{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T09:41:25Z","timestamp":1773740485138,"version":"3.50.1"},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"9-10","license":[{"start":{"date-parts":[[2019,12,11]],"date-time":"2019-12-11T00:00:00Z","timestamp":1576022400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,12,11]],"date-time":"2019-12-11T00:00:00Z","timestamp":1576022400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2020,3]]},"DOI":"10.1007\/s11042-019-08525-w","type":"journal-article","created":{"date-parts":[[2019,12,11]],"date-time":"2019-12-11T16:04:03Z","timestamp":1576080243000},"page":"5881-5896","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["Motion vector based video steganography using homogeneous block selection"],"prefix":"10.1007","volume":"79","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8372-5669","authenticated-orcid":false,"given":"Shuvendu","family":"Rana","sequence":"first","affiliation":[]},{"given":"Rohit","family":"Kamra","sequence":"additional","affiliation":[]},{"given":"Arijit","family":"Sur","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,11]]},"reference":[{"issue":"3","key":"8525_CR1","first-page":"196","volume":"1","author":"W Abu-Marie","year":"2010","unstructured":"Abu-Marie W, Gutub A, Abu-Mansour H (2010) Image based steganography using truth table based and determinate array on rgb indicator. International Journal of Signal & Image Processing 1(3):196\u2013204","journal-title":"International Journal of Signal & Image Processing"},{"key":"8525_CR2","doi-asserted-by":"crossref","unstructured":"Al-Juaid N A, Gutub A, Khan EA et al (2018) Enhancing pc data security via combining rsa cryptography and video based steganography","DOI":"10.26735\/16587790.2018.006"},{"issue":"2","key":"8525_CR3","first-page":"151","volume":"2","author":"NA Al-Otaibi","year":"2014","unstructured":"Al-Otaibi N A, Gutub A A (2014) 2-leyer security system for hiding sensitive text data on personal computers. Lecture Notes on Information Theory 2(2):151\u2013157","journal-title":"Lecture Notes on Information Theory"},{"issue":"4","key":"8525_CR4","doi-asserted-by":"crossref","first-page":"118","DOI":"10.46565\/jreas.2018.v03i04.001","volume":"3","author":"N Alanizy","year":"2018","unstructured":"Alanizy N, Alanizy A, Baghoza N, Al Ghamdi M, Gutub A (2018) 3-layer pc text security via combining compression, aes cryptography 2lsb image steganography. Journal of Research in Engineering and Applied Sciences (JREAS) 3(4):118\u2013124","journal-title":"Journal of Research in Engineering and Applied Sciences (JREAS)"},{"issue":"1","key":"8525_CR5","doi-asserted-by":"publisher","first-page":"9","DOI":"10.20448\/808.2.1.9.18","volume":"2","author":"N Alharthi","year":"2017","unstructured":"Alharthi N, Gutub A (2017) Data visualization to explore improving decision-making within hajj services. Scientific Modelling and Research 2(1):9\u201318","journal-title":"Scientific Modelling and Research"},{"issue":"3","key":"8525_CR6","doi-asserted-by":"publisher","first-page":"3649","DOI":"10.1007\/s11042-017-5537-5","volume":"78","author":"MA Alsmirat","year":"2019","unstructured":"Alsmirat MA, Al-Alem F, Al-Ayyoub M, Jararweh Y, Gupta B (2019) Impact of digital fingerprint image quality on the fingerprint recognition accuracy. Multimed Tools Appl 78(3):3649\u20133688. https:\/\/doi.org\/10.1007\/s11042-017-5537-5","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"8525_CR7","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/TIFS.2010.2090520","volume":"6","author":"H Aly","year":"2011","unstructured":"Aly H (2011) Data hiding in motion vectors of compressed video based on their associated prediction error. IEEE Transactions on Information Forensics and Security 6(1):14\u201318","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"18","key":"8525_CR8","doi-asserted-by":"publisher","first-page":"18451","DOI":"10.1007\/s11042-016-3930-0","volume":"76","author":"S Atawneh","year":"2017","unstructured":"Atawneh S, Almomani A, Al Bazar H, Sumari P, Gupta B (2017) Secure and imperceptible digital image steganographic algorithm based on diamond encoding in dwt domain. Multimed Tools Appl 76(18):18451\u201318472. https:\/\/doi.org\/10.1007\/s11042-016-3930-0","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"8525_CR9","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1109\/TIP.2002.807363","volume":"12","author":"I Avcibas","year":"2003","unstructured":"Avcibas I, Memon N, Sankur B (Feb 2003) Steganalysis using image quality metrics. IEEE Trans Image Process 12(2):221\u2013229","journal-title":"IEEE Trans Image Process"},{"key":"8525_CR10","doi-asserted-by":"crossref","unstructured":"Avcibas I, Nasir M, Sankur B (2001) Steganalysis based on image quality metrics. In: 2001 IEEE 4th workshop on multimedia signal processing (Cat. No.01TH8564), pp 517\u2013522","DOI":"10.1109\/MMSP.2001.962785"},{"issue":"4","key":"8525_CR11","doi-asserted-by":"publisher","first-page":"502","DOI":"10.1109\/TIFS.2006.885020","volume":"1","author":"U Budhia","year":"2006","unstructured":"Budhia U, Kundur D, Zourntos T (2006) Digital video steganalysis exploiting statistical visibility in the temporal domain. IEEE Transactions on Information Forensics and Security 1(4):502\u2013516","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"1","key":"8525_CR12","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/LSP.2011.2176116","volume":"19","author":"Y Cao","year":"2012","unstructured":"Cao Y, Zhao X, Feng D (2012) Video steganalysis exploiting motion vector reversion-based features. IEEE Signal Processing Letters 19(1):35\u201338","journal-title":"IEEE Signal Processing Letters"},{"key":"8525_CR13","doi-asserted-by":"crossref","unstructured":"Cao Y, Zhao X, Feng D, Sheng R (2011) Video steganography with perturbed motion estimation. In: Filler T, Pevn\u00fd T, Craver S, Ker A (eds) Information hiding. Springer, Berlin, pp 193\u2013207","DOI":"10.1007\/978-3-642-24178-9_14"},{"key":"8525_CR14","doi-asserted-by":"crossref","unstructured":"Chebbo S, Durieux P, Pesquet-Popescu B (2010) Objective evaluation of compressed video\u2019s temporal flickering. In: 2010 2nd international conference on image processing theory, tools and applications, pp 177\u2013180","DOI":"10.1109\/IPTA.2010.5586728"},{"issue":"1","key":"8525_CR15","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1023\/A:1008107127819","volume":"27","author":"B Chen","year":"2001","unstructured":"Chen B, Wornell GW (2001) Quantization index modulation methods for digital watermarking and information embedding of multimedia. J VLSI Signal Process Syst Signal, Image Video Technol 27(1):7\u201333. https:\/\/doi.org\/10.1023\/A:1008107127819","journal-title":"J VLSI Signal Process Syst Signal, Image Video Technol"},{"key":"8525_CR16","doi-asserted-by":"crossref","unstructured":"Chen C, Shi YQ, Chen W, Xuan G Statistical moments based universal steganalysis using jpeg 2-d array and 2-d characteristic function. In: 2006 international conference on image processing, 2006, pp 105\u2013108","DOI":"10.1109\/ICIP.2006.312383"},{"issue":"7","key":"8525_CR17","doi-asserted-by":"publisher","first-page":"1995","DOI":"10.1109\/TSP.2003.812753","volume":"51","author":"S Dumitrescu","year":"2003","unstructured":"Dumitrescu S, Wu X, Wang Z (2003) Detection of lsb steganography via sample pair analysis. IEEE Trans Signal Process 51(7):1995\u20132007","journal-title":"IEEE Trans Signal Process"},{"key":"8525_CR18","unstructured":"Fang D-Y, Chang L-W (2006) Data hiding for digital video with phase of motion vector. In: 2006 IEEE international symposium on circuits and systems, pp 4"},{"issue":"2","key":"8525_CR19","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1111\/j.1469-1809.1936.tb02137.x","volume":"7","author":"RA Fisher","year":"1936","unstructured":"Fisher R A (1936) The use of multiple measurements in taxonomic problems. Annals of eugenics 7(2):179\u2013188","journal-title":"Annals of eugenics"},{"key":"8525_CR20","unstructured":"Fridrich J (2005) Feature-based steganalysis for jpeg images and its implications for future design of steganographic schemes. In: Fridrich J (ed) Information hiding. Springer, Berlin, pp 67\u201381"},{"issue":"7","key":"8525_CR21","doi-asserted-by":"publisher","first-page":"950","DOI":"10.1109\/26.57512","volume":"38","author":"M Ghanbari","year":"1990","unstructured":"Ghanbari M (1990) The cross-search algorithm for motion estimation [image coding]. IEEE Trans Communs 38(7):950\u2013953","journal-title":"IEEE Trans Communs"},{"key":"8525_CR22","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-0105-3","volume-title":"Handbook of research on modern cryptographic solutions for computer and cyber security","author":"B Gupta","year":"2016","unstructured":"Gupta B, Agrawal D P, Yamaguchi S (2016) Handbook of research on modern cryptographic solutions for computer and cyber security, 1st edn. IGI Global, Hershey","edition":"1st edn."},{"key":"8525_CR23","unstructured":"Gupta B B (2018) Computer and cyber security: principles, algorithm, applications, and perspectives. CRC Press"},{"issue":"1","key":"8525_CR24","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1007\/s13319-019-0216-0","volume":"10","author":"A Gutub","year":"2019","unstructured":"Gutub A, Al-Ghamdi M (2019) Image based steganography to facilitate improving counting-based secret sharing. 3D Research 10(1):6","journal-title":"3D Research"},{"issue":"2","key":"8525_CR25","first-page":"1","volume":"1","author":"A Gutub","year":"2018","unstructured":"Gutub A, Al-Juaid N (2018) Multi-bits stego-system for hiding text in multimedia images based on user security priority. Journal of Computer Hardware Engineering 1 (2):1\u20139","journal-title":"Journal of Computer Hardware Engineering"},{"issue":"1","key":"8525_CR26","first-page":"56","volume":"2","author":"AA-A Gutub","year":"2010","unstructured":"Gutub AA-A, et al. (2010) Pixel indicator technique for rgb image steganography. Journal of emerging technologies in web intelligence 2(1):56\u201364","journal-title":"Journal of emerging technologies in web intelligence"},{"key":"8525_CR27","doi-asserted-by":"crossref","unstructured":"He X, Luo Z (2008) A novel steganographic algorithm based on the motion vector phase. In: 2008 international conference on computer science and software engineering, vol 3, pp 822\u2013825","DOI":"10.1109\/CSSE.2008.359"},{"key":"8525_CR28","doi-asserted-by":"crossref","unstructured":"Huang F, Li B, Huang J (2007) Attack lsb matching steganography by counting alteration rate of the number of neighbourhood gray levels. In: 2007 IEEE international conference on image processing, vol 1, pp I \u2013 401\u2013I \u2013 404","DOI":"10.1109\/ICIP.2007.4378976"},{"key":"8525_CR29","doi-asserted-by":"publisher","unstructured":"Jainsky JS, Kundur D, Halverson DR (2007) Towards digital video steganalysis using asymptotic memoryless detection. In: Proceedings of the 9th workshop on multimedia & security, ser. MM&Sec \u201907. https:\/\/doi.org\/10.1145\/1288869.1288891. ACM, New York, pp 161\u2013168","DOI":"10.1145\/1288869.1288891"},{"key":"8525_CR30","doi-asserted-by":"crossref","unstructured":"Jue W, Min-qing Z, Juan-li S (2011) Video steganography using motion vector components. In: 2011 IEEE 3rd international conference on communication software and networks (ICCSN), pp 500\u2013503","DOI":"10.1109\/ICCSN.2011.6013642"},{"key":"8525_CR31","doi-asserted-by":"publisher","unstructured":"Liang Y-R, Xiao Z-Y (2018) Image encryption algorithm based on compressive sensing and fractional dct via polynomial interpolation. International Journal of Automation and Computing. https:\/\/doi.org\/10.1007\/s11633-018-1159-2","DOI":"10.1007\/s11633-018-1159-2"},{"issue":"8","key":"8525_CR32","doi-asserted-by":"publisher","first-page":"1075","DOI":"10.1109\/83.777088","volume":"8","author":"LM Marvel","year":"1999","unstructured":"Marvel L M, Boncelet C G, Retter C T (1999) Spread spectrum image steganography. IEEE Trans Image Process 8(8):1075\u20131083","journal-title":"IEEE Trans Image Process"},{"issue":"4","key":"8525_CR33","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1109\/76.465087","volume":"5","author":"KM Nam","year":"1995","unstructured":"Nam K M, Kim J-S, Park R-H, Shim Y S (1995) A fast hierarchical motion vector estimation algorithm using mean pyramid. IEEE Transactions on Circuits and Systems for Video Technology 5(4):344\u2013351","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"8525_CR34","doi-asserted-by":"crossref","unstructured":"Pankajakshan V, Ho A T S (2007) Improving video steganalysis using temporal correlation. In: 3rd international conference on intelligent information hiding and multimedia signal processing (IIH-MSP 2007), vol 1, pp 287\u2013290","DOI":"10.1109\/IIHMSP.2007.4457546"},{"issue":"1B","key":"8525_CR35","first-page":"127","volume":"38","author":"MT Parvez","year":"2011","unstructured":"Parvez M T, Gutub AA-A (2011) Vibrant color image steganography using channel differences and secret data distribution. Kuwait J Sci Eng 38(1B):127\u2013142","journal-title":"Kuwait J Sci Eng"},{"issue":"3","key":"8525_CR36","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1109\/76.499840","volume":"6","author":"L-M Po","year":"1996","unstructured":"Po L-M, Ma W-C (1996) A novel four-step search algorithm for fast block motion estimation. IEEE Transactions on Circuits and Systems for Video Technology 6(3):313\u2013317","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"4","key":"8525_CR37","doi-asserted-by":"publisher","first-page":"244","DOI":"10.3390\/e20040244","volume":"20","author":"E Sadat","year":"2018","unstructured":"Sadat E, Faez K, Saffari Pour M (2018) Entropy-based video steganalysis of motion vectors. Entropy 20(4):244","journal-title":"Entropy"},{"key":"8525_CR38","doi-asserted-by":"crossref","unstructured":"Solanki K, Sarkar A, Manjunath B S (2007) Yass: Yet another steganographic scheme that resists blind steganalysis. In: 9th int. workshop on info hiding","DOI":"10.1007\/978-3-540-77370-2_2"},{"key":"8525_CR39","doi-asserted-by":"crossref","unstructured":"Solanki K, Sarkar A, Manjunath BS (2007) Yass: Yet another steganographic scheme that resists blind steganalysis. In: Furon T, Cayre F, Do\u00ebrr G, Bas P (eds) Information hiding. Springer, Berlin, pp 16\u201331","DOI":"10.1007\/978-3-540-77370-2_2"},{"issue":"23","key":"8525_CR40","doi-asserted-by":"publisher","first-page":"10479","DOI":"10.1007\/s11042-014-2181-1","volume":"74","author":"A Sur","year":"2015","unstructured":"Sur A, Madhav Krishna SV, Sahu N, Rana S (2015) Detection of motion vector based video steganography. Multimed Tools Appl 74(23):10479\u201310494. https:\/\/doi.org\/10.1007\/s11042-014-2181-1","journal-title":"Multimed Tools Appl"},{"key":"8525_CR41","unstructured":"Tasdemir K, Kurugollu F, Sezer S (2013) Video steganalysis of lsb based motion vector steganography. In: European workshop on visual information processing (EUVIP), pp 260\u2013264"},{"key":"8525_CR42","doi-asserted-by":"crossref","unstructured":"Wang P, Zheng Z, Ying J (2008) A novel video watermark technique in motion vectors. In: 2008 international conference on audio, language and image processing, pp 1555\u20131559","DOI":"10.1109\/ICALIP.2008.4590271"},{"key":"8525_CR43","doi-asserted-by":"crossref","unstructured":"Westfeld A, Pfitzmann A (2000) Attacks on steganographic systems. In: Pfitzmann A (ed) Information hiding. Springer, Berlin, pp 61\u201376","DOI":"10.1007\/10719724_5"},{"key":"8525_CR44","unstructured":"Xu C, Ping X, Zhang T (2006) Steganography in compressed video stream. In: 1st international conference on innovative computing, Information and Control, 2006 ICICIC \u201906, vol 1, pp 269\u2013272"},{"issue":"4","key":"8525_CR45","doi-asserted-by":"publisher","first-page":"4585","DOI":"10.1007\/s11042-017-4637-6","volume":"77","author":"C Yu","year":"2018","unstructured":"Yu C, Li J, Li X, Ren X, Gupta B (2018) Four-image encryption scheme based on quaternion fresnel transform, chaos and computer generated hologram. Multimed Tools Appl 77(4):4585\u20134608. https:\/\/doi.org\/10.1007\/s11042-017-4637-6","journal-title":"Multimed Tools Appl"},{"key":"8525_CR46","unstructured":"Zahariadis T, Kalivas D (1996) A spiral search algorithm for fast estimation of block motion vectors. In: European signal processing conference, 1996 EUSIPCO 1996. 8th, pp 1\u20134"},{"key":"8525_CR47","doi-asserted-by":"crossref","unstructured":"Zhang C, Su Y, Zhang C (2008) A new video steganalysis algorithm against motion vector steganography. In: 4th International Conference on Wireless Communications, Networking and Mobile Computing, 2008. WiCOM \u201908, pp 1\u20134","DOI":"10.1109\/WiCom.2008.781"},{"key":"8525_CR48","doi-asserted-by":"crossref","unstructured":"Zhang J, Li J, Zhang L (2001) Video watermark technique in motion vector. In: Proceedings XIV Brazilian symposium on computer graphics and image processing, pp 179\u2013182","DOI":"10.1109\/SIBGRAPI.2001.963053"},{"issue":"23","key":"8525_CR49","doi-asserted-by":"publisher","first-page":"30251","DOI":"10.1007\/s11042-018-6128-9","volume":"77","author":"N Zhou","year":"2018","unstructured":"Zhou N, Hou WMX, Wen RH, Zou WP (2018) Imperceptible digital watermarking scheme in multiple transform domains. Multimed Tools Appl 77 (23):30251\u201330267. https:\/\/doi.org\/10.1007\/s11042-018-6128-9","journal-title":"Multimed Tools Appl"},{"key":"8525_CR50","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.optlaseng.2018.05.014","volume":"110","author":"N Zhou","year":"2018","unstructured":"Zhou N, Jiang H, Gong L, Xie X (2018) Double-image compression and encryption algorithm based on co-sparse representation and random pixel exchanging. Optics and Lasers in Engineering 110:72\u201379. http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0143816618303099","journal-title":"Optics and Lasers in Engineering"},{"issue":"12","key":"8525_CR51","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1007\/s11128-018-2104-6","volume":"17","author":"N Zhou","year":"2018","unstructured":"Zhou N, Yan X, Liang H, Tao X, Li G (2018) Multi-image encryption scheme based on quantum 3d arnold transform and scaled zhongtang chaotic system. Quantum Information Processing 17(12):338. https:\/\/doi.org\/10.1007\/s11128-018-2104-6","journal-title":"Quantum Information Processing"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-08525-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-019-08525-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-08525-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,10]],"date-time":"2020-12-10T01:13:13Z","timestamp":1607562793000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-019-08525-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,11]]},"references-count":51,"journal-issue":{"issue":"9-10","published-print":{"date-parts":[[2020,3]]}},"alternative-id":["8525"],"URL":"https:\/\/doi.org\/10.1007\/s11042-019-08525-w","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12,11]]},"assertion":[{"value":"12 November 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 September 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 November 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 December 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}