{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T12:02:38Z","timestamp":1761998558006,"version":"build-2065373602"},"reference-count":43,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2023,3,1]],"date-time":"2023-03-01T00:00:00Z","timestamp":1677628800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2023,3,1]],"date-time":"2023-03-01T00:00:00Z","timestamp":1677628800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2023,3,1]],"date-time":"2023-03-01T00:00:00Z","timestamp":1677628800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2023,3,1]],"date-time":"2023-03-01T00:00:00Z","timestamp":1677628800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2023,3,1]],"date-time":"2023-03-01T00:00:00Z","timestamp":1677628800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2023,3,1]],"date-time":"2023-03-01T00:00:00Z","timestamp":1677628800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,3,1]],"date-time":"2023-03-01T00:00:00Z","timestamp":1677628800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872384","62202496","62272478"],"award-info":[{"award-number":["61872384","62202496","62272478"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Information Security and Applications"],"published-print":{"date-parts":[[2023,3]]},"DOI":"10.1016\/j.jisa.2023.103439","type":"journal-article","created":{"date-parts":[[2023,1,31]],"date-time":"2023-01-31T23:28:16Z","timestamp":1675207696000},"page":"103439","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":8,"special_numbering":"C","title":["Investigation on principles for cost assignment in motion vector-based video steganography"],"prefix":"10.1016","volume":"73","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4002-4619","authenticated-orcid":false,"given":"Jun","family":"Li","sequence":"first","affiliation":[]},{"given":"Minqing","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Ke","family":"Niu","sequence":"additional","affiliation":[]},{"given":"Xiaoyuan","family":"Yang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.jisa.2023.103439_bib0001","series-title":"First International Conference on Innovative Computing, Information and Control","first-page":"269","article-title":"Steganography in compressed video stream","author":"Xu","year":"2006"},{"issue":"1","key":"10.1016\/j.jisa.2023.103439_bib0002","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/TIFS.2010.2090520","article-title":"Data hiding in motion vectors of compressed video based on their associated prediction error","volume":"6","author":"Aly","year":"2011","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"10.1016\/j.jisa.2023.103439_bib0003","series-title":"IEEE International Symposium on Circuits and Systems","first-page":"1422","article-title":"Data hiding for digital video with phase of motion vector","author":"Fang","year":"2006"},{"issue":"3","key":"10.1016\/j.jisa.2023.103439_bib0004","doi-asserted-by":"crossref","first-page":"390","DOI":"10.1109\/TIFS.2006.879281","article-title":"Matrix embedding for large payloads","volume":"1","author":"Fridrich","year":"2006","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"10","key":"10.1016\/j.jisa.2023.103439_bib0005","doi-asserted-by":"crossref","first-page":"3923","DOI":"10.1109\/TSP.2005.855393","article-title":"Writing on wet paper","volume":"53","author":"Fridrich","year":"2005","journal-title":"IEEE Trans Signal Process"},{"key":"10.1016\/j.jisa.2023.103439_bib0006","series-title":"IEEE 3rd International Conference on Communication Software and Networks","first-page":"406","article-title":"A novel steganography algorithm based on motion vector and matrix encoding","author":"Hao-Bin","year":"2011"},{"key":"10.1016\/j.jisa.2023.103439_bib0007","first-page":"193","article-title":"Video steganography with perturbed motion estimation","volume":"6958","author":"Cao","year":"2011","journal-title":"Lect Notes Comput Sci (Including Subser Lect Notes Artif Intell Lect Notes Bioinformatics)"},{"issue":"3","key":"10.1016\/j.jisa.2023.103439_bib0008","doi-asserted-by":"crossref","first-page":"920","DOI":"10.1109\/TIFS.2011.2134094","article-title":"Minimizing additive distortion in steganography using syndrome-trellis codes","volume":"6","author":"Filler","year":"2011","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"24","key":"10.1016\/j.jisa.2023.103439_bib0009","doi-asserted-by":"crossref","first-page":"11163","DOI":"10.1007\/s11042-014-2223-8","article-title":"Defining embedding distortion for motion vector-based video steganography","volume":"74","author":"Yao","year":"2015","journal-title":"Multimed Tools Appl"},{"key":"10.1016\/j.jisa.2023.103439_bib0010","series-title":"Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security","first-page":"25","article-title":"Video steganography based on optimized motion estimation perturbation","author":"Cao","year":"2015"},{"issue":"21","key":"10.1016\/j.jisa.2023.103439_bib0011","doi-asserted-by":"crossref","first-page":"13503","DOI":"10.1007\/s11042-015-2743-x","article-title":"Motion vector-based video steganography with preserved local optimality","volume":"75","author":"Zhang","year":"2016","journal-title":"Multimed Tools Appl"},{"key":"10.1016\/j.jisa.2023.103439_bib0012","series-title":"25th IEEE International Conference on Image Processing","first-page":"1678","article-title":"Uniform Embedding for Efficient Steganography of H.264 Video","author":"Zhu","year":"2018"},{"issue":"27","key":"10.1016\/j.jisa.2023.103439_bib0013","doi-asserted-by":"crossref","first-page":"18909","DOI":"10.1007\/s11042-020-08617-y","article-title":"Undetectable video steganography by considering spatio-temporal steganalytic features in the embedding cost function","volume":"79","author":"Ghamsarian","year":"2020","journal-title":"Multimed Tools Appl"},{"key":"10.1016\/j.jisa.2023.103439_bib0014","doi-asserted-by":"crossref","DOI":"10.1016\/j.jvcir.2020.102986","article-title":"Motion vector modification distortion analysis-based payload allocation for video steganography","volume":"74","author":"Yao","year":"2021","journal-title":"J Vis Commun Image Represent"},{"issue":"7","key":"10.1016\/j.jisa.2023.103439_bib0015","doi-asserted-by":"crossref","first-page":"4905","DOI":"10.1109\/TCSVT.2021.3135384","article-title":"A Novel Video Steganographic Scheme Incorporating the Consistency Degree of Motion Vectors","volume":"32","author":"Liu","year":"2022","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"8","key":"10.1016\/j.jisa.2023.103439_bib0016","doi-asserted-by":"crossref","first-page":"1901","DOI":"10.1016\/j.sigpro.2011.02.012","article-title":"A video steganalytic algorithm against motion-vector-based steganography","volume":"91","author":"Su","year":"2011","journal-title":"Signal Process"},{"issue":"7","key":"10.1016\/j.jisa.2023.103439_bib0017","doi-asserted-by":"crossref","first-page":"3316","DOI":"10.1109\/TIP.2016.2567073","article-title":"Spatio-Temporal Rich Model-Based Video Steganalysis on Cross Sections of Motion Vector Planes","volume":"25","author":"Tasdemir","year":"2016","journal-title":"IEEE Trans Image Process"},{"issue":"1","key":"10.1016\/j.jisa.2023.103439_bib0018","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1109\/LSP.2011.2176116","article-title":"Video Steganalysis Exploiting Motion Vector Reversion-Based Features","volume":"19","author":"Cao","year":"2012","journal-title":"IEEE Signal Process Lett"},{"key":"10.1016\/j.jisa.2023.103439_bib0019","series-title":"Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security","first-page":"135","article-title":"Combined and calibrated features for steganalysis of motion vector-based steganography in H.264\/AVC","author":"Zhai","year":"2017"},{"issue":"5","key":"10.1016\/j.jisa.2023.103439_bib0020","doi-asserted-by":"crossref","first-page":"741","DOI":"10.1109\/TIFS.2014.2308633","article-title":"Video steganalysis against motion vector-based steganography by adding or subtracting one motion vector value","volume":"9","author":"Wang","year":"2014","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"2","key":"10.1016\/j.jisa.2023.103439_bib0021","doi-asserted-by":"crossref","first-page":"465","DOI":"10.1109\/TIFS.2016.2623587","article-title":"A steganalytic approach to detect motion vector modification using near-perfect estimation for local optimality","volume":"12","author":"Zhang","year":"2017","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"10.1016\/j.jisa.2023.103439_bib0022","first-page":"1","article-title":"Generalized Local Optimality for Video Steganalysis in Motion Vector Domain","author":"Zhai","year":"2021","journal-title":"Arixv"},{"issue":"1","key":"10.1016\/j.jisa.2023.103439_bib0023","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1016\/j.patrec.2021.02.018","article-title":"An HEVC steganalytic approach against motion vector modification using local optimality in candidate list","volume":"146","author":"Liu","year":"2021","journal-title":"Pattern Recognit Lett"},{"key":"10.1016\/j.jisa.2023.103439_bib0024","doi-asserted-by":"crossref","first-page":"1762","DOI":"10.1109\/TIFS.2019.2949428","article-title":"Universal Detection of Video Steganography in Multiple Domains Based on the Consistency of Motion Vectors","volume":"15","author":"Zhai","year":"2020","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"10.1016\/j.jisa.2023.103439_bib0025","series-title":"International Workshop on Information Hiding","first-page":"161","article-title":"Using High-Dimensional Image Models to Perform Highly Undetectable Steganography","author":"Pevny","year":"2010"},{"key":"10.1016\/j.jisa.2023.103439_bib0026","first-page":"1","article-title":"Universal distortion function for steganography in an arbitrary domain","volume":"1","author":"Holub","year":"2014","journal-title":"Eurasip J Inf Secur"},{"issue":"8","key":"10.1016\/j.jisa.2023.103439_bib0027","doi-asserted-by":"crossref","first-page":"1264","DOI":"10.1109\/TIFS.2014.2326954","article-title":"Investigation on cost assignment in spatial image steganography","volume":"9","author":"Li","year":"2014","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"11","key":"10.1016\/j.jisa.2023.103439_bib0028","doi-asserted-by":"crossref","first-page":"2654","DOI":"10.1109\/TIFS.2017.2718480","article-title":"A New Rule for Cost Reassignment in Adaptive Steganography","volume":"12","author":"Zhou","year":"2017","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"10.1016\/j.jisa.2023.103439_bib0029","series-title":"Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security","first-page":"5","article-title":"Improving steganographic security by synchronizing the selection channel","author":"Denemark","year":"2015"},{"issue":"9","key":"10.1016\/j.jisa.2023.103439_bib0030","doi-asserted-by":"crossref","first-page":"1905","DOI":"10.1109\/TIFS.2015.2434600","article-title":"A strategy of clustering modification directions in spatial image steganography","volume":"10","author":"Li","year":"2015","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"10.1016\/j.jisa.2023.103439_bib0031","unstructured":"Draft ITU-T Recommendation and Final Draft International Standard of Joint Video Specification, document ITU-T Rec.H.264\/ISO\/IEC 14496-10 AVC, Joint Video Team (JVT) of ISO\/IEC MPEG and ITU-T VCEG, JVTG050, May 2003."},{"issue":"7","key":"10.1016\/j.jisa.2023.103439_bib0032","doi-asserted-by":"crossref","first-page":"560","DOI":"10.1109\/TCSVT.2003.815165","article-title":"Overview of the H.264\/AVC video coding standard","volume":"13","author":"Wiegand","year":"2003","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"10.1016\/j.jisa.2023.103439_bib0033","unstructured":"B. Bross, W.-J. Han, G. J. Sullivan, J.-R. Ohm, and T. Wiegand, High Efficiency Video Coding (HEVC) Text Specification Draft 9, document JCTVC-K1003, ITU-T\/ISO\/IEC Joint Collaborative Team on Video Coding (JCT-VC), Oct. 2012."},{"key":"10.1016\/j.jisa.2023.103439_bib0034","unstructured":"ITU-T. ITU-T Recommendation H.266 and ISO\/IEC 23090-3 VVC standard[S]. 2020."},{"issue":"2","key":"10.1016\/j.jisa.2023.103439_bib0035","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1007\/s00530-005-0194-3","article-title":"Perturbed quantization steganography","volume":"11","author":"Fridrich","year":"2005","journal-title":"Multimed Syst"},{"issue":"2","key":"10.1016\/j.jisa.2023.103439_bib0036","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1109\/LCOMM.2014.2387160","article-title":"Covert communication by compressed videos exploiting the uncertainty of motion estimation","volume":"19","author":"Cao","year":"2015","journal-title":"IEEE Commun Lett"},{"key":"10.1016\/j.jisa.2023.103439_bib0037","series-title":"IEEE International Workshop on Information Forensics and Security","first-page":"234","article-title":"Designing steganographic distortion using directional filters","author":"Holub","year":"2012"},{"issue":"12","key":"10.1016\/j.jisa.2023.103439_bib0038","doi-asserted-by":"crossref","first-page":"2669","DOI":"10.1109\/TIFS.2015.2473815","article-title":"Using Statistical Image Model for JPEG Steganography: Uniform Embedding Revisited","volume":"10","author":"Guo","year":"2015","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"10.1016\/j.jisa.2023.103439_bib0039","unstructured":"http:\/\/trace.eas.asu.edu\/yuv\/index.html."},{"key":"10.1016\/j.jisa.2023.103439_bib0040","unstructured":"VideoLAN-x264, The Best H.264\/AVC Encoder. [Online]. Available: http:\/\/www.videolan.org\/developers\/x264.html."},{"issue":"5","key":"10.1016\/j.jisa.2023.103439_bib0041","doi-asserted-by":"crossref","first-page":"349","DOI":"10.1109\/TCSVT.2002.1003474","article-title":"Hexagon-based search pattern for fast block motion estimation","volume":"12","author":"Zhu","year":"2002","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"10.1016\/j.jisa.2023.103439_bib0042","doi-asserted-by":"crossref","DOI":"10.1007\/s10044-022-01081-4","article-title":"A novel video saliency estimation method in the compressed domain","author":"Sandula","year":"2022","journal-title":"Pattern Anal Appl"},{"key":"10.1016\/j.jisa.2023.103439_bib0043","unstructured":"C.-C. Chang and C.-J. Lin. (May 2021.) LIBSVM: a library for support vector machines. [Online]. Available: http:\/\/www.csie.ntu.edu. tw\/\u223ccjlin\/libsvm."}],"container-title":["Journal of Information Security and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2214212623000248?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2214212623000248?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T12:00:10Z","timestamp":1761998410000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2214212623000248"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3]]},"references-count":43,"alternative-id":["S2214212623000248"],"URL":"https:\/\/doi.org\/10.1016\/j.jisa.2023.103439","relation":{},"ISSN":["2214-2126"],"issn-type":[{"type":"print","value":"2214-2126"}],"subject":[],"published":{"date-parts":[[2023,3]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Investigation on principles for cost assignment in motion vector-based video steganography","name":"articletitle","label":"Article Title"},{"value":"Journal of Information Security and Applications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jisa.2023.103439","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2023 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"103439"}}