encryption or after decryption. However, in some scenarios that a content owner does not trust the processing service provider, the ability to manipulate the encrypted data when keeping the plain content unrevealed is desired. For instance, when the secret data to be transmitted are encrypted, a channel provider without any knowledge of the cryptographic key may tend to compress the encrypted data due to the limited channel resource. 2. LITERATURE REVIEW Bin Zhao [1] et al describe the most watermarking schemes for copyright protection, a seller usually embeds a watermark in multimedia content to identify a buyer. When an unauthorized copy is found by the seller, the traitor‟s identity can be traced by the embedded watermark. However, it incurs both repudiation issue and framing issue. To solve these problems, some buyer seller watermarking protocols have been proposed based on watermarking scheme in the encrypted domain. The enhanced scheme increases effective watermarking capacity, avoids additional overhead and overcomes an inherent defect that watermarking capacity depends on the probability distribution of input watermark sequence. Based on the security requirements of buyer seller. Rini.J et al [6] describe the secure and authenticated discrete reversible data hiding in cipher images deals with security and ABSTRACT The main purpose of this study is to explore secure data transmission with the video files. Generally, digital video sometimes are stored and processed in an encrypted format to maintain privacy and security. It is necessary to carry out data hiding operation with the encrypted videos. In such a way, in encrypted domain without decryption safeguard the confidentiality of the content through data hiding. In addition, it is more proficient without decryption followed by data thrashing and re-encryption. A new methodology of data hiding directly in the encrypted version of AVI video stream is proposed with this study. The approach is investigated with AVI video encryption (Triple DES), perturbation of data, embedding and extracting functionalities. The AVI file and the code words of motion vector differences are encrypted with streams. Finally, the sender may wish to embed additional data with encrypted data with codeword swap approach, without affecting the actual content of the motion picture files. Likewise, in the receiver side decryption operation and data extraction from the encrypted video files is carried out. Keywords: Steganography and image processing.