{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T09:41:20Z","timestamp":1773740480010,"version":"3.50.1"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2021,1,23]],"date-time":"2021-01-23T00:00:00Z","timestamp":1611360000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,23]],"date-time":"2021-01-23T00:00:00Z","timestamp":1611360000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Technical Education Quality Improvement Project III (TEQIP III) of MHRD, Government of India assisted by World Bank","award":["P154523"],"award-info":[{"award-number":["P154523"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,4]]},"DOI":"10.1007\/s11042-020-10364-z","type":"journal-article","created":{"date-parts":[[2021,1,23]],"date-time":"2021-01-23T21:09:22Z","timestamp":1611436162000},"page":"14383-14407","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["A secure and robust video steganography scheme for covert communication in H.264\/AVC"],"prefix":"10.1007","volume":"80","author":[{"given":"Mukesh","family":"Dalal","sequence":"first","affiliation":[]},{"given":"Mamta","family":"Juneja","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,23]]},"reference":[{"issue":"2","key":"10364_CR1","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MC.1998.4655281","volume":"31","author":"NF Johnson","year":"1998","unstructured":"Johnson NF, Jajodia S (1998) Exploring steganography: seeing the unseen. IEEE Comput 31(2):26\u201334","journal-title":"IEEE Comput"},{"key":"10364_CR2","unstructured":"Morkel T, Eloff JH, Olivier MS (2005) An overview of image steganography. In ISSA 1(2):1\u201311"},{"issue":"8","key":"10364_CR3","doi-asserted-by":"publisher","first-page":"2174","DOI":"10.1016\/j.jss.2013.03.101","volume":"86","author":"Y Liu","year":"2013","unstructured":"Liu Y, Li Z, Ma X, Liu J (2013) A robust data hiding algorithm for H.264\/AVC video streams. J Syst Softw 86(8):2174\u20132183","journal-title":"J Syst Softw"},{"key":"10364_CR4","doi-asserted-by":"crossref","unstructured":"S. K. Moon and R. D. Raut, \u201cAnalysis of secured video steganography using computer forensics technique for enhance data security,\u201d 2013 IEEE 2nd Int Conf Image Inf Process IEEE ICIIP 2013, pp. 660\u2013665, 2013","DOI":"10.1109\/ICIIP.2013.6707677"},{"key":"10364_CR5","doi-asserted-by":"publisher","unstructured":"Mstafa RJ, Elleithy KM (2015) A high payload video steganography algorithm in DWT domain based on BCH codes (15, 11), 2015 Wireless Telecommunications Symposium (WTS), New York, NY, 2015, pp 1-8. https:\/\/doi.org\/10.1109\/WTS.2015.7117257","DOI":"10.1109\/WTS.2015.7117257"},{"key":"10364_CR6","doi-asserted-by":"publisher","first-page":"705","DOI":"10.1007\/978-981-10-6890-4_67","volume-title":"Proceedings of the International Conference on Computing and Communication Systems","author":"M Dalal","year":"2018","unstructured":"Dalal M, Juneja M (2018) Video Steganography Techniques in Spatial Domain-A Survey. In: Proceedings of the International Conference on Computing and Communication Systems. Springer, Singapore, pp 705\u2013711"},{"issue":"2","key":"10364_CR7","first-page":"147","volume":"17","author":"A Thahab","year":"2020","unstructured":"Thahab A (2020) A novel secure video steganography technique using temporal lifted wavelet transform and human vision properties. Int Arab J Inf Technol 17(2):147\u2013153","journal-title":"Int Arab J Inf Technol"},{"issue":"7","key":"10364_CR8","doi-asserted-by":"publisher","first-page":"897","DOI":"10.17485\/ijst\/2014\/v7i7.4","volume":"7","author":"M Ramalingam","year":"2014","unstructured":"Ramalingam M, Isa NAM (2014) Video steganography based on integer Haar wavelet transforms for secured data transfer. Indian J Sci Technol 7(7):897\u2013904","journal-title":"Indian J Sci Technol"},{"key":"10364_CR9","doi-asserted-by":"publisher","first-page":"1147","DOI":"10.1016\/j.procs.2020.04.123","volume":"171","author":"M Ramalingam","year":"2020","unstructured":"Ramalingam M, Isa NAM, Puviarasi R (2020) A secured data hiding using affine transformation in video steganography. Procedia Comput Sci 171:1147\u20131156","journal-title":"Procedia Comput Sci"},{"issue":"6","key":"10364_CR10","first-page":"45","volume":"11","author":"HL Nyo","year":"2019","unstructured":"Nyo HL, Oo AW (2019) Secure Data Transmission of Video Steganography Using Arnold Scrambling and DWT. Int J Comput Netw Inf Secur 11(6):45","journal-title":"Int J Comput Netw Inf Secur"},{"issue":"6","key":"10364_CR11","doi-asserted-by":"crossref","first-page":"385","DOI":"10.14257\/ijmue.2014.9.6.37","volume":"9","author":"C Chantrapornchai","year":"2014","unstructured":"Chantrapornchai C, Churin K, Preechasuk J, Adulkasem S (2014) Video steganography for hiding image with wavelet coefficients. Int J Multimed Ubiquitous Eng 9(6):385\u2013396","journal-title":"Int J Multimed Ubiquitous Eng"},{"issue":"6","key":"10364_CR12","first-page":"2431","volume":"3","author":"EAE Ahmed","year":"2014","unstructured":"Ahmed EAE, Soliman HH, Mostafa HE (2014) Information hiding in video files using frequency domain. Int J Sci Res 3(6):2431\u20132437","journal-title":"Int J Sci Res"},{"key":"10364_CR13","doi-asserted-by":"crossref","unstructured":"Suresh M, Sam IS (2020) Optimal wavelet transform using Oppositional Grey Wolf Optimization for video steganography. Multimed Tools Appl 79(37):27023\u201327037","DOI":"10.1007\/s11042-020-09330-6"},{"issue":"17","key":"10364_CR14","doi-asserted-by":"publisher","first-page":"10311","DOI":"10.1007\/s11042-015-3060-0","volume":"75","author":"RJ Mstafa","year":"2016","unstructured":"Mstafa RJ, Elleithy KM (2016) A video steganography algorithm based on Kanade-Lucas-Tomasi tracking algorithm and error correcting codes. Multimed Tools Appl 75(17):10311\u201310333","journal-title":"Multimed Tools Appl"},{"key":"10364_CR15","unstructured":"Mstafa RJ, Elleithy KM (2015) A new video steganography algorithm based on the multiple object tracking and Hamming codes. In 2015 IEEE 14th International Conference on Machine Learning and Applications (ICMLA), pp 335\u2013340"},{"key":"10364_CR16","doi-asserted-by":"crossref","unstructured":"Sadek MM, Khalifa AS, Mostafa MG (2017) Robust video steganography algorithm using adaptive skin-tone detection. Multimed Tools Appl 76(2):3065\u20133085","DOI":"10.1007\/s11042-015-3170-8"},{"key":"10364_CR17","first-page":"5354","volume":"5","author":"RJ Mstafa","year":"2017","unstructured":"Mstafa RJ, Elleithy KM, Abdelfattah E (2017) A robust and secure video steganography method in DWT-DCT domains based on multiple object tracking and ECC. IEEE Access 5:5354\u20135365","journal-title":"IEEE Access"},{"issue":"4","key":"10364_CR18","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1145\/1177352.1177355","volume":"38","author":"A Yilmaz","year":"2006","unstructured":"Yilmaz A, Javed O, Shah M (2006) Object tracking: A survey. Acm Comput Surv 38(4):13","journal-title":"Acm Comput Surv"},{"key":"10364_CR19","first-page":"246","volume":"2","author":"C Stauffer","year":"1999","unstructured":"Stauffer C, Grimson WEL (1999) Adaptive background mixture models for real-time tracking, in Computer Vision and Pattern Recognition. IEEE Computer Society Conference 2:246\u2013252","journal-title":"IEEE Computer Society Conference"},{"issue":"6","key":"10364_CR20","doi-asserted-by":"publisher","first-page":"1190","DOI":"10.1016\/j.jvcir.2006.03.004","volume":"17","author":"S-K Weng","year":"2006","unstructured":"Weng S-K, Kuo C-M, Tu S-K (2006) Video object tracking using adaptive Kalman filter. J Vis Commun Image Represent 17(6):1190\u20131208","journal-title":"J Vis Commun Image Represent"},{"issue":"5","key":"10364_CR21","doi-asserted-by":"publisher","first-page":"5769","DOI":"10.1007\/s11042-018-6093-3","volume":"78","author":"M Dalal","year":"2019","unstructured":"Dalal M, Juneja M (2019) A robust and imperceptible steganography technique for SD and HD videos. Multimed Tools Appl 78(5):5769\u20135789","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"10364_CR22","doi-asserted-by":"publisher","first-page":"293031","DOI":"10.1186\/1687-417X-2009-293031","volume":"2009","author":"G Li","year":"2010","unstructured":"Li G, Ito Y, Yu X, Nitta N, Babaguchi N (2010) Recoverable privacy protection for video content distribution. EURASIP J Inf Secur 2009(1):293031","journal-title":"EURASIP J Inf Secur"},{"issue":"4","key":"10364_CR23","doi-asserted-by":"publisher","first-page":"614","DOI":"10.1137\/1031128","volume":"31","author":"G Strang","year":"1989","unstructured":"Strang G (1989) Wavelets and dilation equations: a brief introduction. SIAM Rev 31(4):614\u2013627","journal-title":"SIAM Rev"},{"key":"10364_CR24","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1016\/j.bspc.2018.08.011","volume":"47","author":"S Abhishek","year":"2019","unstructured":"Abhishek S, Veni S, Narayanankutty KA (2019) Biorthogonal wavelet filters for compressed sensing ECG reconstruction. Biomed Signal Process Control 47:183\u2013195","journal-title":"Biomed Signal Process Control"},{"key":"10364_CR25","doi-asserted-by":"publisher","unstructured":"Salem MA, Ghamry N, Meffert B (2009) Daubechies versus biorthogonal wavelets for moving object detection in traffic monitoring systems. Humboldt-Universit\u00e4t zu Berlin, Mathematisch-Naturwissenschaftliche Fakult\u00e4t II, Institut f\u00fcr Informatik. https:\/\/doi.org\/10.18452\/2487","DOI":"10.18452\/2487"},{"issue":"1","key":"10364_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/19393555.2019.1708516","volume":"29","author":"M Dalal","year":"2020","unstructured":"Dalal M, Juneja M (2020) Evaluation of orthogonal and biorthogonal wavelets for video steganography. Inf Secur J A Glob Perspect 29(1):1\u201311","journal-title":"Inf Secur J A Glob Perspect"},{"key":"10364_CR27","doi-asserted-by":"crossref","unstructured":"Usman M, Ahmed I, Aslam MI, Khan S, Shah UA (2017) SIT: a lightweight encryption algorithm for secure internet of things. Int J Adv Comput Sci Appl 8(1):arXiv:1704.08688","DOI":"10.14569\/IJACSA.2017.080151"},{"key":"10364_CR28","volume-title":"Encyclopedia of Cryptography and Security","author":"A Biryukov","year":"2005","unstructured":"Biryukov A (2005) Feistel Cipher. In: Van Tilborg HCA (ed) Encyclopedia of Cryptography and Security. Springer, Boston"},{"issue":"3","key":"10364_CR29","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1080\/0161-110291890885","volume":"26","author":"HM Heys","year":"2002","unstructured":"Heys HM (2002) A tutorial on linear and differential cryptanalysis. Cryptologia 26(3):189\u2013221","journal-title":"Cryptologia"},{"key":"10364_CR30","doi-asserted-by":"publisher","unstructured":"Goyette N, Jodoin PM, Porikli F, Konrad J, Ishwar P (2012) Changedetection. net: A new change detection benchmark dataset. In 2012 IEEE computer society conference on computer vision and pattern recognition workshops, Providence, RI, pp 1\u20138. https:\/\/doi.org\/10.1109\/CVPRW.2012.6238919","DOI":"10.1109\/CVPRW.2012.6238919"},{"key":"10364_CR31","unstructured":"Abu-El-Haija S, Kothari N, Lee J, Natsev P, Toderici G, Varadarajan B, Vijayanarasimhan S (2016) Youtube-8m: A large-scale video classification benchmark, pp 1-10. arXiv preprint arXiv:1609.08675"},{"issue":"4","key":"10364_CR32","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600\u2013612","journal-title":"IEEE Trans Image Process"},{"key":"10364_CR33","doi-asserted-by":"publisher","unstructured":"Rezagholipour K, Eshghi M (2016) Video steganography algorithm based on motion vector of moving object. 2016 Eighth International Conference on Information and Knowledge Technology (IKT), Hamedan, pp 183\u2013187. https:\/\/doi.org\/10.1109\/IKT.2016.7777764","DOI":"10.1109\/IKT.2016.7777764"},{"issue":"22","key":"10364_CR34","doi-asserted-by":"publisher","first-page":"14867","DOI":"10.1007\/s11042-015-2671-9","volume":"75","author":"K Muhammad","year":"2016","unstructured":"Muhammad K, Sajjad M, Mehmood I, Rho S, Baik SW (2016) A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image. Multimed Tools Appl 75(22):14867\u201314893","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"10364_CR35","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1016\/j.aeue.2011.08.007","volume":"66","author":"Y He","year":"2012","unstructured":"He Y, Yang G, Zhu N (2012) A real-time dual watermarking algorithm of H. 264\/AVC video stream for video-on-demand service. AEU-International J Electron Commun 66(4):305\u2013312","journal-title":"AEU-International J Electron Commun"},{"key":"10364_CR36","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1117\/12.421129","volume":"4387","author":"K Briechle","year":"2001","unstructured":"Briechle K, Hanebeck UD (2001) Template matching using fast normalized cross correlation. Optical Pattern Recognition XII 4387:95\u2013103","journal-title":"Optical Pattern Recognition XII"},{"issue":"1","key":"10364_CR37","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/s11554-017-0727-y","volume":"14","author":"M Long","year":"2018","unstructured":"Long M, Peng F, Li H (2018) Separable reversible data hiding and encryption for HEVC video. J Real-Time Image Process 14(1):171\u2013182","journal-title":"J Real-Time Image Process"},{"issue":"2","key":"10364_CR38","doi-asserted-by":"publisher","first-page":"2791","DOI":"10.1007\/s11042-017-4427-1","volume":"77","author":"AA Mohammed","year":"2018","unstructured":"Mohammed AA, Ali NA (2018) Robust video watermarking scheme using high efficiency video coding attack. Multimed Tools Appl 77(2):2791\u20132806","journal-title":"Multimed Tools Appl"},{"issue":"12","key":"10364_CR39","doi-asserted-by":"publisher","first-page":"1649","DOI":"10.1109\/TCSVT.2012.2221191","volume":"22","author":"GJ Sullivan","year":"2012","unstructured":"Sullivan GJ, Ohm J-R, Han W-J, Wiegand T et al (2012) Overview of the high efficiency video coding(HEVC) standard. IEEE Trans circuits Syst Video Technol 22(12):1649\u20131668","journal-title":"IEEE Trans circuits Syst Video Technol"},{"issue":"5","key":"10364_CR40","doi-asserted-by":"publisher","first-page":"4559","DOI":"10.3934\/mbe.2019228","volume":"16","author":"F Li","year":"2019","unstructured":"Li F, Yu J, Ren Y (2019) Data-loss resilience video steganography using frame reference and data ensemble reconstruction. Math Biosci Eng MBE 16(5):4559\u20134580","journal-title":"Math Biosci Eng MBE"},{"issue":"2","key":"10364_CR41","first-page":"411","volume":"24","author":"S Hemalatha","year":"2016","unstructured":"Hemalatha S, Acharya UD, Renuka A (2016) High capacity video steganography technique in transform domain. Pertanika J Sci Technol 24(2):411\u2013422","journal-title":"Pertanika J Sci Technol"},{"issue":"6","key":"10364_CR42","doi-asserted-by":"publisher","first-page":"3053","DOI":"10.1007\/s11042-014-2422-3","volume":"75","author":"S Gaj","year":"2016","unstructured":"Gaj S, Patel AS, Sur A (2016) Object based watermarking for H. 264\/AVC video resistant to rst attacks. Multimed Tools Appl 75(6):3053\u20133080","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"10364_CR43","doi-asserted-by":"publisher","first-page":"67","DOI":"10.5121\/ijdms.2010.2307","volume":"2","author":"S. A P and A. P P","year":"2010","unstructured":"S. A P and A. P P (2010) A compressed video steganography using TPVD. Int J Database Manag Syst 2(3):67\u201380","journal-title":"Int J Database Manag Syst"},{"issue":"2","key":"10364_CR44","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1109\/TIFS.2010.2045842","volume":"5","author":"T Pevny","year":"2010","unstructured":"Pevny T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Trans Inf Forensics Secur 5(2):215\u2013224","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"1","key":"10364_CR45","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1007\/s11042-013-1373-4","volume":"72","author":"K Wang","year":"2014","unstructured":"Wang K, Han J, Wang H (2014) Digital video steganalysis by subtractive prediction error adjacency matrix. Multimed Tools Appl 72(1):313\u2013330","journal-title":"Multimed Tools Appl"},{"key":"10364_CR46","doi-asserted-by":"publisher","unstructured":"Da T, Li Z, Feng B (2015) A video steganalysis algorithm for H.264\/AVC based on the Markov features. In: Huang DS, Jo KH, Hussain A (eds) Intelligent Computing Theories and Methodologies. ICIC 2015. Lecture Notes in Computer Science, vol 9226. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-319-22186-1_5","DOI":"10.1007\/978-3-319-22186-1_5"},{"issue":"4","key":"10364_CR47","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1504\/IJESDF.2018.095122","volume":"10","author":"M Dalal","year":"2018","unstructured":"Dalal M, Juneja M (2018) Video steganalysis to obstruct criminal activities for digital forensics: a survey. Int J Electron Secur Digit Forensics 10(4):338\u2013355","journal-title":"Int J Electron Secur Digit Forensics"},{"issue":"3","key":"10364_CR48","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1145\/1961189.1961199","volume":"2","author":"C-C Chang","year":"2011","unstructured":"Chang C-C, Lin C-J (2011) LIBSVM: A library for support vector machines. ACM Trans Intell Syst Technol 2(3):27","journal-title":"ACM Trans Intell Syst Technol"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10364-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-10364-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10364-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,13]],"date-time":"2022-12-13T02:10:10Z","timestamp":1670897410000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-10364-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,23]]},"references-count":48,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2021,4]]}},"alternative-id":["10364"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-10364-z","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,23]]},"assertion":[{"value":"15 January 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 September 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 December 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 January 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}