{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T07:37:33Z","timestamp":1774942653087,"version":"3.50.1"},"reference-count":201,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2020,10,8]],"date-time":"2020-10-08T00:00:00Z","timestamp":1602115200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,10,8]],"date-time":"2020-10-08T00:00:00Z","timestamp":1602115200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Technical Education Quality Improvement Project III (TEQIP III) of MHRD","award":["P154523"],"award-info":[{"award-number":["P154523"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,2]]},"DOI":"10.1007\/s11042-020-09929-9","type":"journal-article","created":{"date-parts":[[2020,10,8]],"date-time":"2020-10-08T10:03:06Z","timestamp":1602151386000},"page":"5723-5771","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":78,"title":["Steganography and Steganalysis (in digital forensics): a Cybersecurity guide"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3473-6652","authenticated-orcid":false,"given":"Mukesh","family":"Dalal","sequence":"first","affiliation":[]},{"given":"Mamta","family":"Juneja","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,8]]},"reference":[{"issue":"2","key":"9929_CR1","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1016\/0165-1684(93)90063-G","volume":"31","author":"T Aach","year":"1993","unstructured":"Aach T, Kaup A, Mester R (1993) Statistical model-based change detection in moving video. Signal Process 31(2):165\u2013180","journal-title":"Signal Process"},{"key":"9929_CR2","doi-asserted-by":"crossref","unstructured":"M Abdolmohammadi, RM Toroghi, and A Bastanfard (2019). \u201cVideo Steganography Using 3D Convolutional Neural Networks,\u201d in Mediterranean Conference on Pattern Recognition and Artificial Intelligence, pp. 149\u2013161","DOI":"10.1007\/978-3-030-37548-5_12"},{"key":"9929_CR3","unstructured":"S Abu-El-Haija, N Kothari, J Lee, P Natsev, G Toderici, B Varadarajan, and S Vijayanarasimhan (2016). \u201cYoutube-8m: A large-scale video classification benchmark,\u201d arXiv Prepr. arXiv1609.08675"},{"key":"9929_CR4","doi-asserted-by":"crossref","unstructured":"S Alam, T Ahmad, and MN Doja (2017). \u201cA Novel Edge Based Chaotic Steganography Method Using Neural Network,\u201d in Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications, pp. 467\u2013475","DOI":"10.1007\/978-981-10-3156-4_48"},{"key":"9929_CR5","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1016\/j.eswa.2015.10.024","volume":"46","author":"H Al-Dmour","year":"2016","unstructured":"Al-Dmour H, Al-Ani A (2016) A steganography embedding method based on edge identification and XOR coding. Expert Syst Appl 46:293\u2013306","journal-title":"Expert Syst Appl"},{"issue":"1","key":"9929_CR6","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/TIFS.2010.2090520","volume":"6","author":"HA Aly","year":"2011","unstructured":"Aly HA (2011) Data hiding in motion vectors of compressed video based on their associated prediction error. IEEE Trans Inf Forensics Secur 6(1):14\u201318","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"9","key":"9929_CR7","doi-asserted-by":"crossref","first-page":"2131","DOI":"10.1109\/TCSVT.2017.2712162","volume":"28","author":"M Asikuzzaman","year":"2018","unstructured":"Asikuzzaman M, Pickering MR (2018) An overview of digital video watermarking. IEEE Trans Circuits Syst Video Technol 28(9):2131\u20132153","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"18","key":"9929_CR8","doi-asserted-by":"crossref","first-page":"18451","DOI":"10.1007\/s11042-016-3930-0","volume":"76","author":"S Atawneh","year":"2017","unstructured":"Atawneh S, Almomani A, Al Bazar H, Sumari P, Gupta B (2017) Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain. Multimed Tools Appl 76(18):18451\u201318472","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"9929_CR9","doi-asserted-by":"crossref","first-page":"1965","DOI":"10.1016\/j.asej.2017.02.003","volume":"9","author":"AA Attaby","year":"2018","unstructured":"Attaby AA, Ahmed MFMM, Alsammak AK (2018) Data hiding inside JPEG images with high resistance to steganalysis using a novel technique: DCT-M3. Ain Shams Eng J 9(4):1965\u20131974","journal-title":"Ain Shams Eng J"},{"issue":"10","key":"9929_CR10","doi-asserted-by":"crossref","first-page":"1559","DOI":"10.1109\/TIFS.2013.2279945","volume":"8","author":"N Babaguchi","year":"2013","unstructured":"Babaguchi N, Cavallaro A, Chellappa R, Dufaux F, Wang L (2013) Guest editorial: special issue on intelligent video surveillance for public security and personal privacy. IEEE Trans Inf Forensics Secur 8(10):1559\u20131561","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"9929_CR11","unstructured":"RJ Bagnall (2002). \u201cReversing the steganography myth in terrorist operations: The asymmetrical threat of simple intelligence dissemination techniques using common tools,\u201d SANS Inf. Secur. Read. Room, vol. 19"},{"issue":"3","key":"9929_CR12","doi-asserted-by":"crossref","first-page":"2223","DOI":"10.1007\/s11042-013-1640-4","volume":"73","author":"C Balasubramanian","year":"2014","unstructured":"Balasubramanian C, Selvakumar S, Geetha S (2014) High payload image steganography with reduced distortion using octonary pixel pairing scheme. Multimed Tools Appl 73(3):2223\u20132245","journal-title":"Multimed Tools Appl"},{"key":"9929_CR13","doi-asserted-by":"crossref","unstructured":"Balu S, Babu CNK, Amudha K (2018) Secure and efficient data transmission by video steganography in medical imaging system. Clust Comput:1\u20137","DOI":"10.1007\/s10586-018-2639-4"},{"key":"9929_CR14","unstructured":"FC Bancroft and C Clelland (2001). \u201cDNA-based steganography.\u201d Google Patents"},{"key":"9929_CR15","doi-asserted-by":"crossref","unstructured":"BG Banik and SK Bandyopadhyay (2017). \u201cImage Steganography using BitPlane complexity segmentation and hessenberg QR method,\u201d in Proceedings of the First International Conference on Intelligent Computing and Communication, pp. 623\u2013633","DOI":"10.1007\/978-981-10-2035-3_63"},{"key":"9929_CR16","doi-asserted-by":"crossref","unstructured":"M Barni, G Cancelli, and A Esposito (2010). \u201cForensics aided steganalysis of heterogeneous images,\u201d in 2010 IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 1690\u20131693","DOI":"10.1109\/ICASSP.2010.5495494"},{"key":"9929_CR17","doi-asserted-by":"crossref","unstructured":"N Beebe (2009). \u201cDigital forensic research: The good, the bad and the unaddressed,\u201d in IFIP International Conference on Digital Forensics, pp. 17\u201336","DOI":"10.1007\/978-3-642-04155-6_2"},{"issue":"2","key":"9929_CR18","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1109\/LCOMM.2014.2387160","volume":"19","author":"Y Cao","year":"2015","unstructured":"Cao Y, Zhang H, Zhao X, Yu H (2015) Covert communication by compressed videos exploiting the uncertainty of motion estimation. IEEE Commun Lett 19(2):203\u2013206","journal-title":"IEEE Commun Lett"},{"key":"9929_CR19","doi-asserted-by":"crossref","unstructured":"Y Cao, X Zhao, D Feng, and R Sheng (2011). \u201cVideo steganography with perturbed motion estimation,\u201d in International Workshop on Information Hiding, pp. 193\u2013207","DOI":"10.1007\/978-3-642-24178-9_14"},{"key":"9929_CR20","unstructured":"G Cao, Y Zhao, and R Ni (2008). \u201cImage composition detection using object-based color consistency,\u201d in 2008 9Th international conference on signal processing, pp. 1186\u20131189"},{"issue":"1","key":"9929_CR21","doi-asserted-by":"crossref","first-page":"805","DOI":"10.1007\/s11042-016-4273-6","volume":"77","author":"SS Chaeikar","year":"2018","unstructured":"Chaeikar SS, Zamani M, Manaf ABA, Zeki AM (2018) PSW statistical LSB image steganalysis. Multimed Tools Appl 77(1):805\u2013835","journal-title":"Multimed Tools Appl"},{"key":"9929_CR22","doi-asserted-by":"crossref","unstructured":"Chakraborty S, Jalal AS (2020) A novel local binary pattern based blind feature image steganography. Multimed Tools Appl:1\u201314","DOI":"10.1007\/s11042-020-08828-3"},{"issue":"6","key":"9929_CR23","doi-asserted-by":"crossref","first-page":"7973","DOI":"10.1007\/s11042-016-3449-4","volume":"76","author":"S Chakraborty","year":"2017","unstructured":"Chakraborty S, Jalal AS, Bhatnagar C (2017) LSB based non blind predictive edge adaptive image steganography. Multimed Tools Appl 76(6):7973\u20137987","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"9929_CR24","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1016\/j.patcog.2003.08.007","volume":"37","author":"C-K Chan","year":"2004","unstructured":"Chan C-K, Cheng L-M (2004) Hiding data in images by simple LSB substitution. Pattern Recogn 37(3):469\u2013474","journal-title":"Pattern Recogn"},{"issue":"3","key":"9929_CR25","doi-asserted-by":"crossref","first-page":"727","DOI":"10.1016\/j.sigpro.2009.08.010","volume":"90","author":"A Cheddad","year":"2010","unstructured":"Cheddad A, Condell J, Curran K, Mc Kevitt P (2010) Digital image steganography: survey and analysis of current methods. Signal Process 90(3):727\u2013752","journal-title":"Signal Process"},{"issue":"7","key":"9929_CR26","doi-asserted-by":"crossref","first-page":"160","DOI":"10.2352\/ISSN.2470-1173.2018.07.MWSF-160","volume":"2018","author":"M Chen","year":"2018","unstructured":"Chen M, Boroumand M, Fridrich J (2018) Deep learning regressors for quantitative steganalysis. Electron Imaging 2018(7):160\u2013161","journal-title":"Electron Imaging"},{"issue":"12","key":"9929_CR27","doi-asserted-by":"crossref","first-page":"3689","DOI":"10.1007\/s10773-018-3882-4","volume":"57","author":"S Chen","year":"2018","unstructured":"Chen S, Qu Z (2018) Novel quantum video steganography and authentication protocol with large payload. Int J Theor Phys 57(12):3689\u20133701","journal-title":"Int J Theor Phys"},{"issue":"6","key":"9929_CR28","doi-asserted-by":"crossref","first-page":"7447","DOI":"10.1007\/s11042-017-4656-3","volume":"77","author":"S Chutani","year":"2018","unstructured":"Chutani S, Goyal A (2018) Improved universal quantitative steganalysis in spatial domain using ELM ensemble. Multimed Tools Appl 77(6):7447\u20137468","journal-title":"Multimed Tools Appl"},{"issue":"13","key":"9929_CR29","doi-asserted-by":"crossref","first-page":"18169","DOI":"10.1007\/s11042-019-7217-0","volume":"78","author":"S Chutani","year":"2019","unstructured":"Chutani S, Goyal A (2019) A review of forensic approaches to digital image Steganalysis. Multimed Tools Appl 78(13):18169\u201318204","journal-title":"Multimed Tools Appl"},{"key":"9929_CR30","first-page":"94","volume":"30","author":"H Dadgostar","year":"2016","unstructured":"Dadgostar H, Afsari F (2016) Image steganography based on interval-valued intuitionistic fuzzy edge detection and modified LSB. J Inf Secur Appl 30:94\u2013104","journal-title":"J Inf Secur Appl"},{"issue":"4","key":"9929_CR31","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1504\/IJESDF.2018.095122","volume":"10","author":"M Dalal","year":"2018","unstructured":"Dalal M, Juneja M (2018) Video steganalysis to obstruct criminal activities for digital forensics: a survey. Int J Electron Secur Digit Forensics 10(4):338\u2013355","journal-title":"Int J Electron Secur Digit Forensics"},{"key":"9929_CR32","doi-asserted-by":"crossref","unstructured":"M Dalal and M Juneja (2018). \u201cVideo Steganography Techniques in Spatial Domain-A Survey,\u201d in Proceedings of the International Conference on Computing and Communication Systems, Springer, Singapore, pp. 705\u2013711","DOI":"10.1007\/978-981-10-6890-4_67"},{"issue":"5","key":"9929_CR33","first-page":"297","volume":"6","author":"M Dalal","year":"2018","unstructured":"Dalal M, Juneja M (2018) H. 264\/AVC video steganography techniques: an overview. Int J Comput Sci Eng 6(5):297\u2013303","journal-title":"Int J Comput Sci Eng"},{"issue":"5","key":"9929_CR34","doi-asserted-by":"crossref","first-page":"5769","DOI":"10.1007\/s11042-018-6093-3","volume":"78","author":"M Dalal","year":"2019","unstructured":"Dalal M, Juneja M (2019) A robust and imperceptible steganography technique for SD and HD videos. Multimed Tools Appl 78(5):5769\u20135789","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"9929_CR35","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/19393555.2019.1708516","volume":"29","author":"M Dalal","year":"2020","unstructured":"Dalal M, Juneja M (2020) Evaluation of orthogonal and biorthogonal wavelets for video steganography. Inf Secur J A Glob Perspect 29(1):1\u201311","journal-title":"Inf Secur J A Glob Perspect"},{"issue":"3","key":"9929_CR36","first-page":"145","volume":"10","author":"MB Desai","year":"2016","unstructured":"Desai MB, Patel SV, Prajapati B (2016) ANOVA and fisher criterion based feature selection for lower dimensional universal image Steganalysis. Int J Image Process 10(3):145\u2013160","journal-title":"Int J Image Process"},{"key":"9929_CR37","doi-asserted-by":"crossref","unstructured":"V Divya and N Sasirekha (2016). \u201cHigh capacity steganography technique based on wavelet transform,\u201d in 2016 Online International Conference on Green Engineering and Technologies (IC-GET), pp. 1\u20135","DOI":"10.1109\/GET.2016.7916612"},{"issue":"1","key":"9929_CR38","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/s10462-016-9459-9","volume":"46","author":"S Dogan","year":"2016","unstructured":"Dogan S (2016) A new data hiding method based on chaos embedded genetic algorithm for color image. Artif Intell Rev 46(1):129\u2013143","journal-title":"Artif Intell Rev"},{"key":"9929_CR39","doi-asserted-by":"crossref","first-page":"25777","DOI":"10.1109\/ACCESS.2020.2971528","volume":"8","author":"X Duan","year":"2020","unstructured":"Duan X, Guo D, Liu N, Li B, Gou M, Qin C (2020) A new high capacity image steganography method combined with image elliptic curve cryptography and deep neural network. IEEE Access 8:25777\u201325788","journal-title":"IEEE Access"},{"key":"9929_CR40","doi-asserted-by":"crossref","first-page":"9314","DOI":"10.1109\/ACCESS.2019.2891247","volume":"7","author":"X Duan","year":"2019","unstructured":"Duan X, Jia K, Li B, Guo D, Zhang E, Qin C (2019) Reversible image steganography scheme based on a U-net structure. IEEE Access 7:9314\u20139323","journal-title":"IEEE Access"},{"key":"9929_CR41","doi-asserted-by":"crossref","unstructured":"Fan M, Liu P, Wang H, Sun X (2016) Cross correlation feature mining for steganalysis of hash based least significant bit substitution video steganography. Telecommun Syst:1\u20137","DOI":"10.1007\/s11235-016-0139-5"},{"issue":"4","key":"9929_CR42","doi-asserted-by":"crossref","first-page":"1269","DOI":"10.1007\/s11036-018-1167-z","volume":"24","author":"L Fan","year":"2019","unstructured":"Fan L, Sun W, Feng G (2019) Image steganalysis via random subspace fisher linear discriminant vector functional link network and feature mapping. Mob Networks Appl 24(4):1269\u20131278","journal-title":"Mob Networks Appl"},{"key":"9929_CR43","doi-asserted-by":"crossref","unstructured":"T Filler and J Fridrich (2011). \u201cDesign of adaptive steganographic schemes for digital images,\u201d in Media Watermarking, Security, and Forensics III, vol. 7880, p. 78800F","DOI":"10.1117\/12.872192"},{"issue":"3","key":"9929_CR44","doi-asserted-by":"crossref","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","volume":"7","author":"J Fridrich","year":"2012","unstructured":"Fridrich J, Kodovsky J (2012) Rich models for steganalysis of digital images. IEEE Trans Inf Forensics Secur 7(3):868\u2013882","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"9929_CR45","doi-asserted-by":"crossref","first-page":"106541","DOI":"10.1016\/j.compeleceng.2019.106541","volume":"81","author":"DR Galiano","year":"2020","unstructured":"Galiano DR, Del Barrio AA, Botella G, Cuesta D (2020) Efficient embedding and retrieval of information for high-resolution videos coded with HEVC. Comput Electr Eng 81:106541","journal-title":"Comput Electr Eng"},{"key":"9929_CR46","unstructured":"S Gallagher (2012). \u201cSteganography: how al-Qaeda hid secret documents in a porn video,\u201d. [Online]. Available: https:\/\/arstechnica.com\/business\/2012\/05\/steganography-how-al-qaeda-hid-secret-documents-in-a-porn-video\/. [Accessed: 01-Jul-2016]"},{"issue":"7","key":"9929_CR47","doi-asserted-by":"crossref","first-page":"311","DOI":"10.2352\/ISSN.2470-1173.2018.07.MWSF-318","volume":"2018","author":"Q Gibouloto","year":"2018","unstructured":"Gibouloto Q, Cogranneo R, Bas P (2018) Steganalysis into the wild: how to define a source? Electron Imaging 2018(7):311\u2013318","journal-title":"Electron Imaging"},{"key":"9929_CR48","doi-asserted-by":"crossref","unstructured":"M Goljan and J Fridrich (2015). \u201cCFA-aware features for steganalysis of color images,\u201d in Media Watermarking, Security, and Forensics 2015, vol. 9409, p. 94090V","DOI":"10.1117\/12.2078399"},{"key":"9929_CR49","doi-asserted-by":"crossref","unstructured":"I. R. Grajeda-Marin, H. A. Montes-Venegas, J. R. Marcial-Romero, J. A. Hern\u00e1ndez-Servin, and G. De Ita (2016). \u201cAn optimization approach to the TWPVD method for digital image steganography,\u201d in Mexican Conference on Pattern Recognition, pp. 125\u2013134","DOI":"10.1007\/978-3-319-39393-3_13"},{"issue":"5","key":"9929_CR50","doi-asserted-by":"crossref","first-page":"814","DOI":"10.1109\/TIFS.2014.2312817","volume":"9","author":"L Guo","year":"2014","unstructured":"Guo L, Ni J, Shi YQ (2014) Uniform embedding for efficient JPEG steganography. IEEE Trans Inf Forensics Secur 9(5):814\u2013825","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"4","key":"9929_CR51","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1016\/j.aeue.2011.08.007","volume":"66","author":"Y He","year":"2012","unstructured":"He Y, Yang G, Zhu N (2012) A real-time dual watermarking algorithm of H. 264\/AVC video stream for video-on-demand service. AEU-International J Electron Commun 66(4):305\u2013312","journal-title":"AEU-International J Electron Commun"},{"issue":"9","key":"9929_CR52","doi-asserted-by":"crossref","first-page":"1904","DOI":"10.1109\/TPAMI.2015.2389824","volume":"37","author":"K He","year":"2015","unstructured":"He K, Zhang X, Ren S, Sun J (2015) Spatial pyramid pooling in deep convolutional networks for visual recognition. IEEE Trans Pattern Anal Mach Intell 37(9):1904\u20131916","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"9929_CR53","doi-asserted-by":"crossref","unstructured":"V Holub and J Fridrich (2012). \u201cDesigning steganographic distortion using directional filters,\u201d in 2012 IEEE International workshop on information forensics and security (WIFS), pp. 234\u2013239","DOI":"10.1109\/WIFS.2012.6412655"},{"key":"9929_CR54","doi-asserted-by":"crossref","unstructured":"V Holub and J Fridrich (2013). \u201cDigital image steganography using universal distortion,\u201d in Proceedings of the first ACM workshop on Information hiding and multimedia security, pp. 59\u201368","DOI":"10.1145\/2482513.2482514"},{"issue":"18","key":"9929_CR55","doi-asserted-by":"crossref","first-page":"5036","DOI":"10.1002\/sec.1676","volume":"9","author":"O Hosam","year":"2016","unstructured":"Hosam O, Ben Halima N (2016) Adaptive block-based pixel value differencing steganography. Secur Commun Networks 9(18):5036\u20135050","journal-title":"Secur Commun Networks"},{"issue":"6","key":"9929_CR56","doi-asserted-by":"crossref","first-page":"41","DOI":"10.3390\/sym8060041","volume":"8","author":"M Hussain","year":"2016","unstructured":"Hussain M, Abdul Wahab AW, Javed N, Jung K-H (2016) Hybrid data hiding scheme using right-most digit replacement and adaptive least significant bit for digital images. Symmetry (Basel) 8(6):41","journal-title":"Symmetry (Basel)"},{"key":"9929_CR57","doi-asserted-by":"crossref","unstructured":"M Hussain, AWA Wahab, YI Bin Idris, ATS Ho, and K-H Jung (2018). \u201cImage steganography in spatial domain: a survey,\u201d Signal Process. Image Commun","DOI":"10.1016\/j.image.2018.03.012"},{"key":"9929_CR58","doi-asserted-by":"crossref","unstructured":"QP Huu, TH Dinh, NN Tran, TP Van, and TT Minh (2019). \u201cDeep Neural Networks Based Invisible Steganography for Audio-into-Image Algorithm,\u201d in The 8th Global Conference on Consumer Electronics (GCCE 2019), pp. 1\u20135","DOI":"10.1109\/GCCE46687.2019.9015498"},{"key":"9929_CR59","doi-asserted-by":"crossref","unstructured":"T Idbeaa, SA Samad, and H Husain (2016). \u201cA secure and robust compressed domain video steganography for intra-and inter-frames using embedding-based byte differencing (EBBD) scheme,\u201d PLoS One, vol. 11, no. 3","DOI":"10.1371\/journal.pone.0150732"},{"key":"9929_CR60","unstructured":"AK Jain and U Uludag (2002). \u201cHiding fingerprint minutiae in images,\u201d in Proceedings of 3rd Workshop on Automatic Identification Advanced Technologies, pp. 97\u2013102"},{"issue":"1","key":"9929_CR61","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1109\/45.747237","volume":"18","author":"T Jamil","year":"1999","unstructured":"Jamil T (1999) Steganography: the art of hiding information in plain sight. IEEE potentials 18(1):10\u201312","journal-title":"IEEE potentials"},{"key":"9929_CR62","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1016\/j.compeleceng.2017.12.009","volume":"75","author":"B Jan","year":"2019","unstructured":"Jan B, Farman H, Khan M, Imran M, Islam IU, Ahmad A, Ali S, Jeon G (2019) Deep learning in big data analytics: a comparative study. Comput Electr Eng 75:275\u2013287","journal-title":"Comput Electr Eng"},{"key":"9929_CR63","doi-asserted-by":"crossref","unstructured":"NF Johnson, Z Duric, and S Jajodia (2001). Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking: Attacks and Countermeasures, vol. 1. Springer Science & Business Media","DOI":"10.1007\/978-1-4615-4375-6_1"},{"key":"9929_CR64","doi-asserted-by":"crossref","first-page":"107481","DOI":"10.1016\/j.sigpro.2020.107481","volume":"171","author":"IJ Kadhim","year":"2020","unstructured":"Kadhim IJ, Premaratne P, Vial PJ (2020) Improved image steganography based on super-pixel and coefficient-plane-selection. Signal Process 171:107481","journal-title":"Signal Process"},{"key":"9929_CR65","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1016\/j.cogsys.2019.11.002","volume":"60","author":"IJ Kadhim","year":"2020","unstructured":"Kadhim IJ, Premaratne P, Vial PJ (2020) High capacity adaptive image steganography with cover region selection using dual-tree complex wavelet transform. Cogn Syst Res 60:20\u201332","journal-title":"Cogn Syst Res"},{"key":"9929_CR66","doi-asserted-by":"crossref","unstructured":"I J Kadhim, P Premaratne, PJ Vial, and B Halloran (2017). \u201cA comparative analysis among dual tree complex wavelet and other wavelet transforms based on image compression,\u201d in International Conference on Intelligent Computing, pp. 569\u2013580","DOI":"10.1007\/978-3-319-63312-1_50"},{"key":"9929_CR67","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1016\/j.neucom.2018.06.075","volume":"335","author":"IJ Kadhim","year":"2019","unstructured":"Kadhim IJ, Premaratne P, Vial PJ, Halloran B (2019) Comprehensive survey of image steganography: techniques, evaluations, and trends in future research. Neurocomputing 335:299\u2013326","journal-title":"Neurocomputing"},{"key":"9929_CR68","doi-asserted-by":"crossref","unstructured":"M Kalita and T Tuithung (2016). \u201cA novel steganographic method using 8-neighboring PVD (8nPVD) and LSB substitution,\u201d in 2016 International Conference on Systems, Signals and Image Processing (IWSSIP), pp. 1\u20135","DOI":"10.1109\/IWSSIP.2016.7502756"},{"issue":"5","key":"9929_CR69","doi-asserted-by":"crossref","first-page":"155014771985203","DOI":"10.1177\/1550147719852031","volume":"15","author":"Y Kang","year":"2019","unstructured":"Kang Y, Liu F, Yang C, Xiang L, Luo X, Wang P (2019) Color image steganalysis based on channel gradient correlation. Int. J. Distrib. Sens. Networks 15(5):1550147719852031","journal-title":"Int. J. Distrib. Sens. Networks"},{"key":"9929_CR70","volume-title":"Digital Watermarking","author":"S Katzenbeisser","year":"2000","unstructured":"Katzenbeisser S, Petitcolas FAP (2000) Digital Watermarking. Artech House, London"},{"key":"9929_CR71","doi-asserted-by":"crossref","unstructured":"M Kaur and M Juneja (2017). \u201cAdaptive Block Based Steganographic Model with Dynamic Block Estimation with Fuzzy Rules,\u201d in Innovations in Computer Science and Engineering, Springer, pp. 167\u2013176","DOI":"10.1007\/978-981-10-3818-1_19"},{"issue":"1","key":"9929_CR72","first-page":"379","volume":"8","author":"S Khan","year":"2018","unstructured":"Khan S, Bianchi T (2018) Ant colony optimization (aco) based data hiding in image complex region. Int J Electr Comput Eng 8(1):379\u2013389","journal-title":"Int J Electr Comput Eng"},{"issue":"1","key":"9929_CR73","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1016\/j.cose.2010.10.005","volume":"30","author":"H Khan","year":"2011","unstructured":"Khan H, Javed M, Khayam SA, Mirza F (2011) Designing a cluster-based covert channel to evade disk investigation and forensics. Comput Secur 30(1):35\u201349","journal-title":"Comput Secur"},{"issue":"8","key":"9929_CR74","doi-asserted-by":"crossref","first-page":"617","DOI":"10.1080\/01969722.2016.1214459","volume":"47","author":"M Khodaei","year":"2016","unstructured":"Khodaei M, Sadeghi Bigham B, Faez K (2016) Adaptive data hiding, using pixel-value-differencing and LSB substitution. Cybern Syst 47(8):617\u2013628","journal-title":"Cybern Syst"},{"issue":"1\u20132","key":"9929_CR75","doi-asserted-by":"crossref","first-page":"1355","DOI":"10.1007\/s11042-019-08251-3","volume":"79","author":"J Kim","year":"2020","unstructured":"Kim J, Park H, Park J-I (2020) CNN-based image steganalysis using additional data embedding. Multimed Tools Appl 79(1\u20132):1355\u20131372","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"9929_CR76","doi-asserted-by":"crossref","first-page":"165","DOI":"10.7763\/IJET.2016.V8.878","volume":"8","author":"A Kolakalur","year":"2016","unstructured":"Kolakalur A, Kagalidis I, Vuksanovic B, Iacsit M (2016) Wavelet Based Color Video Steganography. Int. J. Eng. Technol 8(3):165","journal-title":"Int. J. Eng. Technol"},{"key":"9929_CR77","doi-asserted-by":"crossref","unstructured":"MZ Konyar, O Akbulut, and S \u00d6zt\u00fcrk (2020). \u201cMatrix encoding-based high-capacity and high-fidelity reversible data hiding in HEVC,\u201d Signal, Image Video Process., pp. 1\u20139","DOI":"10.1007\/s11760-019-01621-2"},{"issue":"12","key":"9929_CR78","doi-asserted-by":"crossref","first-page":"4357","DOI":"10.1007\/s00500-018-3089-x","volume":"23","author":"K Koptyra","year":"2019","unstructured":"Koptyra K, Ogiela MR (2019) Multiply information coding and hiding using fuzzy vault. Soft Comput 23(12):4357\u20134366","journal-title":"Soft Comput"},{"issue":"11","key":"9929_CR79","doi-asserted-by":"crossref","first-page":"13279","DOI":"10.1007\/s11042-017-4947-8","volume":"77","author":"V Kumar","year":"2018","unstructured":"Kumar V, Kumar D (2018) A modified DWT-based image steganography technique. Multimed Tools Appl 77(11):13279\u201313308","journal-title":"Multimed Tools Appl"},{"issue":"18","key":"9929_CR80","doi-asserted-by":"crossref","first-page":"24247","DOI":"10.1007\/s11042-018-5709-y","volume":"77","author":"P Kumar","year":"2018","unstructured":"Kumar P, Singh K (2018) An improved data-hiding approach using skin-tone detection for video steganography. Multimed Tools Appl 77(18):24247\u201324268","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"9929_CR81","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1016\/j.ipl.2015.08.003","volume":"116","author":"W-C Kuo","year":"2016","unstructured":"Kuo W-C, Wang C-C, Hou H-C (2016) Signed digit data hiding scheme. Inf Process Lett 116(2):183\u2013191","journal-title":"Inf Process Lett"},{"issue":"2","key":"9929_CR82","doi-asserted-by":"crossref","first-page":"607","DOI":"10.32604\/cmc.2019.02656","volume":"59","author":"Z Li","year":"2019","unstructured":"Li Z, Meng L, Xu S, Li Z, Shi Y, Liang Y (2019) A HEVC video steganalysis algorithm based on pu partition modes. Comput Mater Contin 59(2):607\u2013624","journal-title":"Comput Mater Contin"},{"issue":"5","key":"9929_CR83","doi-asserted-by":"crossref","first-page":"650","DOI":"10.1109\/LSP.2018.2816569","volume":"25","author":"B Li","year":"2018","unstructured":"Li B, Wei W, Ferreira A, Tan S (2018) ReST-net: diverse activation modules and parallel subnets-based CNN for spatial image steganalysis. IEEE Signal Process Lett 25(5):650\u2013654","journal-title":"IEEE Signal Process Lett"},{"issue":"8","key":"9929_CR84","doi-asserted-by":"crossref","first-page":"10033","DOI":"10.1007\/s11042-017-4946-9","volume":"77","author":"X Liao","year":"2018","unstructured":"Liao X, Guo S, Yin J, Wang H, Li X, Sangaiah AK (2018) New cubic reference table based image steganography. Multimed Tools Appl 77(8):10033\u201310050","journal-title":"Multimed Tools Appl"},{"key":"9929_CR85","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1016\/j.neucom.2015.02.102","volume":"188","author":"Y Liu","year":"2016","unstructured":"Liu Y, Ju L, Hu M, Zhao H, Jia S, Jia Z (2016) A new data hiding method for H.264 based on secret sharing. Neurocomputing 188:113\u2013119","journal-title":"Neurocomputing"},{"issue":"1","key":"9929_CR86","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1186\/s13640-019-0458-z","volume":"2019","author":"H-H Liu","year":"2019","unstructured":"Liu H-H, Lee C-M (2019) High-capacity reversible image steganography based on pixel value ordering. EURASIP J. Image Video Process 2019(1):54","journal-title":"EURASIP J. Image Video Process"},{"issue":"1","key":"9929_CR87","doi-asserted-by":"crossref","first-page":"12068","DOI":"10.1088\/1757-899X\/719\/1\/012068","volume":"719","author":"P Liu","year":"2020","unstructured":"Liu P, Li S (2020) Steganalysis of Intra Prediction Mode and Motion Vector-based Steganography by Noise Residual Convolutional Neural Network. IOP Conference Series: Materials Science and Engineering 719(1):12068","journal-title":"IOP Conference Series: Materials Science and Engineering"},{"key":"9929_CR88","doi-asserted-by":"crossref","unstructured":"Liu Y, Liu S, Zhao H, Liu S (2018) A new data hiding method for H. 265\/HEVC video streams without intra-frame distortion drift. Multimed Tools Appl:1\u201328","DOI":"10.1007\/s11042-018-6320-y"},{"key":"9929_CR89","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/j.jvcir.2016.05.008","volume":"39","author":"Y Liu","year":"2016","unstructured":"Liu Y, Qu X, Xin G (2016) A ROI-based reversible data hiding scheme in encrypted medical images. J Vis Commun Image Represent 39:51\u201357","journal-title":"J Vis Commun Image Represent"},{"key":"9929_CR90","doi-asserted-by":"crossref","unstructured":"W Lu, R Li, L Zeng, J Chen, J Huang, and Y-Q Shi (2019). \u201cBinary image steganalysis based on histogram of structuring elements,\u201d IEEE Trans. Circuits Syst. Video Technol","DOI":"10.1109\/TCSVT.2019.2936028"},{"issue":"5","key":"9929_CR91","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1109\/MCOM.2014.6815916","volume":"52","author":"J Lubacz","year":"2014","unstructured":"Lubacz J, Mazurczyk W, Szczypiorski K (2014) Principles and overview of network steganography. IEEE Commun Mag 52(5):225\u2013229","journal-title":"IEEE Commun Mag"},{"issue":"15","key":"9929_CR92","doi-asserted-by":"crossref","first-page":"19027","DOI":"10.1007\/s11042-017-5356-8","volume":"77","author":"T Luo","year":"2018","unstructured":"Luo T, Jiang G, Yu M, Xu H, Gao W (2018) Sparse recovery based reversible data hiding method using the human visual system. Multimed Tools Appl 77(15):19027\u201319050","journal-title":"Multimed Tools Appl"},{"key":"9929_CR93","unstructured":"G Manikandan, R Bala Krishnan, N Rajesh Kumar, N Sairam, and NR Raajan (2017). \u201cA steganographic approach for realizing medical data privacy in a distributed environment,\u201d Biomed. Res., vol. 28, no. 3"},{"issue":"2","key":"9929_CR94","doi-asserted-by":"crossref","first-page":"529","DOI":"10.1007\/s11045-018-0568-2","volume":"30","author":"S Manisha","year":"2019","unstructured":"Manisha S, Sharmila TS (2019) A two-level secure data hiding algorithm for video steganography. Multidim Syst Sign Process 30(2):529\u2013542","journal-title":"Multidim Syst Sign Process"},{"key":"9929_CR95","doi-asserted-by":"crossref","unstructured":"W Mazurczyk, M Karas, and K Szczypiorski (2013). \u201cSkyDe: a Skype-based steganographic method,\u201d arXiv Prepr. arXiv1301.3632","DOI":"10.15837\/ijccc.2013.3.469"},{"issue":"1","key":"9929_CR96","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1145\/3158416","volume":"61","author":"W Mazurczyk","year":"2017","unstructured":"Mazurczyk W, Wendzel S (2017) Information hiding: challenges for forensic experts. Commun ACM 61(1):86\u201394","journal-title":"Commun ACM"},{"issue":"12","key":"9929_CR97","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1145\/1035134.1035155","volume":"47","author":"RT Mercuri","year":"2004","unstructured":"Mercuri RT (2004) The many colors of multimedia security. Commun ACM 47(12):25\u201329","journal-title":"Commun ACM"},{"key":"9929_CR98","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1016\/j.ijleo.2017.07.043","volume":"145","author":"A Miri","year":"2017","unstructured":"Miri A, Faez K (2017) Adaptive image steganography based on transform domain via genetic algorithm. Optik (Stuttg) 145:158\u2013168","journal-title":"Optik (Stuttg)"},{"issue":"11","key":"9929_CR99","doi-asserted-by":"crossref","first-page":"13133","DOI":"10.1007\/s11042-017-4935-z","volume":"77","author":"A Miri","year":"2018","unstructured":"Miri A, Faez K (2018) An image steganography method based on integer wavelet transform. Multimed Tools Appl 77(11):13133\u201313144","journal-title":"Multimed Tools Appl"},{"issue":"6","key":"9929_CR100","doi-asserted-by":"crossref","first-page":"714","DOI":"10.1007\/s10278-014-9700-5","volume":"27","author":"SM Mousavi","year":"2014","unstructured":"Mousavi SM, Naghsh A, Abu-Bakar SAR (2014) Watermarking techniques used in medical images: a survey. J Digit Imaging 27(6):714\u2013729","journal-title":"J Digit Imaging"},{"issue":"17","key":"9929_CR101","doi-asserted-by":"crossref","first-page":"10311","DOI":"10.1007\/s11042-015-3060-0","volume":"75","author":"RJ Mstafa","year":"2016","unstructured":"Mstafa RJ, Elleithy KM (2016) A video steganography algorithm based on Kanade-Lucas-Tomasi tracking algorithm and error correcting codes. Multimed Tools Appl 75(17):10311\u201310333","journal-title":"Multimed Tools Appl"},{"key":"9929_CR102","doi-asserted-by":"crossref","unstructured":"RJ Mstafa and KM Elleithy (2016). \u201cA DCT-based robust video steganographic method using BCH error correcting codes,\u201d in 2016 IEEE Long Island Systems, Applications and Technology Conference (LISAT), pp. 1\u20136","DOI":"10.1109\/LISAT.2016.7494111"},{"key":"9929_CR103","first-page":"5354","volume":"5","author":"RJ Mstafa","year":"2017","unstructured":"Mstafa RJ, Elleithy KM, Abdelfattah E (2017) A robust and secure video steganography method in DWT-DCT domains based on multiple object tracking and ECC. IEEE Access 5:5354\u20135365","journal-title":"IEEE Access"},{"key":"9929_CR104","unstructured":"RJ Mstafa and KM Ellleithy (2016). \u201cAn Efficient Video Steganography Algorithm Based on BCH Codes,\u201d ASEE, no. May 2015"},{"issue":"6","key":"9929_CR105","doi-asserted-by":"crossref","first-page":"8597","DOI":"10.1007\/s11042-016-3383-5","volume":"76","author":"K Muhammad","year":"2017","unstructured":"Muhammad K, Ahmad J, Rehman NU, Jan Z, Sajjad M (2017) CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method. Multimed Tools Appl 76(6):8597\u20138626","journal-title":"Multimed Tools Appl"},{"issue":"18","key":"9929_CR106","doi-asserted-by":"crossref","first-page":"18985","DOI":"10.1007\/s11042-017-4420-8","volume":"76","author":"K Muhammad","year":"2017","unstructured":"Muhammad K, Ahmad J, Rho S, Baik SW (2017) Image steganography for authenticity of visual contents in social networks. Multimed Tools Appl 76(18):18985\u201319004","journal-title":"Multimed Tools Appl"},{"issue":"5","key":"9929_CR107","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1007\/s10916-016-0473-x","volume":"40","author":"K Muhammad","year":"2016","unstructured":"Muhammad K, Sajjad M, Baik SW (2016) Dual-level security based cyclic18 steganographic method and its application for secure transmission of keyframes during wireless capsule endoscopy. J. Med. Syst. 40(5):114","journal-title":"J. Med. Syst."},{"issue":"22","key":"9929_CR108","doi-asserted-by":"crossref","first-page":"14867","DOI":"10.1007\/s11042-015-2671-9","volume":"75","author":"K Muhammad","year":"2016","unstructured":"Muhammad K, Sajjad M, Mehmood I, Rho S, Baik SW (2016) A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image. Multimed Tools Appl 75(22):14867\u201314893","journal-title":"Multimed Tools Appl"},{"key":"9929_CR109","doi-asserted-by":"crossref","first-page":"912","DOI":"10.1016\/j.procs.2016.03.114","volume":"79","author":"S Mungmode","year":"2016","unstructured":"Mungmode S, Sedamkar RR, Kulkarni N (2016) A modified high frequency adaptive security approach using steganography for region selection based on threshold value. Procedia Comput Sci 79:912\u2013921","journal-title":"Procedia Comput Sci"},{"key":"9929_CR110","doi-asserted-by":"crossref","first-page":"S76","DOI":"10.1016\/j.diin.2016.04.010","volume":"18","author":"S Neuner","year":"2016","unstructured":"Neuner S, Voyiatzis AG, Schmiedecker M, Brunthaler S, Katzenbeisser S, Weippl ER (2016) Time is on my side: steganography in filesystem metadata. Digit Investig 18:S76\u2013S86","journal-title":"Digit Investig"},{"key":"9929_CR111","first-page":"59","volume":"55","author":"Q Nie","year":"2018","unstructured":"Nie Q, Weng J, Xu X, Feng B (2018) Defining embedding distortion for intra prediction mode-based video steganography. Comput Mater Contin 55:59\u201370","journal-title":"Comput Mater Contin"},{"key":"9929_CR112","doi-asserted-by":"crossref","unstructured":"H Nyeem (2017). \u201cReversible data hiding with image bit-plane slicing,\u201d in 2017 20th International Conference of Computer and Information Technology (ICCIT), pp. 1\u20136","DOI":"10.1109\/ICCITECHN.2017.8281763"},{"key":"9929_CR113","doi-asserted-by":"crossref","unstructured":"F Pan, L Xiang, X Yang, and Y Guo (2010). \u201cVideo steganography using motion vector and linear block codes,\u201d 2010 IEEE Int. Conf. Softw. Eng. Serv. Sci., no. 60842006, pp. 592\u2013595","DOI":"10.1109\/ICSESS.2010.5552283"},{"key":"9929_CR114","doi-asserted-by":"crossref","unstructured":"HN Patel, DR Khant, and D Prajapati (2017). \u201cDesign of a color palette based image steganography algorithm for fractal images,\u201d in 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), pp. 2584\u20132589","DOI":"10.1109\/WiSPNET.2017.8300230"},{"issue":"1","key":"9929_CR115","first-page":"41","volume":"5","author":"A Patel","year":"2007","unstructured":"Patel A, Shah M, Chandramouli R, Subbalakshmi KP (2007) Covert channel forensics on the internet: issues, approaches, and experiences. IJ Netw Secur 5(1):41\u201350","journal-title":"IJ Netw Secur"},{"key":"9929_CR116","doi-asserted-by":"crossref","unstructured":"Perumal K, Muthusamy S, Gengavel G (2018) Sparse data encoder and decoder to improve security in video steganography. Concurr Comput Pract Exp:1\u20137","DOI":"10.1002\/cpe.4971"},{"issue":"2","key":"9929_CR117","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1109\/TIFS.2010.2045842","volume":"5","author":"T Pevny","year":"2010","unstructured":"Pevny T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Trans Inf Forensics Secur 5(2):215\u2013224","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"9929_CR118","doi-asserted-by":"crossref","unstructured":"T Pevny, T Filler, and P Bas (2010). \u201cUsing high-dimensional image models to perform highly undetectable steganography,\u201d in International Workshop on Information Hiding, pp. 161\u2013177","DOI":"10.1007\/978-3-642-16435-4_13"},{"key":"9929_CR119","doi-asserted-by":"crossref","unstructured":"B Pfitzmann (1996). \u201cInformation hiding terminology-results of an informal plenary meeting and additional proposals,\u201d in Proceedings of the First International Workshop on Information Hiding, pp. 347\u2013350","DOI":"10.1007\/3-540-61996-8_52"},{"issue":"3","key":"9929_CR120","doi-asserted-by":"crossref","first-page":"312","DOI":"10.1109\/TBC.2004.834028","volume":"50","author":"MH Pinson","year":"2004","unstructured":"Pinson MH, Wolf S (2004) A new standardized method for objectively measuring video quality. IEEE Trans Broadcast 50(3):312\u2013322","journal-title":"IEEE Trans Broadcast"},{"key":"9929_CR121","doi-asserted-by":"crossref","unstructured":"V Pomponiu, D Cavagnino, and M Botta (2018). \u201cData Hiding in the Wild: Where Computational Intelligence Meets Digital Forensics,\u201d in Surveillance in Action, Springer, pp. 301\u2013331","DOI":"10.1007\/978-3-319-68533-5_15"},{"key":"9929_CR122","doi-asserted-by":"crossref","unstructured":"Y Qian, J Dong, W Wang, and T Tan (2016). \u201cLearning and transferring representations for image steganalysis using convolutional neural network,\u201d in 2016 IEEE international conference on image processing (ICIP), pp. 2752\u20132756","DOI":"10.1109\/ICIP.2016.7532860"},{"key":"9929_CR123","doi-asserted-by":"crossref","first-page":"35684","DOI":"10.1109\/ACCESS.2019.2894295","volume":"7","author":"Z Qu","year":"2019","unstructured":"Qu Z, Cheng Z, Wang X (2019) Matrix coding-based quantum image steganography algorithm. IEEE Access 7:35684\u201335698","journal-title":"IEEE Access"},{"key":"9929_CR124","doi-asserted-by":"crossref","first-page":"21948","DOI":"10.1109\/ACCESS.2019.2898838","volume":"7","author":"T Rabie","year":"2019","unstructured":"Rabie T, Baziyad M (2019) The Pixogram: addressing high payload demands for video steganography. IEEE Access 7:21948\u201321962","journal-title":"IEEE Access"},{"issue":"5","key":"9929_CR125","doi-asserted-by":"crossref","first-page":"6473","DOI":"10.1007\/s11042-016-3301-x","volume":"76","author":"T Rabie","year":"2017","unstructured":"Rabie T, Kamel I (2017) High-capacity steganography: a global-adaptive-region discrete cosine transform approach. Multimed Tools Appl 76(5):6473\u20136493","journal-title":"Multimed Tools Appl"},{"key":"9929_CR126","unstructured":"R Rahim, S Nadeem, and others (2018). \u201cEnd-to-End Trained CNN Encoder-Decoder Networks for Image Steganography,\u201d in Proceedings of the European Conference on Computer Vision (ECCV), p. 0"},{"issue":"11","key":"9929_CR127","doi-asserted-by":"crossref","first-page":"13225","DOI":"10.1007\/s11042-017-4942-0","volume":"77","author":"K Rajalakshmi","year":"2018","unstructured":"Rajalakshmi K, Mahesh K (2018) ZLBM: zero level binary mapping technique for video security. Multimed Tools Appl 77(11):13225\u201313247","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"9929_CR128","first-page":"593","volume":"19","author":"S Rajendran","year":"2017","unstructured":"Rajendran S, Doraipandian M (2017) Chaotic map based random image steganography using LSB technique. IJ Netw Secur 19(4):593\u2013598","journal-title":"IJ Netw Secur"},{"key":"9929_CR129","doi-asserted-by":"crossref","first-page":"744","DOI":"10.1016\/j.asoc.2015.05.040","volume":"34","author":"M Ramalingam","year":"2015","unstructured":"Ramalingam M, Ashidi N, Isa M (2015) Fast retrieval of hidden data using enhanced hidden Markov model in video steganography. Appl Soft Comput J 34:744\u2013757","journal-title":"Appl Soft Comput J"},{"key":"9929_CR130","doi-asserted-by":"crossref","first-page":"423","DOI":"10.1016\/j.compeleceng.2015.10.005","volume":"54","author":"M Ramalingam","year":"2016","unstructured":"Ramalingam M, Isa NAM (2016) A data-hiding technique using scene-change detection for video steganography. Comput Electr Eng 54:423\u2013434","journal-title":"Comput Electr Eng"},{"key":"9929_CR131","doi-asserted-by":"crossref","unstructured":"Y Ren, L Zhai, L Wang, and T Zhu (2014). \u201cVideo steganalysis based on subtractive probability of optimal matching feature,\u201d in Proceedings of the 2nd ACM workshop on Information hiding and multimedia security, pp. 83\u201390","DOI":"10.1145\/2600918.2600938"},{"key":"9929_CR132","doi-asserted-by":"crossref","unstructured":"K Rezagholipour and M Eshghi (2016). \u201cVideo Steganography Algorithm based on motion vector of moving object,\u201d in Information and Knowledge Technology (IKT), 2016 Eighth International Conference on, pp. 183\u2013187","DOI":"10.1109\/IKT.2016.7777764"},{"key":"9929_CR133","doi-asserted-by":"crossref","unstructured":"IE Richardson (2004). H. 264 and MPEG-4 video compression: video coding for next-generation multimedia. Wiley","DOI":"10.1002\/0470869615"},{"issue":"4","key":"9929_CR134","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1145\/1978802.1978805","volume":"43","author":"A Rocha","year":"2011","unstructured":"Rocha A, Scheirer W, Boult T, Goldenstein S (2011) Vision of the unseen: Current trends and challenges in digital image and video forensics. ACM Comput. Surv 43(4):26","journal-title":"ACM Comput. Surv"},{"issue":"4","key":"9929_CR135","doi-asserted-by":"crossref","first-page":"244","DOI":"10.3390\/e20040244","volume":"20","author":"ES Sadat","year":"2018","unstructured":"Sadat ES, Faez K, Saffari Pour M (2018) Entropy-based video Steganalysis of motion vectors. Entropy 20(4):244\u2013257","journal-title":"Entropy"},{"issue":"2","key":"9929_CR136","doi-asserted-by":"crossref","first-page":"3065","DOI":"10.1007\/s11042-015-3170-8","volume":"76","author":"MM Sadek","year":"2017","unstructured":"Sadek MM, Khalifa AS, Mostafa MGM (2017) Robust video steganography algorithm using adaptive skin-tone detection. Multimed Tools Appl 76(2):3065\u20133085","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"9929_CR137","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11220-019-0262-y","volume":"21","author":"AK Sahu","year":"2020","unstructured":"Sahu AK, Swain G (2020) Reversible image steganography using dual-layer LSB matching. Sens. Imaging 21(1):1","journal-title":"Sens. Imaging"},{"issue":"11","key":"9929_CR138","doi-asserted-by":"crossref","first-page":"13493","DOI":"10.1007\/s11042-016-3722-6","volume":"76","author":"M Saidi","year":"2017","unstructured":"Saidi M, Hermassi H, Rhouma R, Belghith S (2017) A new adaptive image steganography scheme based on DCT and chaotic map. Multimed Tools Appl 76(11):13493\u201313510","journal-title":"Multimed Tools Appl"},{"key":"9929_CR139","doi-asserted-by":"crossref","unstructured":"S Sajasi and AME Moghadam (2013). \u201cA high quality image steganography scheme based on fuzzy inference system,\u201d in 2013 13th Iranian Conference on Fuzzy Systems (IFSC), pp. 1\u20136","DOI":"10.1109\/IFSC.2013.6675666"},{"key":"9929_CR140","doi-asserted-by":"crossref","unstructured":"N Sathisha, R Priya, KS Babu, KB Raja, KR Venugopal, and LM Patnaik (2013). \u201cDTCWT based high capacity steganography using coefficient replacement and adaptive scaling,\u201d in Sixth International Conference on Machine Vision (ICMV 2013), vol. 9067, p. 90671O","DOI":"10.1117\/12.2051889"},{"key":"9929_CR141","doi-asserted-by":"crossref","unstructured":"G Savithri, S Mane, JS Banu, and others (2017). \u201cParallel Implementation of RSA 2D-DCT Steganography and Chaotic 2D-DCT Steganography,\u201d in Proceedings of International Conference on Computer Vision and Image Processing, pp. 593\u2013605","DOI":"10.1007\/978-981-10-2104-6_53"},{"issue":"5","key":"9929_CR142","doi-asserted-by":"crossref","first-page":"1555","DOI":"10.1007\/s00500-017-2944-5","volume":"22","author":"I Shafi","year":"2018","unstructured":"Shafi I, Noman M, Gohar M, Ahmad A, Khan M, Din S, Ahmad SH, Ahmad J (2018) An adaptive hybrid fuzzy-wavelet approach for image steganography using bit reduction and pixel adjustment. Soft Comput 22(5):1555\u20131567","journal-title":"Soft Comput"},{"key":"9929_CR143","doi-asserted-by":"crossref","unstructured":"PD Shah and RS Bichkar (2018). \u201cA secure spatial domain image steganography using genetic algorithm and linear congruential generator,\u201d in International Conference on Intelligent Computing and Applications, pp. 119\u2013129","DOI":"10.1007\/978-981-10-5520-1_12"},{"issue":"4","key":"9929_CR144","first-page":"433","volume":"28","author":"Q Sheng","year":"2017","unstructured":"Sheng Q, Wang RD, Huang ML, Li Q, Xu DW (2017) A prediction mode steganalysis detection algorithm for hevc. J Opt 28(4):433\u2013440","journal-title":"J Opt"},{"key":"9929_CR145","doi-asserted-by":"crossref","unstructured":"D Singla and M Juneja (2014). \u201cAn analysis of edge based image steganography techniques in spatial domain,\u201d in 2014 Recent Advances in Engineering and Computational Sciences (RAECS), pp. 1\u20135","DOI":"10.1109\/RAECS.2014.6799604"},{"issue":"2","key":"9929_CR146","first-page":"237","volume":"6","author":"D Singla","year":"2014","unstructured":"Singla D, Juneja M (2014) New information hiding technique using features of image. J Emerg Technol Web Intell 6(2):237\u2013242","journal-title":"J Emerg Technol Web Intell"},{"key":"9929_CR147","doi-asserted-by":"crossref","unstructured":"X Song, Z Li, L Chen, and J Liu (2016). \u201cEntropy feature based on 2D Gabor wavelets for JPEG steganalysis,\u201d in International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, pp. 59\u201372","DOI":"10.1007\/978-3-319-49145-5_7"},{"key":"9929_CR148","doi-asserted-by":"crossref","unstructured":"X Song, F Liu, C Yang, X Luo, and Y Zhang (2015). \u201cSteganalysis of adaptive JPEG steganography using 2D Gabor filters,\u201d in Proceedings of the 3rd ACM workshop on information hiding and multimedia security, pp. 15\u201323","DOI":"10.1145\/2756601.2756608"},{"key":"9929_CR149","unstructured":"C Stier (2010). \u201cRussian spy ring hid secret messages on the web,\u201d. [Online]. Available: https:\/\/www.newscientist.com\/article\/dn19126-russian-spy-ring-hid-secret-messages-on-the-web\/. [Accessed: 11-Jan-2017]"},{"key":"9929_CR150","unstructured":"T St\u00fctz, F Autrusseau, and A Uhl (2013). \u201cInter-frame H. 264\/CAVLC structure-preserving substitution watermarking"},{"issue":"1","key":"9929_CR151","first-page":"360","volume":"11","author":"Y Su","year":"2017","unstructured":"Su Y, Yu F, Zhang C (2017) Digital video Steganalysis based on a spatial temporal detector. TIIS 11(1):360\u2013373","journal-title":"TIIS"},{"key":"9929_CR152","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1016\/j.cosrev.2014.09.001","volume":"13","author":"MS Subhedar","year":"2014","unstructured":"Subhedar MS, Mankar VH (2014) Current status and key issues in image steganography: a survey. Comput Sci Rev 13:95\u2013113","journal-title":"Comput Sci Rev"},{"key":"9929_CR153","doi-asserted-by":"crossref","first-page":"406","DOI":"10.1016\/j.compeleceng.2016.04.017","volume":"54","author":"MS Subhedar","year":"2016","unstructured":"Subhedar MS, Mankar VH (2016) Image steganography using redundant discrete wavelet transform and QR factorization. Comput Electr Eng 54:406\u2013422","journal-title":"Comput Electr Eng"},{"issue":"7","key":"9929_CR154","doi-asserted-by":"crossref","first-page":"8115","DOI":"10.1007\/s11042-017-4706-x","volume":"77","author":"MS Subhedar","year":"2018","unstructured":"Subhedar MS, Mankar VH (2018) Curvelet transform and cover selection for secure steganography. Multimed Tools Appl 77(7):8115\u20138138","journal-title":"Multimed Tools Appl"},{"key":"9929_CR155","doi-asserted-by":"crossref","first-page":"483","DOI":"10.1016\/j.procs.2016.02.092","volume":"78","author":"KB Sudeepa","year":"2016","unstructured":"Sudeepa KB, Raju K, HS RK, Aithal G (2016) A new approach for video steganography based on randomization and parallelization. Procedia Comput Sci 78:483\u2013490","journal-title":"Procedia Comput Sci"},{"issue":"2\u20132","key":"9929_CR156","first-page":"23","volume":"9","author":"A Suttichaiya","year":"2017","unstructured":"Suttichaiya A, Sombatkiripaiboon Y, Imtongkhua P, Poonriboon C, So-In C, Horkaew P (2017) Video steganography with LSB color detection. J Telecommun Electron Comput Eng 9(2\u20132):23\u201328","journal-title":"J Telecommun Electron Comput Eng"},{"key":"9929_CR157","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1016\/j.procs.2016.05.174","volume":"85","author":"G Swain","year":"2016","unstructured":"Swain G (2016) A steganographic method combining LSB substitution and PVD in a block. Procedia Comput Sci 85:39\u201344","journal-title":"Procedia Comput Sci"},{"issue":"15","key":"9929_CR158","doi-asserted-by":"crossref","first-page":"3972","DOI":"10.1016\/j.ijleo.2014.01.149","volume":"125","author":"M Tang","year":"2014","unstructured":"Tang M, Hu J, Song W (2014) A high capacity image steganography using multi-layer embedding. Optik (Stuttg) 125(15):3972\u20133976","journal-title":"Optik (Stuttg)"},{"issue":"8","key":"9929_CR159","doi-asserted-by":"crossref","first-page":"2074","DOI":"10.1109\/TIFS.2019.2891237","volume":"14","author":"W Tang","year":"2019","unstructured":"Tang W, Li B, Tan S, Barni M, Huang J (2019) CNN-based adversarial embedding for image steganography. IEEE Trans Inf Forensics Secur 14(8):2074\u20132087","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"10","key":"9929_CR160","doi-asserted-by":"crossref","first-page":"1547","DOI":"10.1109\/LSP.2017.2745572","volume":"24","author":"W Tang","year":"2017","unstructured":"Tang W, Tan S, Li B, Huang J (2017) Automatic steganographic distortion learning using a generative adversarial network. IEEE Signal Process Lett 24(10):1547\u20131551","journal-title":"IEEE Signal Process Lett"},{"key":"9929_CR161","doi-asserted-by":"crossref","first-page":"12077","DOI":"10.1088\/1757-899X\/225\/1\/012077","volume":"225","author":"R Tanwar","year":"2017","unstructured":"Tanwar R, Malhotrab S (2017) Scope of Support Vector Machine in Steganography. IOP Conf. Series: Materials and Engineering 225:12077","journal-title":"IOP Conf. Series: Materials and Engineering"},{"issue":"7","key":"9929_CR162","doi-asserted-by":"crossref","first-page":"3316","DOI":"10.1109\/TIP.2016.2567073","volume":"25","author":"K Tasdemir","year":"2016","unstructured":"Tasdemir K, Kurugollu F, Sezer S (2016) Spatio-temporal rich model-based video Steganalysis on cross sections of motion vector Planes. IEEE Trans Image Process 25(7):3316\u20133328","journal-title":"IEEE Trans Image Process"},{"issue":"2","key":"9929_CR163","doi-asserted-by":"crossref","first-page":"1058","DOI":"10.1109\/TLA.2016.7437258","volume":"14","author":"R Tavares","year":"2016","unstructured":"Tavares R, Madeiro F (2016) Word-hunt: a LSB steganography method with low expected number of modifications per pixel. IEEE Lat Am Trans 14(2):1058\u20131064","journal-title":"IEEE Lat Am Trans"},{"issue":"2","key":"9929_CR164","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1145\/2812802","volume":"59","author":"B Thomee","year":"2016","unstructured":"Thomee B, Shamma DA, Friedland G, Elizalde B, Ni K, Poland D, Borth D, Li L-J (2016) YFCC100M: the new data in multimedia research. Commun ACM 59(2):64\u201373","journal-title":"Commun ACM"},{"key":"9929_CR165","doi-asserted-by":"crossref","unstructured":"MRN Torkaman, P Nikfard, NS Kazazi, MR Abbasy, and SF Tabatabaiee (2011). \u201cImproving hybrid cryptosystems with DNA steganography,\u201d in International Conference on Digital Enterprise and Information Systems, pp. 42\u201352","DOI":"10.1007\/978-3-642-22603-8_4"},{"issue":"7","key":"9929_CR166","doi-asserted-by":"crossref","first-page":"121","DOI":"10.2352\/ISSN.2470-1173.2018.07.MWSF-121","volume":"2018","author":"CF Tsang","year":"2018","unstructured":"Tsang CF, Fridrich J (2018) Steganalyzing images of arbitrary size with CNNs. Electron. Imaging 2018(7):121","journal-title":"Electron. Imaging"},{"key":"9929_CR167","unstructured":"R Umadevi (2016). \u201cJoint approach for secure communication using video steganography: Achieving better communication based on video steganography,\u201d in 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), pp. 3104\u20133106"},{"key":"9929_CR168","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1016\/j.patrec.2017.08.016","volume":"105","author":"ST Veena","year":"2018","unstructured":"Veena ST, Arivazhagan S (2018) Quantitative steganalysis of spatial LSB based stego images using reduced instances and features. Pattern Recogn Lett 105:39\u201349","journal-title":"Pattern Recogn Lett"},{"key":"9929_CR169","doi-asserted-by":"crossref","unstructured":"D Volkhonskiy, I Nazarov, and E Burnaev (2020). \u201cSteganographic generative adversarial networks,\u201d in Twelfth International Conference on Machine Vision (ICMV 2019), vol. 11433, p. 114333M","DOI":"10.1117\/12.2559429"},{"issue":"4","key":"9929_CR170","doi-asserted-by":"crossref","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600\u2013612","journal-title":"IEEE Trans Image Process"},{"key":"9929_CR171","first-page":"1","volume":"2017","author":"P Wang","year":"2017","unstructured":"Wang P, Cao Y, Zhao X (2017) Segmentation based video Steganalysis to detect motion vector modification. Secur Commun Networks 2017:1\u201312","journal-title":"Secur Commun Networks"},{"key":"9929_CR172","doi-asserted-by":"crossref","unstructured":"Y Wang, Y Cao, X Zhao, Z Xu, and M Zhu (2018). \u201cMaintaining Rate-Distortion Optimization for IPM-Based Video Steganography by Constructing Isolated Channels in HEVC,\u201d in Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, pp. 97\u2013107","DOI":"10.1145\/3206004.3206020"},{"key":"9929_CR173","doi-asserted-by":"crossref","unstructured":"Z Wang, X Zhao, H Wang, and G Cui (2013). \u201cInformation hiding based on DNA steganography,\u201d in 2013 IEEE 4th International Conference on Software Engineering and Service Science, pp. 946\u2013949","DOI":"10.1109\/ICSESS.2013.6615462"},{"issue":"2","key":"9929_CR174","first-page":"17","volume":"3","author":"M Warkentin","year":"2008","unstructured":"Warkentin M, Bekkering E, Schmidt MB (2008) Steganography: Forensic, Security, and Legal Issues. J. Digit. Forensics, Secur. Law JDFSL 3(2):17","journal-title":"J. Digit. Forensics, Secur. Law JDFSL"},{"key":"9929_CR175","doi-asserted-by":"crossref","unstructured":"C-Y Weng, C-T Huang, and H-W Kao (2017). \u201cDCT-based compressed image with reversibility using modified quantization,\u201d in International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 214\u2013221","DOI":"10.1007\/978-3-319-63856-0_27"},{"key":"9929_CR176","doi-asserted-by":"crossref","unstructured":"E Wengrowski and K Dana (2019). \u201cLight Field Messaging With Deep Photographic Steganography,\u201d in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1515\u20131524","DOI":"10.1109\/CVPR.2019.00161"},{"key":"9929_CR177","doi-asserted-by":"crossref","unstructured":"C Whitelam, N Osia, and T Bourlai (2013). \u201cSecuring multimodal biometric data through watermarking and steganography,\u201d in 2013 IEEE International Conference on Technologies for Homeland Security (HST), pp. 61\u201366","DOI":"10.1109\/THS.2013.6698977"},{"issue":"7","key":"9929_CR178","doi-asserted-by":"crossref","first-page":"560","DOI":"10.1109\/TCSVT.2003.815165","volume":"13","author":"T Wiegand","year":"2003","unstructured":"Wiegand T, Sullivan GJ, Bjontegaard G, Luthra A (2003) Overview of the H. 264\/AVC video coding standard. IEEE Trans circuits Syst video Technol 13(7):560\u2013576","journal-title":"IEEE Trans circuits Syst video Technol"},{"key":"9929_CR179","doi-asserted-by":"crossref","unstructured":"C. Xu, X. Ping, and T. Zhang, \u201cSteganography in compressed video stream,\u201d in Innovative Computing, Information and Control, 2006. ICICIC\u201906. First international conference on, 2006, vol. 1, pp. 269\u2013272.","DOI":"10.1109\/ICICIC.2006.158"},{"key":"9929_CR180","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1016\/j.jvcir.2016.02.002","volume":"36","author":"D Xu","year":"2016","unstructured":"Xu D, Wang R, Shi YQ (2016) An improved scheme for data hiding in encrypted H.264\/AVC videos. J Vis Commun Image Represent 36:229\u2013242","journal-title":"J Vis Commun Image Represent"},{"issue":"5","key":"9929_CR181","doi-asserted-by":"crossref","first-page":"708","DOI":"10.1109\/LSP.2016.2548421","volume":"23","author":"G Xu","year":"2016","unstructured":"Xu G, Wu H-Z, Shi Y-Q (2016) Structural design of convolutional neural networks for steganalysis. IEEE Signal Process Lett 23(5):708\u2013712","journal-title":"IEEE Signal Process Lett"},{"key":"9929_CR182","doi-asserted-by":"crossref","unstructured":"G Xu, H-Z Wu, and YQ Shi (2016). \u201cEnsemble of CNNs for steganalysis: An empirical study,\u201d in Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, pp. 103\u2013107","DOI":"10.1145\/2909827.2930798"},{"issue":"3","key":"9929_CR183","doi-asserted-by":"crossref","first-page":"601","DOI":"10.1007\/s11554-018-0822-8","volume":"16","author":"Y Xue","year":"2019","unstructured":"Xue Y, Liu W, Lu W, Yeung Y, Liu X, Liu H (2019) Efficient halftone image steganography based on dispersion degree optimization. J Real-Time Image Process 16(3):601\u2013609","journal-title":"J Real-Time Image Process"},{"key":"9929_CR184","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1016\/j.image.2019.04.012","volume":"76","author":"Y Xue","year":"2019","unstructured":"Xue Y, Zhou J, Zeng H, Zhong P, Wen J (2019) An adaptive steganographic scheme for H. 264\/AVC video with distortion optimization. Signal Process Image Commun 76:22\u201330","journal-title":"Signal Process Image Commun"},{"issue":"7","key":"9929_CR185","doi-asserted-by":"crossref","first-page":"1070","DOI":"10.1016\/j.jss.2006.11.022","volume":"80","author":"C-N Yang","year":"2007","unstructured":"Yang C-N, Chen T-S, Yu KH, Wang C-C (2007) Improvements of image sharing with steganography and authentication. J Syst Softw 80(7):1070\u20131076","journal-title":"J Syst Softw"},{"issue":"5","key":"9929_CR186","doi-asserted-by":"crossref","first-page":"155014772091782","DOI":"10.1177\/1550147720917826","volume":"16","author":"C Yang","year":"2020","unstructured":"Yang C, Kang Y, Liu F, Song X, Wang J, Luo X (2020) Color image steganalysis based on embedding change probabilities in differential channels. Int. J. Distrib. Sens. Networks 16(5):1550147720917826","journal-title":"Int. J. Distrib. Sens. Networks"},{"issue":"11","key":"9929_CR187","doi-asserted-by":"crossref","first-page":"119103","DOI":"10.1007\/s11432-017-9328-2","volume":"61","author":"C Yang","year":"2018","unstructured":"Yang C, Luo X, Lu J, Liu F (2018) Extracting hidden messages of MLSB steganography based on optimal stego subset. Sci. China Inf. Sci 61(11):119103","journal-title":"Sci. China Inf. Sci"},{"key":"9929_CR188","doi-asserted-by":"crossref","first-page":"531","DOI":"10.1016\/j.sigpro.2016.05.004","volume":"128","author":"Y Yao","year":"2016","unstructured":"Yao Y, Zhang W, Yu N (2016) Inter-frame distortion drift analysis for reversible data hiding in encrypted H.264\/AVC video bitstreams. Signal Process 128:531\u2013545","journal-title":"Signal Process"},{"issue":"24","key":"9929_CR189","doi-asserted-by":"crossref","first-page":"11163","DOI":"10.1007\/s11042-014-2223-8","volume":"74","author":"Y Yao","year":"2015","unstructured":"Yao Y, Zhang W, Yu N, Zhao X (2015) Defining embedding distortion for motion vector-based video steganography. Multimed Tools Appl 74(24):11163\u201311186","journal-title":"Multimed Tools Appl"},{"issue":"11","key":"9929_CR190","doi-asserted-by":"crossref","first-page":"2545","DOI":"10.1109\/TIFS.2017.2710946","volume":"12","author":"J Ye","year":"2017","unstructured":"Ye J, Ni J, Yi Y (2017) Deep learning hierarchical representations for image steganalysis. IEEE Trans Inf Forensics Secur 12(11):2545\u20132557","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"9929_CR191","doi-asserted-by":"crossref","unstructured":"M Yedroudj, F Comby, and M Chaumont (2018). \u201cYedroudj-net: An efficient CNN for spatial steganalysis,\u201d in 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2092\u20132096","DOI":"10.1109\/ICASSP.2018.8461438"},{"issue":"1","key":"9929_CR192","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1049\/iet-ipr.2014.1019","volume":"10","author":"N Zarmehi","year":"2016","unstructured":"Zarmehi N, Akhaee MA (2016) Digital video steganalysis toward spread spectrum data hiding. IET Image Process 10(1):1\u20138","journal-title":"IET Image Process"},{"issue":"5","key":"9929_CR193","doi-asserted-by":"crossref","first-page":"1200","DOI":"10.1109\/TIFS.2017.2779446","volume":"13","author":"J Zeng","year":"2017","unstructured":"Zeng J, Tan S, Li B, Huang J (2017) Large-scale JPEG image steganalysis using hybrid deep-learning framework. IEEE Trans Inf Forensics Secur 13(5):1200\u20131214","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"9929_CR194","doi-asserted-by":"crossref","unstructured":"L Zhai, L Wang, and Y Ren (2019). \u201cUniversal detection of video steganography in multiple domains based on the consistency of motion vectors,\u201d IEEE Trans. Inf. Forensics Secur","DOI":"10.1109\/TIFS.2019.2949428"},{"issue":"4","key":"9929_CR195","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1109\/LSP.2011.2114651","volume":"18","author":"X Zhang","year":"2011","unstructured":"Zhang X (2011) Reversible data hiding in encrypted image. IEEE Signal Process Lett 18(4):255\u2013258","journal-title":"IEEE Signal Process Lett"},{"issue":"7","key":"9929_CR196","doi-asserted-by":"crossref","first-page":"8559","DOI":"10.1007\/s11042-018-6951-z","volume":"78","author":"R Zhang","year":"2019","unstructured":"Zhang R, Dong S, Liu J (2019) Invisible steganography via generative adversarial networks. Multimed Tools Appl 78(7):8559\u20138575","journal-title":"Multimed Tools Appl"},{"issue":"12","key":"9929_CR197","doi-asserted-by":"crossref","first-page":"3223","DOI":"10.1109\/TMM.2018.2838334","volume":"20","author":"X Zhang","year":"2018","unstructured":"Zhang X, Peng F, Long M (2018) Robust coverless image steganography based on DCT and LDA topic classification. IEEE Trans Multimed 20(12):3223\u20133238","journal-title":"IEEE Trans Multimed"},{"issue":"10","key":"9929_CR198","doi-asserted-by":"crossref","first-page":"2085","DOI":"10.1016\/S0165-1684(03)00169-5","volume":"83","author":"T Zhang","year":"2003","unstructured":"Zhang T, Ping X (2003) A new approach to reliable detection of LSB steganography in natural images. Signal Process 83(10):2085\u20132093","journal-title":"Signal Process"},{"issue":"5","key":"9929_CR199","doi-asserted-by":"crossref","first-page":"4069","DOI":"10.3934\/mbe.2019201","volume":"16","author":"T Zhang","year":"2019","unstructured":"Zhang T, Zhang H, Wang R, Wu Y (2019) A new JPEG image steganalysis technique combining rich model features and convolutional neural networks. Math Biosci Eng 16(5):4069\u20134081","journal-title":"Math Biosci Eng"},{"key":"9929_CR200","unstructured":"R Zhang, F Zhu, J Liu, and G Liu (2018). \u201cEfficient feature learning and multi-size image steganalysis based on CNN,\u201d arXiv Prepr. arXiv1807.11428"},{"key":"9929_CR201","doi-asserted-by":"crossref","unstructured":"Y Zhao, H Zhang, Y Cao, P Wang, and X Zhao (2015). \u201cVideo Steganalysis Based on Intra Prediction Mode Calibration,\u201d in International Workshop on Digital Watermarking, pp. 119\u2013133","DOI":"10.1007\/978-3-319-31960-5_11"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09929-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-09929-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09929-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,15]],"date-time":"2024-08-15T18:13:25Z","timestamp":1723745605000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-09929-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,8]]},"references-count":201,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,2]]}},"alternative-id":["9929"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-09929-9","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,10,8]]},"assertion":[{"value":"9 March 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 August 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 September 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 October 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}