{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T01:52:31Z","timestamp":1777945951798,"version":"3.51.4"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"23","license":[{"start":{"date-parts":[[2014,7,25]],"date-time":"2014-07-25T00:00:00Z","timestamp":1406246400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1007\/s11042-014-2181-1","type":"journal-article","created":{"date-parts":[[2014,7,24]],"date-time":"2014-07-24T03:47:00Z","timestamp":1406173620000},"page":"10479-10494","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Detection of motion vector based video steganography"],"prefix":"10.1007","volume":"74","author":[{"given":"Arijit","family":"Sur","sequence":"first","affiliation":[]},{"given":"Sista Venkat","family":"Madhav Krishna","sequence":"additional","affiliation":[]},{"given":"Nilkanta","family":"Sahu","sequence":"additional","affiliation":[]},{"given":"Shuvendu","family":"Rana","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,7,25]]},"reference":[{"issue":"1","key":"2181_CR1","first-page":"14","volume":"6","author":"HA Aly","year":"2011","unstructured":"Aly HA (2011) Data hiding in motion vectors of compressed video based on their associated prediction error. Information forensics and security. IEEE Trans 6(1):14\u201318. doi: 10.1109\/TIFS.2010.2090520","journal-title":"IEEE Trans"},{"issue":"2","key":"2181_CR2","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1109\/TIP.2002.807363","volume":"12","author":"I Avcibas","year":"2003","unstructured":"Avcibas I, Memon N, Sankur B (2003) Steganalysis using image quality metrics. Image Process IEEE Trans 12(2):221\u2013229. doi: 10.1109\/TIP.2002.807363","journal-title":"Image Process IEEE Trans"},{"key":"2181_CR3","doi-asserted-by":"crossref","unstructured":"Avcibas I, Nasir M, Sankur B (2001) Steganalysis based on image quality metrics. In: Multimedia signal processing. IEEE fourth workshop:517\u2013522. doi: 10.1109\/MMSP.2001.962785","DOI":"10.1109\/MMSP.2001.962785"},{"issue":"4","key":"2181_CR4","doi-asserted-by":"crossref","first-page":"502","DOI":"10.1109\/TIFS.2006.885020","volume":"1","author":"U Budhia","year":"2006","unstructured":"Budhia U, Kundur D, Zourntos T (2006) Digital video steganalysis exploiting statistical visibility in the temporal domain. Inf Forensics Secur IEEE Trans 1(4):502\u2013516. doi: 10.1109\/TIFS.2006.885020","journal-title":"Inf Forensics Secur IEEE Trans"},{"key":"2181_CR5","first-page":"193","volume-title":"Video steganography with perturbed motion estimation. In: Proceedings of the 13th international conference on information hiding IH\u201911","author":"Y Cao","year":"2011","unstructured":"Cao Y, Zhao X, Feng D, Sheng R (2011) Video steganography with perturbed motion estimation. In: Proceedings of the 13th international conference on information hiding IH\u201911. Springer, Berlin, Heidelberg, pp 193\u2013207. http:\/\/dl.acm.org\/citation.cfm?id=2042445.2042463"},{"key":"2181_CR6","doi-asserted-by":"crossref","unstructured":"Chebbo S, Durieux P, Pesquet-Popescu B (2010) Objective evaluation of compressed video\u2019s temporal flickering. In: Image processing theory tools and applications (IPTA). 2nd Int conf:177\u2013180. doi: 10.1109\/IPTA.2010.5586728","DOI":"10.1109\/IPTA.2010.5586728"},{"issue":"1\/2","key":"2181_CR7","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1023\/A:1008107127819","volume":"27","author":"B Chen","year":"2001","unstructured":"Chen B, Wornell GW (2001) Quantization index modulation methods for digital watermarking and information embedding of multimedia. J VLSI Signal Process Syst 27(1\/2):7\u201333. doi: 10.1023\/A:1008107127819","journal-title":"J VLSI Signal Process Syst"},{"key":"2181_CR8","doi-asserted-by":"crossref","unstructured":"Chen C, Shi YQ, Chen W, Xuan G (2006) Statistical moments based universal steganalysis using jpeg 2-d array and 2-d characteristic function. IEEE Int Conf Image Process:105\u2013108. doi: 10.1109\/ICIP.2006.312383","DOI":"10.1109\/ICIP.2006.312383"},{"issue":"7","key":"2181_CR9","doi-asserted-by":"crossref","first-page":"1995","DOI":"10.1109\/TSP.2003.812753","volume":"51","author":"S Dumitrescu","year":"2003","unstructured":"Dumitrescu S, Wu X, Wang Z (2003) Detection of lsb steganography via sample pair analysis. Signal Process IEEE Trans 51(7):1995\u20132007","journal-title":"Signal Process IEEE Trans"},{"key":"2181_CR10","doi-asserted-by":"crossref","unstructured":"Fang D-Y, Chang L-W (2006) Data hiding for digital video with phase of motion vector. In: Circuits and systems, ISCAS. Proc IEEE Int Symp:4. doi: 10.1109\/ISCAS.2006.1692862","DOI":"10.1109\/ISCAS.2006.1692862"},{"issue":"7","key":"2181_CR11","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1111\/j.1469-1809.1936.tb02137.x","volume":"7","author":"RA Fisher","year":"1936","unstructured":"Fisher RA (1936) The use of multiple measurements in taxonomic problems. Ann Eugenics 7(7):179\u2013188","journal-title":"Ann Eugenics"},{"key":"2181_CR12","first-page":"67","volume-title":"Feature-based steganalysis for jpeg images and its implications for future design of steganographic schemes. In: Information hiding lecture notes in computer science, vol 3200","author":"J Fridrich","year":"2005","unstructured":"Fridrich J (2005) Feature-based steganalysis for jpeg images and its implications for future design of steganographic schemes. In: Information hiding lecture notes in computer science, vol 3200. Springer, Berlin Heidelberg, pp 67\u201381. doi: 10.1007\/978-3-540-30114-1_6"},{"key":"2181_CR13","first-page":"822","volume":"3","author":"X He","year":"2008","unstructured":"He X, Luo Z (2008) A novel steganographic algorithm based on the motion vector phase. Comput Sci Softw Eng Int Conf 3:822\u2013825. doi: 10.1109\/CSSE.2008.359","journal-title":"Comput Sci Softw Eng Int Conf"},{"key":"2181_CR14","first-page":"I401","volume":"1","author":"F Huang","year":"2007","unstructured":"Huang F, Li B, Huang J (2007) Attack lsb matching steganography by counting alteration rate of the number of neighbourhood gray levels. IEEE Int Conf image Process ICIP 1:I401\u2013I404. doi: 10.1109\/ICIP.2007.4378976","journal-title":"IEEE Int Conf image Process ICIP"},{"key":"2181_CR15","first-page":"161","volume-title":"Towards digital video steganalysis using asymptotic memoryless detection. In: Proceedings of the 9th workshop on multimedia & security MM&#38;Sec \u201907","author":"JS Jainsky","year":"2007","unstructured":"Jainsky JS, Kundur D, Halverson DR (2007) Towards digital video steganalysis using asymptotic memoryless detection. In: Proceedings of the 9th workshop on multimedia & security MM&#38;Sec \u201907. ACM, New York, USA, pp 161\u2013168. doi: 10.1145\/1288869.1288891"},{"key":"2181_CR16","doi-asserted-by":"crossref","unstructured":"Jue W, Min-qing Z, Juan-li S (2011) Video steganography using motion vector components. In: Communication Software and Networks (ICCSN). IEEE Int Conf:500\u2013503. doi: 10.1109\/ICCSN.2011.6013642","DOI":"10.1109\/ICCSN.2011.6013642"},{"issue":"6","key":"2181_CR17","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1109\/LSP.2005.847889","volume":"12","author":"AD Ker","year":"2005","unstructured":"Ker AD (2005) Steganalysis of lsb matching in grayscale images. Signal Processing Letters, IEEE 12(6):441\u2013444. doi: 10.1109\/LSP.2005.847889","journal-title":"Signal Processing Letters, IEEE"},{"issue":"8","key":"2181_CR18","doi-asserted-by":"crossref","first-page":"1075","DOI":"10.1109\/83.777088","volume":"8","author":"LM Marvel","year":"1999","unstructured":"Marvel LM, Boncelet CGJ, Retter C (1999) Spread spectrum image steganography. Image Process IEEE Trans 8(8):1075\u20131083. doi: 10.1109\/83.777088","journal-title":"Image Process IEEE Trans"},{"key":"2181_CR19","first-page":"287","volume":"1","author":"V Pankajakshan","year":"2007","unstructured":"Pankajakshan V, Ho A (2007) Improving video steganalysis using temporal correlation. Third Int Conf 1:287\u2013290. doi: 10.1109\/IIHMSP.2007.4457546","journal-title":"Third Int Conf"},{"key":"2181_CR20","unstructured":"Sharp T Hide 2.1. 2001. http:\/\/www.sharpthoughts.org"},{"key":"2181_CR21","doi-asserted-by":"crossref","unstructured":"Solanki K, Sarkar A, Manjunath BS (2007) Yass: yet another steganographic scheme that resists blind steganalysis. In: 9th int. workshop on info. hiding","DOI":"10.1007\/978-3-540-77370-2_2"},{"key":"2181_CR22","unstructured":"Tasdemir K, Kurugollu F, Sezer S (2013) Video steganalysis of lsb based motion vector steganography. In: Visual information processing (EUVIP), 2013 4th european workshop on pp. 260\u2013 264"},{"key":"2181_CR23","doi-asserted-by":"crossref","unstructured":"Wang K, Han J, Wang H (2013) Digital video steganalysis by subtractive prediction error adjacency matrix. Multimedia Tools Appl:1\u201318. doi: 10.1007\/s11042-013-1373-4","DOI":"10.1007\/s11042-013-1373-4"},{"key":"2181_CR24","doi-asserted-by":"crossref","unstructured":"Wang P, Zheng Z, Ying J (2008) A novel video watermark technique in motion vectors. In: Audio, language and image processing, 2008. ICALIP 2008. Int Conf:1555\u20131559","DOI":"10.1109\/ICALIP.2008.4590271"},{"key":"2181_CR25","doi-asserted-by":"crossref","unstructured":"Westfeld A, Pfitzmann A (2000) Attacks on steganographic systems. In: Proceedings of the third international workshop on information hiding, IH \u201999, Springer, London, UK. http:\/\/dl.acm.org\/citation.cfm?id=647596.731699","DOI":"10.1007\/10719724_5"},{"key":"2181_CR26","first-page":"269","volume":"1","author":"C Xu","year":"2006","unstructured":"Xu C, Ping X, Zhang T (2006) Steganography in compressed video stream. In: Innovative computing, information and control, 2006. ICICIC \u201906. First Int Conf 1:269\u2013272. doi: 10.1109\/ICICIC.2006.158","journal-title":"First Int Conf"},{"key":"2181_CR27","doi-asserted-by":"crossref","unstructured":"Zhang C, Su Y, Zhang C (2008) A new video steganalysis algorithm against motion vector steganography. In: Wireless communications, networking and mobile computing, WiCOM \u201908. Int Conf:1\u20134. doi: 10.1109\/WiCom.2008.781","DOI":"10.1109\/WiCom.2008.781"},{"key":"2181_CR28","doi-asserted-by":"crossref","unstructured":"Zhang J, Li J, Zhang L (2001) Video watermark technique in motion vector. In: Computer graphics and image processing. In: Proceedings of XIV Brazilian symposium on, pp. 179\u2013182","DOI":"10.1109\/SIBGRAPI.2001.963053"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-014-2181-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-014-2181-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-014-2181-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,13]],"date-time":"2019-08-13T00:07:03Z","timestamp":1565654823000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-014-2181-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7,25]]},"references-count":28,"journal-issue":{"issue":"23","published-print":{"date-parts":[[2015,12]]}},"alternative-id":["2181"],"URL":"https:\/\/doi.org\/10.1007\/s11042-014-2181-1","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,7,25]]}}}