{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T04:34:22Z","timestamp":1772771662486,"version":"3.50.1"},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,1,19]],"date-time":"2021-01-19T00:00:00Z","timestamp":1611014400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,19]],"date-time":"2021-01-19T00:00:00Z","timestamp":1611014400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimedia Systems"],"published-print":{"date-parts":[[2021,6]]},"DOI":"10.1007\/s00530-020-00735-9","type":"journal-article","created":{"date-parts":[[2021,1,19]],"date-time":"2021-01-19T08:03:43Z","timestamp":1611043423000},"page":"417-428","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["A hybrid DST-SBPNRM approach for compressed video steganography"],"prefix":"10.1007","volume":"27","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5685-756X","authenticated-orcid":false,"given":"Rachna","family":"Patel","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0407-5272","authenticated-orcid":false,"given":"Kalpesh","family":"Lad","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5797-5288","authenticated-orcid":false,"given":"Mukesh","family":"Patel","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8922-8364","authenticated-orcid":false,"given":"Madhavi","family":"Desai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,19]]},"reference":[{"key":"735_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2018.09.091","author":"Y Liu","year":"2018","unstructured":"Liu, Y., Liu, S., Wang, Y., Zhao, H., Liu, S.: Video steganography: a review. Neurocomputing (2018). https:\/\/doi.org\/10.1016\/j.neucom.2018.09.091. ((accepted manuscript; Elsevier November 2018))","journal-title":"Neurocomputing"},{"issue":"20","key":"735_CR2","doi-asserted-by":"publisher","first-page":"21749","DOI":"10.1007\/s11042-016-4055-1","volume":"76","author":"RJ Mstafa","year":"2017","unstructured":"Mstafa, R.J., Elleithy, K.M.: Compressed and raw video steganography techniques: a comprehensive survey and analysis. Multimedia Tools Appl. 76(20), 21749\u201321786 (2017)","journal-title":"Multimedia Tools Appl."},{"key":"735_CR3","doi-asserted-by":"publisher","unstructured":"Mstafa, R.J., Elleithy, K.M., Abdelfattah, E.: Video steganography techniques: taxonomy, challenges, and future directions. Applications and Technology Conference (LISAT), 2017 IEEE Long Island, pp. 1\u20136. IEEE (2017).\u00a0https:\/\/doi.org\/10.1109\/LISAT.2017.8001965","DOI":"10.1109\/LISAT.2017.8001965"},{"key":"735_CR4","doi-asserted-by":"publisher","DOI":"10.1002\/9780470989418","volume-title":"The H.264 advanced video compression standard","author":"IE Richardson","year":"2010","unstructured":"Richardson, I.E.: The H.264 advanced video compression standard. Wiley, New York (2010).. ((ISBN: 978-0-470-51692-8))"},{"key":"735_CR5","doi-asserted-by":"publisher","unstructured":"Mstafa, R.J., Elleithy, K.M.: A DCT-based robust video steganographic method using BCH error correcting codes. In: 2016 IEEE Long Island Systems, Applications and Technology Conference (LISAT). IEEE (2016).\u00a0https:\/\/doi.org\/10.1109\/LISAT.2016.7494111","DOI":"10.1109\/LISAT.2016.7494111"},{"key":"735_CR6","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1016\/j.cogsys.2019.09.008","volume":"59","author":"S Liu","year":"2020","unstructured":"Liu, S., Xu, D.: A robust steganography method for HEVC based on secret sharing. Cogn. Syst. Res. 59, 207\u2013220 (2020). https:\/\/doi.org\/10.1016\/j.cogsys.2019.09.008","journal-title":"Cogn. Syst. Res."},{"key":"735_CR7","doi-asserted-by":"publisher","unstructured":"Yilmaz, A., Alatan, A.A.: Error concealment of video sequences by data hiding. In: 2003 International Conference on Image Processing, pp. 679\u2013682. IEEE (2003).\u00a0https:\/\/doi.org\/10.1109\/ICIP.2003.1246771","DOI":"10.1109\/ICIP.2003.1246771"},{"key":"735_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1088\/1742-6596\/1003\/1\/012035","volume":"1003","author":"WA Shukur","year":"2018","unstructured":"Shukur, W.A., Abdullah, W.N., Qurban, L.K.: Information hiding in digital video using DCT, DWT and CvT. J. Phys. Conf. Ser. 1003, 1\u201319 (2018). ((Conference 1))","journal-title":"J. Phys. Conf. Ser."},{"key":"735_CR9","doi-asserted-by":"publisher","unstructured":"Mstafa, R.J., Elleithy, K.M.: A novel video steganography algorithm in DCT domain based on hamming and BCH codes. In: 37th IEEE Sarnoff Symposium, pp. 208\u2013213. IEEE (2016). https:\/\/doi.org\/10.1109\/SARNOF.2016.7846757","DOI":"10.1109\/SARNOF.2016.7846757"},{"key":"735_CR10","doi-asserted-by":"publisher","unstructured":"Mstafa, R.J., Elleithy, K.M., Abdelfattah, E.: A robust and secure video steganography method in DWT-DCT domains based on multiple object tracking and ECC. IEEE Access (vol. 5), pp. 5354\u20135365. IEEE, Institute of Electrical Electronics Engineers, Inc. (2017). https:\/\/doi.org\/10.1109\/ACCESS.2017.2691581, Accessed 6th Apr 2017. (ISSN No.: 2169-3536)","DOI":"10.1109\/ACCESS.2017.2691581"},{"key":"735_CR11","doi-asserted-by":"publisher","unstructured":"Britanak, V., Rao, K.R.: Two-dimensional DCT\/DST universal computational structure for 2m\u00d72n block sizes. IEEE Trans. Signal Process. (2000). https:\/\/doi.org\/10.1109\/78.875483","DOI":"10.1109\/78.875483"},{"key":"735_CR12","doi-asserted-by":"crossref","unstructured":"Chan, A., Zeng, K., Mohapatra, P., Lee, S.-J., Banerjee, S.: Metrics for evaluating video streaming quality in Lossy IEEE 802.11 wireless networks. In: INFOCOM'10: Proceedings of the 29th Conference on Information Communications, pp. 1613\u20131621 (2010)","DOI":"10.1109\/INFCOM.2010.5461979"},{"key":"735_CR13","unstructured":"Video compression Guru, Elecard Video (2019). https:\/\/www.elecard.com\/videos"},{"key":"735_CR14","doi-asserted-by":"publisher","first-page":"167","DOI":"10.13052\/jcsm2245-1439.531","volume":"53","author":"RJ Mstafa","year":"2017","unstructured":"Mstafa, R.J., Elleithy, K.M.: An ECC\/DCT\u2014based robust video steganography algorithm for secure data communication. J. Cyber Secur. 53, 167\u2013194 (2017)","journal-title":"J. Cyber Secur."},{"key":"735_CR15","unstructured":"Tampere University of Technology, Ultra Video Group (2018). http:\/\/ultravideo.cs.tut.fi\/#testsequences. Accessed on 15 Jul 2018"},{"key":"735_CR16","unstructured":"Xiph.org Foundation, Derf\u2019s test media collection (2017). https:\/\/media.xiph.org\/video\/derf\/. Accessed on 27 Oct 2017"},{"key":"735_CR17","unstructured":"Remega video database (2017). https:\/\/github.com\/remega\/video_database\/tree\/master\/videos. Accessed on 8 Nov 2017"},{"issue":"10","key":"735_CR18","doi-asserted-by":"publisher","first-page":"11979","DOI":"10.1007\/s11042-017-4844-1","volume":"77","author":"J Yang","year":"2017","unstructured":"Yang, J., Li, S.: An efficient information hiding method based on motion vector space encoding for HEVC. Multimedia Tools Appl. 77(10), 11979\u201312001 (2017)","journal-title":"Multimedia Tools Appl."}],"container-title":["Multimedia Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-020-00735-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00530-020-00735-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-020-00735-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,16]],"date-time":"2021-06-16T05:12:26Z","timestamp":1623820346000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00530-020-00735-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,19]]},"references-count":18,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,6]]}},"alternative-id":["735"],"URL":"https:\/\/doi.org\/10.1007\/s00530-020-00735-9","relation":{},"ISSN":["0942-4962","1432-1882"],"issn-type":[{"value":"0942-4962","type":"print"},{"value":"1432-1882","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,19]]},"assertion":[{"value":"23 September 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 December 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 January 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}