{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,18]],"date-time":"2026-05-18T11:22:38Z","timestamp":1779103358666,"version":"3.51.4"},"reference-count":95,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2021,3,27]],"date-time":"2021-03-27T00:00:00Z","timestamp":1616803200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,3,27]],"date-time":"2021-03-27T00:00:00Z","timestamp":1616803200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimedia Systems"],"published-print":{"date-parts":[[2021,10]]},"DOI":"10.1007\/s00530-021-00763-z","type":"journal-article","created":{"date-parts":[[2021,3,27]],"date-time":"2021-03-27T15:02:35Z","timestamp":1616857355000},"page":"985-1024","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":30,"title":["Study and investigation of video steganography over uncompressed and compressed domain: a comprehensive review"],"prefix":"10.1007","volume":"27","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5685-756X","authenticated-orcid":false,"given":"Rachna","family":"Patel","sequence":"first","affiliation":[]},{"given":"Kalpesh","family":"Lad","sequence":"additional","affiliation":[]},{"given":"Mukesh","family":"Patel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,27]]},"reference":[{"key":"763_CR1","doi-asserted-by":"publisher","DOI":"10.5121\/ijsptm.2012.2201","author":"K Dasgupta","year":"2012","unstructured":"Dasgupta, K., Mandal, J.K., Dutta, P.: Hash based least significant bit technique for video steganography (HLSB). Int. J. Secur. Privacy Trust Manag. (IJSPTM) (2012). https:\/\/doi.org\/10.5121\/ijsptm.2012.2201","journal-title":"Int. J. Secur. Privacy Trust Manag. (IJSPTM)"},{"issue":"17","key":"763_CR2","doi-asserted-by":"publisher","first-page":"10311","DOI":"10.1007\/s11042-015-3060-0","volume":"75","author":"RJ Mstafa","year":"2015","unstructured":"Mstafa, R.J., Elleithy, K.M.: \u201cA video steganography algorithm based on Kanade-Lucas-Tomasi tracking algorithm and error correcting codes. Multimed. Tools Appl. 75(17), 10311\u201310333 (2015). https:\/\/doi.org\/10.1007\/s11042-015-3060-0","journal-title":"Multimed. Tools Appl."},{"key":"763_CR3","doi-asserted-by":"publisher","unstructured":"Mstafa, R.J., Elleithy, K.M., Abdelfattah, E.: Video steganography techniques: taxonomy, challenges, and future directions. In: Applications and Technology Conference (LISAT), 2017 IEEE Long Island. pp. 1\u20136, IEEE 2017. https:\/\/doi.org\/10.1109\/LISAT.2017.8001965","DOI":"10.1109\/LISAT.2017.8001965"},{"key":"763_CR4","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1016\/j.cogsys.2019.09.008","volume":"59","author":"S Liu","year":"2020","unstructured":"Liu, S., Xu, D.: A robust steganography method for HEVC based on secret sharing. Cognitive Syst. Res. 59, 207\u2013220 (2020). https:\/\/doi.org\/10.1016\/j.cogsys.2019.09.008","journal-title":"Cognitive Syst. Res."},{"issue":"17","key":"763_CR5","doi-asserted-by":"publisher","first-page":"7063","DOI":"10.1007\/s11042-014-1952-z","volume":"74","author":"MM Sadek","year":"2014","unstructured":"Sadek, M.M., Khalifa, A.S., Mostafa, G.M.: Video steganography: a comprehensive review. Multimed. Tools Appl. 74(17), 7063\u20137094 (2014). https:\/\/doi.org\/10.1007\/s11042-014-1952-z","journal-title":"Multimed. Tools Appl."},{"issue":"3","key":"763_CR6","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1007\/s11265-007-0095-0","volume":"49","author":"F-C Chang","year":"2007","unstructured":"Chang, F.-C., Hang, H.-M.: Layered access control schemes on watermarked scalable media. J. VLSI Signal Process. 49(3), 443\u2013455 (2007). https:\/\/doi.org\/10.1007\/s11265-007-0095-0","journal-title":"J. VLSI Signal Process."},{"issue":"16","key":"763_CR7","doi-asserted-by":"publisher","first-page":"3379","DOI":"10.1016\/j.ins.2011.04.007","volume":"181","author":"H-C Huang","year":"2011","unstructured":"Huang, H.-C., Chu, S.-C., Pan, J.-S., Huang, C.-Y., Liao, B.-Y.: Tabu search based multi-watermarks embedding algorithm with multiple description coding. Inf. Sci. J. 181(16), 3379\u20133396 (2011). https:\/\/doi.org\/10.1016\/j.ins.2011.04.007","journal-title":"Inf. Sci. J."},{"key":"763_CR8","doi-asserted-by":"publisher","unstructured":"Disha, K.S.: A review on video steganography techniques in spatial domain. In: Recent Developments in Control, Automation & Power Engineering (RDCAPE) 2017, pp. 366\u2013371, IEEE 2017. https:\/\/doi.org\/10.1109\/RDCAPE.2017.8358298","DOI":"10.1109\/RDCAPE.2017.8358298"},{"key":"763_CR9","doi-asserted-by":"publisher","unstructured":"Srinivasan, Y., Nutter, B., Mitra, S., Phillips, B., Ferris, D.: Secure transmission of medical records using high capacity steganography. In: 17th IEEE Symposium on Computer-Based Medical Systems, IEEE 2004. https:\/\/doi.org\/10.1109\/CBMS.2004.1311702","DOI":"10.1109\/CBMS.2004.1311702"},{"key":"763_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-018-2639-4","author":"S Balu","year":"2018","unstructured":"Balu, S., Babu, C.N.K., Amudha, K.: \u201cSecure and efficient data transmission by video steganography in medical imaging system. Cluster Comput. (2018). https:\/\/doi.org\/10.1007\/s10586-018-2639-4","journal-title":"Cluster Comput."},{"key":"763_CR11","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/s10916-018-1103-6","volume":"42","author":"AH Mohsin","year":"2018","unstructured":"Mohsin, A.H., Zaidan, A.A., Zaidan, B.B., Ariffin, S.A.B., Albahri, O.S., Albahri, A.S., Alsalem, M.A., Mohammed, K.I., Hashim, M.: Real-time medical systems based on human biometric steganography: a systematic review. J. Med. Syst. 42, 245 (2018). https:\/\/doi.org\/10.1007\/s10916-018-1103-6","journal-title":"J. Med. Syst."},{"key":"763_CR12","doi-asserted-by":"publisher","unstructured":"Hanafy, A.A., Salama, G.I., Mohasseb, Y.Z.: A secure covert communication model based on video steganography. In: 2008 IEEE military communications conference, pp. 1\u20136, IEEE 2008. https:\/\/doi.org\/10.1109\/MILCOM.2008.4753107","DOI":"10.1109\/MILCOM.2008.4753107"},{"key":"763_CR13","unstructured":"Kaur, M., Kaur, A.: Improved security mechanism of text in video by using steganographic technique. Int. J. Adv. Res. Comput. Sci. Manag. Stud. 2(10), 44\u201351 (2014)"},{"key":"763_CR14","doi-asserted-by":"publisher","DOI":"10.15680\/IJIRSET.2015.0410114]","author":"N Khan","year":"2015","unstructured":"Khan, N., Gorde, K.S.: Video steganography by using statistical key frame extraction method and LSB technique. Int J Innov Res Sci Eng Technol (2015). https:\/\/doi.org\/10.15680\/IJIRSET.2015.0410114]","journal-title":"Int J Innov Res Sci Eng Technol"},{"key":"763_CR15","doi-asserted-by":"publisher","first-page":"670","DOI":"10.1016\/j.cose.2009.04.002","volume":"28","author":"O Cetin","year":"2009","unstructured":"Cetin, O., Ozcerit, A.T.: \u201cA new steganography algorithm based on color histograms for data embedding into raw video streams. Comput. Secur. J. 28, 670\u2013682 (2009). https:\/\/doi.org\/10.1016\/j.cose.2009.04.002","journal-title":"Comput. Secur. J."},{"key":"763_CR16","doi-asserted-by":"publisher","unstructured":"Cheddad, A., Condell, J., Curran, K., McKevitt, P.: Skin tone based Steganography in video files exploiting the YCbCr colour space. In: 2008 IEEE International Conference on Multimedia and Expo, pp. 905\u2013908, IEEE 2008. https:\/\/doi.org\/10.1109\/ICME.2008.4607582","DOI":"10.1109\/ICME.2008.4607582"},{"key":"763_CR17","doi-asserted-by":"publisher","first-page":"937","DOI":"10.1016\/j.dss.2008.03.005","volume":"45","author":"GR Tadiparthi","year":"2008","unstructured":"Tadiparthi, G.R., Sueyoshi, T.: A novel steganographic algorithm using animations as cover. Decision Support Syst. 45, 937\u2013948 (2008). https:\/\/doi.org\/10.1016\/j.dss.2008.03.005","journal-title":"Decision Support Syst."},{"issue":"7","key":"763_CR18","doi-asserted-by":"publisher","first-page":"670","DOI":"10.1016\/j.cose.2009.04.002","volume":"28","author":"O Cetin","year":"2009","unstructured":"Cetin, O., Ozcerit, A.T.: A new steganography algorithm based on color histograms for data embedding into raw video streams. Comput. Secur. 28(7), 670\u2013682 (2009). https:\/\/doi.org\/10.1016\/j.cose.2009.04.002","journal-title":"Comput. Secur."},{"issue":"12","key":"763_CR19","doi-asserted-by":"publisher","first-page":"2465","DOI":"10.1016\/j.sigpro.2009.04.022","volume":"89","author":"A Cheddad","year":"2009","unstructured":"Cheddad, A., Condell, J., Curran, K., McKevitt, P.: A skin tone detection algorithm for an adaptive approach to steganography. Signal Process J 89(12), 2465\u20132478 (2009). https:\/\/doi.org\/10.1016\/j.sigpro.2009.04.022","journal-title":"Signal Process J"},{"issue":"2","key":"763_CR20","first-page":"170","volume":"5","author":"M Ramalingam","year":"2011","unstructured":"Ramalingam, M.: Stego machine\u2014video steganography using modified LSB algorithm. World Acad. Sci. Eng. Technol. Int. J. Inf. Commun. Eng. 5(2), 170\u2013173 (2011)","journal-title":"World Acad. Sci. Eng. Technol. Int. J. Inf. Commun. Eng."},{"key":"763_CR21","doi-asserted-by":"publisher","unstructured":"Bhole, A.T., Patel, R.: Steganography over video file using random byte hiding and LSB technique. In: 2012 IEEE International Conference on Computational Intelligence and Computing Research, 2012. https:\/\/doi.org\/10.1109\/ICCIC.2012.6510230","DOI":"10.1109\/ICCIC.2012.6510230"},{"key":"763_CR22","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1016\/j.ins.2011.06.003","volume":"188","author":"D-C Lou","year":"2012","unstructured":"Lou, D.-C., Hu, C.-H.: LSB steganographic method based on reversible histogram transformation function for resisting statistical steganalysis. Inf. Sci. 188, 346\u2013358 (2012). https:\/\/doi.org\/10.1016\/j.ins.2011.06.003","journal-title":"Inf. Sci."},{"key":"763_CR23","doi-asserted-by":"publisher","unstructured":"Alavianmehr, M.A., Rezaei, M., Helfroush, M.S., Tashk, A.: A lossless data hiding scheme on video raw data robust against H.264\/AVC compression. In: 2nd International e-Conference on Computer and Knowledge Engineering (ICCKE), pp. 194\u2013198, IEEE 2012. https:\/\/doi.org\/10.1109\/ICCKE.2012.6395377","DOI":"10.1109\/ICCKE.2012.6395377"},{"issue":"12","key":"763_CR24","doi-asserted-by":"publisher","first-page":"7272","DOI":"10.1109\/TIT.2012.2217072","volume":"58","author":"R Zhang","year":"2012","unstructured":"Zhang, R., Sachnev, A., Botnan, M.B., Kim, H.J., Heo, J.: An efficient embedder for BCH coding for steganography. IEEE Trans Inf Theory J 58(12), 7272\u20137279 (2012). https:\/\/doi.org\/10.1109\/TIT.2012.2217072","journal-title":"IEEE Trans Inf Theory J"},{"key":"763_CR25","doi-asserted-by":"publisher","unstructured":"Moon, S.K., Raut, R.D.: Analysis of secured video steganography using computer forensics technique for enhance data security. In: IEEE Second International Conference on Image Information Processing (ICIIP-2013), pp. 660\u2013665, IEEE 2013. https:\/\/doi.org\/10.1109\/ICIIP.2013.6707677","DOI":"10.1109\/ICIIP.2013.6707677"},{"key":"763_CR26","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC.2013.6675372","author":"HM Kelash","year":"2013","unstructured":"Kelash, H.M., Abdel Wahab, O.F., Elshakankiry, O.A., El-Sayed, H.S.: Hiding Data in Video Sequences using Steganography Algorithms. Int Conf ICT Converg ICTC (2013). https:\/\/doi.org\/10.1109\/ICTC.2013.6675372","journal-title":"Int Conf ICT Converg ICTC"},{"key":"763_CR27","doi-asserted-by":"publisher","unstructured":"Paul, R., Acharya, A.K., Yadav, V.K., Batham, S.: Hiding large amount of data using a new approach of video steganography. In: Confluence 2013: The Next Generation Information Technology Summit (4th International Conference), pp. 337\u2013343, IEEE 2013. https:\/\/doi.org\/10.1049\/cp.2013.2338","DOI":"10.1049\/cp.2013.2338"},{"key":"763_CR28","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.protcy.2013.12.345","volume":"10","author":"K Dasgupta","year":"2013","unstructured":"Dasgupta, K., Mondal, J.K., Dutta, P.: Optimized video steganography using genetic algorithm (GA). Int. Conf. Comput. Intell. Model Tech Appl (CIMTA) 10, 131\u2013137 (2013). https:\/\/doi.org\/10.1016\/j.protcy.2013.12.345","journal-title":"Int. Conf. Comput. Intell. Model Tech Appl (CIMTA)"},{"key":"763_CR29","doi-asserted-by":"publisher","unstructured":"Khupse, S., Patil, N.N.: An adaptive steganography technique for videos using steganoflage. In: 2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT), pp. 811\u2013815, IEEE 2014. https:\/\/doi.org\/10.1109\/ICICICT.2014.6781384","DOI":"10.1109\/ICICICT.2014.6781384"},{"key":"763_CR30","doi-asserted-by":"publisher","first-page":"744","DOI":"10.1016\/j.asoc.2015.05.040","volume":"34","author":"M Ramalingam","year":"2015","unstructured":"Ramalingam, M., Isa, N.A.M.: Fast retrieval of hidden data using enhanced hidden Markov model in video steganography. Appl. Soft Comput. 34, 744\u2013757 (2015). https:\/\/doi.org\/10.1016\/j.asoc.2015.05.040","journal-title":"Appl. Soft Comput."},{"key":"763_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2015\/698492","volume":"2015","author":"S Sun","year":"2015","unstructured":"Sun, S.: A new information hiding method based on improved BPCS steganography. Adv. Multimed. 2015, 1\u20137 (2015). https:\/\/doi.org\/10.1155\/2015\/698492. (Article ID 698492)","journal-title":"Adv. Multimed."},{"issue":"2","key":"763_CR32","doi-asserted-by":"publisher","first-page":"3065","DOI":"10.1007\/s11042-015-3170-8","volume":"76","author":"MM Sadek","year":"2016","unstructured":"Sadek, M.M., Khalifa, A.S., Mostafa, G.M.: Robust video steganography algorithm using adaptive skin-tone detection. Multimed. Tools Appl. 76(2), 3065\u20133085 (2016). https:\/\/doi.org\/10.1007\/s11042-015-3170-8","journal-title":"Multimed. Tools Appl."},{"key":"763_CR33","doi-asserted-by":"publisher","unstructured":"Patel, K., Rora, K.K., Singh, K., Verma, S.: Lazy wavelet transform based steganography in video. In: 2013 International Conference on Communication Systems and Network Technologies, pp. 497\u2013500, IEEE 2013. https:\/\/doi.org\/10.1109\/CSNT.2013.109","DOI":"10.1109\/CSNT.2013.109"},{"key":"763_CR34","doi-asserted-by":"publisher","unstructured":"Mstafa, R.J., Elleithy, K.M.: A novel video steganography algorithm in the wavelet domain based on the KLT tracking algorithm and BCH Codes. In: Applications and Technology Conference (LISAT), IEEE 2015. https:\/\/doi.org\/10.1109\/LISAT.2015.7160192","DOI":"10.1109\/LISAT.2015.7160192"},{"key":"763_CR35","doi-asserted-by":"publisher","unstructured":"Mstafa, R.J., Elleithy, K.M.: A novel video steganography algorithm in DCT domain based on hamming and BCH codes. In: 37th IEEE Sarnoff symposium, pp. 208\u2013213, IEEE 2016. https:\/\/doi.org\/10.1109\/SARNOF.2016.7846757","DOI":"10.1109\/SARNOF.2016.7846757"},{"key":"763_CR36","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2015.10.005","author":"M Ramalingam","year":"2016","unstructured":"Ramalingam, M., Isa, N.A.M.: A data-hiding technique using scene-change detection for video steganography. Comput. Electric. Eng. J. (2016). https:\/\/doi.org\/10.1016\/j.compeleceng.2015.10.005","journal-title":"Comput. Electric. Eng. J."},{"key":"763_CR37","doi-asserted-by":"publisher","unstructured":"Mstafa, R.J., Elleithy, K.M., Abdelfattah, E.: A robust and secure video steganography method in DWT-DCT domains based on multiple object tracking and ECC. In: IEEE access, IEEE\u2014Institute of Electrical Electronics Engineers, Vol. 5, pp. 5354\u20135365, IEEE 2017. https:\/\/doi.org\/10.1109\/ACCESS.2017.2691581","DOI":"10.1109\/ACCESS.2017.2691581"},{"key":"763_CR38","doi-asserted-by":"publisher","unstructured":"Shukur, W.A., Abdullah, W.N., Qurban, L.K.: Information Hiding in DigitalVideo Using DCT, DWT and CvT. In: Journal of Physics: Conference Series, Volume 1003, Conference 1, 2018. https:\/\/doi.org\/10.1088\/1742-6596\/1003\/1\/012035","DOI":"10.1088\/1742-6596\/1003\/1\/012035"},{"issue":"13","key":"763_CR39","doi-asserted-by":"publisher","first-page":"1579","DOI":"10.1016\/S0167-8655(02)00122-8","volume":"23","author":"J Spaulding","year":"2002","unstructured":"Spaulding, J., Noda, H., Shirazi, M.N., Kawaguchi, E.: BPCS Steganography using EZW Lossy Compressed Images. Pattern Recognit. Lett. 23(13), 1579\u20131587 (2002). https:\/\/doi.org\/10.1016\/S0167-8655(02)00122-8","journal-title":"Pattern Recognit. Lett."},{"key":"763_CR40","doi-asserted-by":"publisher","unstructured":"Noda, H., Furuta, T., Niimi, M., Kawaguchi, E.: Application of BPCS steganography to wavelet compressed video. In: 2004 International Conference on Image Processing (ICIP), pp. 2147\u20132150, IEEE 2004. https:\/\/doi.org\/10.1109\/ICIP.2004.1421520","DOI":"10.1109\/ICIP.2004.1421520"},{"key":"763_CR41","doi-asserted-by":"publisher","DOI":"10.1002\/9780470989418","volume-title":"The H.264 advanced video compression standard","author":"IE Richardson","year":"2010","unstructured":"Richardson, I.E.: The H.264 advanced video compression standard. Wiley, New York (2010).. (ISBN: 978-0-470-51692-8)"},{"key":"763_CR42","volume-title":"Signal processing and communications","author":"J Chen","year":"2001","unstructured":"Chen, J., Koc, U.V., Liu, K.J.R.: Design of digital video coding systems: a complete compressed domain approach. In: Signal processing and communications. CRC Press, New York (2001)"},{"key":"763_CR43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-06895-4","volume-title":"High efficiency video coding (HEVC)","author":"V Sze","year":"2014","unstructured":"Sze, V., Budagavi, M., Sullivan, G.J.: High efficiency video coding (HEVC). Springer, New York (2014). https:\/\/doi.org\/10.1007\/978-3-319-06895-4 . (ISBN: 978-3-319-06895-4 (eBook))"},{"key":"763_CR44","doi-asserted-by":"crossref","unstructured":"Akramullah, S.: Digital video concepts, methods, and metrics quality, compression, performance, and power trade-off analysis. The Optimization Guidebook for Multimedia and Telecommunications Professionals. Apress Open, (2014) (ISBN: 978-1-4302-6712-6)","DOI":"10.1007\/978-1-4302-6713-3"},{"key":"763_CR45","doi-asserted-by":"publisher","unstructured":"Zhai, L., Wang, L., Ren, Y.: Combined and calibrated features for steganalysis of motion vector-based steganography in H.264\/AVC. In: Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, Session: Video Steganalysis, pp. 135\u2013146, June 2017. https:\/\/doi.org\/10.1145\/3082031.3083237","DOI":"10.1145\/3082031.3083237"},{"issue":"10","key":"763_CR46","doi-asserted-by":"publisher","first-page":"11979","DOI":"10.1007\/s11042-017-4844-1","volume":"77","author":"J Yang","year":"2017","unstructured":"Yang, J., Li, S.: An efficient information hiding method based on motion vector space encoding for HEVC. Multimed. Tools Appl. 77(10), 11979\u201312001 (2017). https:\/\/doi.org\/10.1007\/s11042-017-4844-1","journal-title":"Multimed. Tools Appl."},{"key":"763_CR47","doi-asserted-by":"publisher","first-page":"167","DOI":"10.13052\/jcsm2245-1439.531","volume":"53","author":"RJ Mstafa","year":"2017","unstructured":"Mstafa, R.J., Elleithy, K.M.: An ECC\/DCT\u2014based robust video steganography algorithm for secure data communication. J. Cyber Secur. 53, 167\u2013194 (2017). https:\/\/doi.org\/10.13052\/jcsm2245-1439.531","journal-title":"J. Cyber Secur."},{"key":"763_CR48","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.neucom.2015.02.102","volume":"188","author":"Y Liu","year":"2016","unstructured":"Liu, Y., Ju, L., Hu, M., Zhao, H., Jia, S., Jia, Z.: A new data hiding method for H.264 based on secret sharing. Neurocomputing 188, 113\u2013119 (2016). https:\/\/doi.org\/10.1016\/j.neucom.2015.02.102","journal-title":"Neurocomputing"},{"key":"763_CR49","doi-asserted-by":"publisher","unstructured":"Hu, Y., Zhang, C., Su, Y.: Information hiding based on intra prediction modes for H.264\/AVC. In: 2007 IEEE International Conference on Multimedia and Expo, pp. 1231\u20131234, IEEE 2007. https:\/\/doi.org\/10.1109\/ICME.2007.4284879","DOI":"10.1109\/ICME.2007.4284879"},{"key":"763_CR50","doi-asserted-by":"publisher","unstructured":"Liu, B., Liu, F., Yang, C., Sun, Y.: Secure steganography in compressed video bitstreams. In: The Third International Conference on Availability, Reliability and Security, pp. 1382\u20131387, IEEE 2008. https:\/\/doi.org\/10.1109\/ARES.2008.140","DOI":"10.1109\/ARES.2008.140"},{"key":"763_CR51","doi-asserted-by":"publisher","unstructured":"Ma, X., Li, Z., Lv, J., Wang, W.: Data hiding in H.264\/AVC streams with limited intra-frame distortion drift. In: International Symposium on Computer Network and Multimedia Technology, IEEE 2009. https:\/\/doi.org\/10.1109\/CNMT.2009.5374766","DOI":"10.1109\/CNMT.2009.5374766"},{"key":"763_CR52","doi-asserted-by":"publisher","unstructured":"Zhu, H., Wang, R., Xu, D., Zhou, X.: Information Hiding Algorithm for H.264 Based on the prediction difference of Intra_4\u00d74. In: 3rd International Congress on Image and Signal Processing (CISP2010), pp. 487\u2013490, IEEE 2010. https:\/\/doi.org\/10.1109\/CISP.2010.5646792","DOI":"10.1109\/CISP.2010.5646792"},{"issue":"1","key":"763_CR53","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/s11760-011-0225-9","volume":"7","author":"Z Shahid","year":"2011","unstructured":"Shahid, Z., Chaumont, M., Puech, W.: Considering the reconstruction loop for data hiding of intra- and inter-frames of H264\/AVC. Signal Image Video Process J (SIViP) 7(1), 75\u201393 (2011). https:\/\/doi.org\/10.1007\/s11760-011-0225-9","journal-title":"Signal Image Video Process J (SIViP)"},{"issue":"2","key":"763_CR54","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1016\/j.jvcir.2013.10.007","volume":"25","author":"P-C Chang","year":"2014","unstructured":"Chang, P.-C., Chung, K.-L., Chen, J.-J., Lin, C.-H., Lin, T.-J.: A DCT\/DST-based error propagation-free data hiding algorithm for HEVC intra-coded frames. J. Visual Commun. Image Represent. 25(2), 239\u2013253 (2014). https:\/\/doi.org\/10.1016\/j.jvcir.2013.10.007","journal-title":"J. Visual Commun. Image Represent."},{"issue":"1","key":"763_CR55","doi-asserted-by":"publisher","first-page":"613","DOI":"10.1007\/s11042-013-1393-0","volume":"72","author":"Y Liu","year":"2014","unstructured":"Liu, Y., Li, Z., Ma, X., Liu, J.: A robust without intra-frame distortion drift data hiding algorithm based on H.264\/AVC. Multimed. Tools Appl. 72(1), 613\u2013636 (2014). https:\/\/doi.org\/10.1007\/s11042-013-1393-0","journal-title":"Multimed. Tools Appl."},{"key":"763_CR56","doi-asserted-by":"publisher","first-page":"1076","DOI":"10.1016\/j.neucom.2014.03.089","volume":"151","author":"Y Liu","year":"2015","unstructured":"Liu, Y., Hu, M., Ma, X., Zhao, H.: A new robust data hiding method for H.264\/AVC without intra-frame distortion drift. Neurocomputing 151, 1076\u20131085 (2015). https:\/\/doi.org\/10.1016\/j.neucom.2014.03.089","journal-title":"Neurocomputing"},{"key":"763_CR57","doi-asserted-by":"publisher","unstructured":"Kapotas, S.K., Skodras, A.N.: A new data hiding scheme for scene change detection in H.264 encoded video sequences. In: IEEE International Conference on Multimedia and Expo, pp. 277\u2013280, IEEE 2008. https:\/\/doi.org\/10.1109\/ICME.2008.4607425","DOI":"10.1109\/ICME.2008.4607425"},{"key":"763_CR58","doi-asserted-by":"publisher","unstructured":"Xu, C., Ping, X., Zhang, T.: Steganography in compressed video stream. In: First International Conference on Innovative Computing, Information and Control (ICICIC'06), Vol. 1, IEEE 2006. https:\/\/doi.org\/10.1109\/ICICIC.2006.158","DOI":"10.1109\/ICICIC.2006.158"},{"key":"763_CR59","doi-asserted-by":"publisher","unstructured":"Pan, F., Xiang, L., Yang, X.-Y., Guo, Y.: Video steganography using motion vector and linear block codes. In: 2010 IEEE International Conference on Software Engineering and Service Sciences, pp. 592\u2013595, IEEE 2010. https:\/\/doi.org\/10.1109\/ICSESS.2010.5552283","DOI":"10.1109\/ICSESS.2010.5552283"},{"key":"763_CR60","doi-asserted-by":"publisher","unstructured":"Li-Yi, Z., Wei-Dong, Z.: A novel steganography algorithm based on motion vector and matrix encoding. In: IEEE 3rd International Conference on Communication Software and Networks, pp. 406\u2013409, IEEE 2011. https:\/\/doi.org\/10.1109\/ICCSN.2011.6013622","DOI":"10.1109\/ICCSN.2011.6013622"},{"key":"763_CR61","doi-asserted-by":"publisher","unstructured":"Jue, W., Min-qing, Z., Juan-li, S.: Video steganography using motion vector components. In: IEEE 3rd International Conference on Communication Software and Networks, pp. 500\u2013503, IEEE 2011. https:\/\/doi.org\/10.1109\/ICCSN.2011.6013642","DOI":"10.1109\/ICCSN.2011.6013642"},{"issue":"11","key":"763_CR62","doi-asserted-by":"publisher","first-page":"3759","DOI":"10.1007\/s11042-013-1798-9","volume":"74","author":"G Song","year":"2013","unstructured":"Song, G., Li, Z., Zhao, J., Hu, J., Tu, H.: A reversible video steganography algorithm for MVC based on motion vector. Multimed. Tools Appl. 74(11), 3759\u20133782 (2013). https:\/\/doi.org\/10.1007\/s11042-013-1798-9","journal-title":"Multimed. Tools Appl."},{"issue":"24","key":"763_CR63","doi-asserted-by":"publisher","first-page":"11163","DOI":"10.1007\/s11042-014-2223-8","volume":"74","author":"Y Yao","year":"2014","unstructured":"Yao, Y., Zhang, W., Yu, N., Zhao, X.: Defining embedding distortion for motion vector-based video steganography. Multimed. Tools Appl. 74(24), 11163\u201311186 (2014). https:\/\/doi.org\/10.1007\/s11042-014-2223-8","journal-title":"Multimed. Tools Appl."},{"issue":"21","key":"763_CR64","doi-asserted-by":"publisher","first-page":"13503","DOI":"10.1007\/s11042-015-2743-x","volume":"75","author":"H Zhang","year":"2015","unstructured":"Zhang, H., Cao, Y., Zhao, X.: Motion vector-based video steganography with preserved local optimality. Multimed. Tools Appl. 75(21), 13503\u201313519 (2015). https:\/\/doi.org\/10.1007\/s11042-015-2743-x","journal-title":"Multimed. Tools Appl."},{"issue":"5","key":"763_CR65","doi-asserted-by":"publisher","first-page":"489","DOI":"10.23919\/TST.2017.8030538","volume":"22","author":"K Niu","year":"2017","unstructured":"Niu, K., Yang, X., Zhang, Y.: A novel video reversible data hiding algorithm using motion vector for H.264\/AVC. Tsinghua Sci. Technol. J. 22(5), 489\u2013498 (2017). https:\/\/doi.org\/10.23919\/TST.2017.8030538","journal-title":"Tsinghua Sci. Technol. J."},{"issue":"3","key":"763_CR66","doi-asserted-by":"publisher","first-page":"1015","DOI":"10.11591\/eei.v9i3.1859","volume":"9","author":"M Fuad","year":"2020","unstructured":"Fuad, M., Ernawan, F.: Video steganography based on DCT psychovisual and object motion. Bull. Electric. Eng. Inform. J. 9(3), 1015\u20131023 (2020). https:\/\/doi.org\/10.11591\/eei.v9i3.1859","journal-title":"Bull. Electric. Eng. Inform. J."},{"key":"763_CR67","doi-asserted-by":"publisher","DOI":"10.1109\/78.875483","author":"V Britanak","year":"2000","unstructured":"Britanak, V., Rao, K.R.: Two-dimensional DCT\/DST universal computational structure for block sizes. IEEE Trans. Signal Process. (2000). https:\/\/doi.org\/10.1109\/78.875483","journal-title":"IEEE Trans. Signal Process."},{"issue":"12","key":"763_CR68","doi-asserted-by":"publisher","first-page":"1649","DOI":"10.1109\/TCSVT.2012.2221191","volume":"22","author":"GJ Sullivan","year":"2012","unstructured":"Sullivan, G.J., Ohm, J.-R., Han, W.-J., Wiegand, T.: Overview of the High Efficiency Video Coding (HEVC) Standard. IEEE Trans. Circuits Syst. Video Technol. 22(12), 1649\u20131668 (2012). https:\/\/doi.org\/10.1109\/TCSVT.2012.2221191","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"763_CR69","doi-asserted-by":"publisher","unstructured":"Yadav, S.K., Bhogal, R.K.: A video steganography in spatial, discrete wavelet transform and integer wavelet domain. In: 2018 International Conference on Intelligent Circuits and Systems (ICICS), pp. 258\u2013264. IEEE (2018). https:\/\/doi.org\/10.1109\/ICICS.2018.00060","DOI":"10.1109\/ICICS.2018.00060"},{"key":"763_CR70","volume-title":"Digital Image Processing","author":"RC Gonzalez","year":"2008","unstructured":"Gonzalez, R.C., Woods, R.E.: Digital Image Processing, 3rd edn. Pearson Education, London (2008).. (ISBN: 0-13-168728-x 978-0-13-168728-8)","edition":"3"},{"issue":"10","key":"763_CR71","doi-asserted-by":"publisher","first-page":"916","DOI":"10.1109\/TCSVT.2002.804897","volume":"12","author":"J Huang","year":"2002","unstructured":"Huang, J., Shi, Y.Q.: Reliable information bit hiding. IEEE Trans. Circuits Syst. Video Technol. 12(10), 916\u2013920 (2002). https:\/\/doi.org\/10.1109\/TCSVT.2002.804897","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"763_CR72","doi-asserted-by":"publisher","unstructured":"Yilmaz, A., Alatan, A.A.: Error concealment of video sequences by data hiding. In: 2003 International Conference on Image Processing, pp. 679\u2013682, IEEE 2003. https:\/\/doi.org\/10.1109\/ICIP.2003.1246771","DOI":"10.1109\/ICIP.2003.1246771"},{"key":"763_CR73","doi-asserted-by":"publisher","unstructured":"Meuel, P., Chaumont, M., Puech, W.: Data hiding in H.264 video for lossless reconstruction of region of interest. In: 2007 15th European Signal Processing Conference, pp. 2301\u20132305, IEEE 2007. https:\/\/doi.org\/10.5281\/ZENODO.40675","DOI":"10.5281\/ZENODO.40675"},{"key":"763_CR74","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2009\/293031","volume":"2009","author":"G Li","year":"2010","unstructured":"Li, G., Ito, Y., Yu, X., Nitta, N., Babaguchi, N.: Recoverable privacy protection for video content distribution. EURASIP J. Inf. Secur. 2009, 1\u201311 (2010). https:\/\/doi.org\/10.1155\/2009\/293031","journal-title":"EURASIP J. Inf. Secur."},{"key":"763_CR75","doi-asserted-by":"publisher","unstructured":"Li, Y., Chen, H.-X., Zhao, Y.: A new method of data hiding based on H.264 encoded video sequences. In: IEEE 10th International Conference on Signal Processing Proceedings, pp. 1833\u20131836, IEEE 2010. https:\/\/doi.org\/10.1109\/ICOSP.2010.5656918","DOI":"10.1109\/ICOSP.2010.5656918"},{"key":"763_CR76","doi-asserted-by":"publisher","unstructured":"Liu, Y.X., Li, Z., Ma, X., Liu, J.: A novel data hiding scheme for H.264\/AVC video streams without intra-frame distortion drift. In: IEEE 14th International Conference on Communication Technology, pp. 824\u2013828, IEEE 2012. https:\/\/doi.org\/10.1109\/ICCT.2012.6511318","DOI":"10.1109\/ICCT.2012.6511318"},{"issue":"8","key":"763_CR77","doi-asserted-by":"publisher","first-page":"2174","DOI":"10.1016\/j.jss.2013.03.101","volume":"86","author":"Y Liu","year":"2013","unstructured":"Liu, Y., Li, Z., Maa, X., Liu, J.: A robust data hiding algorithm for H.264\/AVC video streams. J. Syst. Softw. 86(8), 2174\u20132183 (2013). https:\/\/doi.org\/10.1016\/j.jss.2013.03.101","journal-title":"J. Syst. Softw."},{"key":"763_CR78","doi-asserted-by":"publisher","unstructured":"Mstafa, R.J., Elleithy, K.M.: A DCT-based robust video steganographic method using BCH error correcting codes. In: 2016 IEEE long island systems, applications and technology conference (LISAT), IEEE 2016. https:\/\/doi.org\/10.1109\/LISAT.2016.7494111","DOI":"10.1109\/LISAT.2016.7494111"},{"key":"763_CR79","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-7664-7","author":"A Khan","year":"2019","unstructured":"Khan, A., Sarfaraz, A.: FFT-ETM based distortion less and high payload image steganography. Multimed. Tools Appl. (2019). https:\/\/doi.org\/10.1007\/s11042-019-7664-7","journal-title":"Multimed. Tools Appl."},{"key":"763_CR80","doi-asserted-by":"publisher","first-page":"624","DOI":"10.1016\/j.image.2005.03.012","volume":"20","author":"C-S Lu","year":"2005","unstructured":"Lu, C.-S., Chen, J.-R., Fan, K.-C.: Real-time frame-dependent video watermarking in VLC domain. Signal Process. Image Commun. 20, 624\u2013642 (2005). https:\/\/doi.org\/10.1016\/j.image.2005.03.012","journal-title":"Signal Process. Image Commun."},{"key":"763_CR81","doi-asserted-by":"publisher","unstructured":"Mobasseri, B.G., Marcinak, M.P. Watermarking of MPEG-2 video in compressed domain using VLC mapping. In: 7th Workshop on Multimedia & Security, pp. 91\u201394, 2005. https:\/\/doi.org\/10.1145\/1073170.1073187","DOI":"10.1145\/1073170.1073187"},{"issue":"2","key":"763_CR82","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/s11235-010-9372-5","volume":"49","author":"K Liao","year":"2012","unstructured":"Liao, K., Lian, S., Guo, Z., Wang, J.: Efficient information hiding in H.264\/AVC video coding. Telecommun. Syst. 49(2), 261\u2013269 (2012). https:\/\/doi.org\/10.1007\/s11235-010-9372-5","journal-title":"Telecommun. Syst."},{"issue":"5","key":"763_CR83","doi-asserted-by":"publisher","first-page":"565","DOI":"10.1109\/TCSVT.2011.2129090","volume":"21","author":"Z Shahid","year":"2011","unstructured":"Shahid, Z., Chaumont, M., Puech, W.: Fast protection of H.264\/AVC by selective encryption of CAVLC and CABAC for I and P frames. IEEE Trans. Circuits Syst. Video Technol. 21(5), 565\u2013576 (2011). https:\/\/doi.org\/10.1109\/TCSVT.2011.2129090","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"763_CR84","doi-asserted-by":"publisher","unstructured":"Ke, N., Weidong, Z.: A video steganography scheme based on H.264 bitstreams replaced. In: IEEE 4th International Conference on Software Engineering and Service Science, pp. 447\u2013450, IEEE 2013. https:\/\/doi.org\/10.1109\/ICSESS.2013.6615345","DOI":"10.1109\/ICSESS.2013.6615345"},{"issue":"9","key":"763_CR85","doi-asserted-by":"publisher","first-page":"1476","DOI":"10.1109\/TCSVT.2013.2248588","volume":"23","author":"Y Wang","year":"2013","unstructured":"Wang, Y., Oneill, M., Kurugollu, F.: A tunable encryption scheme and analysis of fast selective encryption for CAVLC and CABAC in H.264\/AVC. IEEE Trans. Circuits Syst. Video Technol. 23(9), 1476\u20131490 (2013). https:\/\/doi.org\/10.1109\/TCSVT.2013.2248588","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"1","key":"763_CR86","first-page":"63","volume":"40","author":"Y Zhang","year":"2016","unstructured":"Zhang, Y., Zhang, M., Wang, X.A., Niu, K., Liu, J.: A novel video steganography algorithm based on trailing coefficients for H264\/AVC. Inform. Int. J. Comput. Inform. 40(1), 63\u201370 (2016)","journal-title":"Inform. Int. J. Comput. Inform."},{"issue":"11","key":"763_CR87","doi-asserted-by":"publisher","first-page":"3108","DOI":"10.3390\/s20113108","volume":"20","author":"B Abd-El-Atty","year":"2020","unstructured":"Abd-El-Atty, B., Iliyasu, A.M., Alaskar, H., Abd-El-Latif, A.A.: A robust quasi-quantum walks-based steganography protocol for secure transmission of images on cloud-based E-healthcare platforms. Sensors 20(11), 3108 (2020). https:\/\/doi.org\/10.3390\/s20113108","journal-title":"Sensors"},{"key":"763_CR88","doi-asserted-by":"publisher","first-page":"123687","DOI":"10.1016\/j.physa.2019.123687","volume":"541","author":"AA Abd-El-Latif","year":"2020","unstructured":"Abd-El-Latif, A.A., Abd-El-Atty, B., Elseuofi, S., Khalifa, H.S., Alghamdi, A., Polat, K., Amin, M.: Secret images transfer in cloud system based on investigating quantum walks in steganography approaches. Phys. A Stat. Mech. Appl. 541, 123687 (2020). https:\/\/doi.org\/10.1016\/j.physa.2019.123687","journal-title":"Phys. A Stat. Mech. Appl."},{"key":"763_CR89","doi-asserted-by":"publisher","unstructured":"Peng, J., Abd El-Atty, B., Khalifa, H.S., Abd El-Latif, A.A.: Image steganography algorithm based on key matrix generated by quantum walks. In: Eleventh International Conference on Digital Image Processing, Vol. 11179, 1117905, ICDIP 2019. https:\/\/doi.org\/10.1117\/12.2539630","DOI":"10.1117\/12.2539630"},{"key":"763_CR90","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1016\/j.optlastec.2019.03.005","volume":"116","author":"AA Abd-EL-Latif","year":"2019","unstructured":"Abd-EL-Latif, A.A., Abd-El-Atty, B., Venegas-Andraca, S.E.: A novel image steganography technique based on quantum substitution boxes. Opt. Laser Technol. 116, 92\u2013102 (2019). https:\/\/doi.org\/10.1016\/j.optlastec.2019.03.005","journal-title":"Opt. Laser Technol."},{"issue":"1","key":"763_CR91","doi-asserted-by":"publisher","first-page":"2293","DOI":"10.1007\/s10586-017-1345-y","volume":"22","author":"L Li","year":"2019","unstructured":"Li, L., Hossain, M.S., Abd-El-Latif, A.A., Alhamid, M.F.: Distortion less secret image sharing scheme for Internet of Things system. Cluster Comput. J. 22(1), 2293\u20132307 (2019). https:\/\/doi.org\/10.1007\/s10586-017-1345-y","journal-title":"Cluster Comput. J."},{"key":"763_CR92","doi-asserted-by":"publisher","first-page":"21075","DOI":"10.1109\/ACCESS.2018.2820603","volume":"6","author":"AA Abd-El-Latif","year":"2018","unstructured":"Abd-El-Latif, A.A., Abd-El-Atty, B., Hossain, M.S., Abdur Rahman, M.D., Alamri, A., Gupta, B.B.: Efficient quantum information hiding for remote medical image sharing. IEEE Access J. 6, 21075\u201321083 (2018). https:\/\/doi.org\/10.1109\/ACCESS.2018.2820603","journal-title":"IEEE Access J."},{"key":"763_CR93","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2020.2975798","author":"C Yan","year":"2020","unstructured":"Yan, C., Gong, B., Wei, Y., Gao, Y.: Deep multi-view enhancement hashing for image retrieval. IEEE Trans. Pattern Anal. Mach. Intell. (2020). https:\/\/doi.org\/10.1109\/TPAMI.2020.2975798","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"763_CR94","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2020.2967645]","author":"C Yan","year":"2020","unstructured":"Yan, C., Shao, B., Zhao, H., Ning, R., Zhang, Y., Xu, F.: 3D room layout estimation from a single RGB image. IEEE Trans. Multimed. (2020). https:\/\/doi.org\/10.1109\/TMM.2020.2967645]","journal-title":"IEEE Trans. Multimed."},{"key":"763_CR95","doi-asserted-by":"publisher","unstructured":"Peng, J., Abd El-Atty, B., Khalifa, H.S., Abd El-Latif, A.A.: Image watermarking algorithm based on quaternion and chaotic Lorenz system. In: Eleventh International Conference on Digital Image Processing, Vol. 11179, 111790W, ICDIP 2019. https:\/\/doi.org\/10.1117\/12.2539753","DOI":"10.1117\/12.2539753"}],"container-title":["Multimedia Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-021-00763-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00530-021-00763-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-021-00763-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,13]],"date-time":"2021-09-13T09:41:02Z","timestamp":1631526062000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00530-021-00763-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,27]]},"references-count":95,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2021,10]]}},"alternative-id":["763"],"URL":"https:\/\/doi.org\/10.1007\/s00530-021-00763-z","relation":{},"ISSN":["0942-4962","1432-1882"],"issn-type":[{"value":"0942-4962","type":"print"},{"value":"1432-1882","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,27]]},"assertion":[{"value":"14 December 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 February 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 March 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}