{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T09:41:27Z","timestamp":1773740487297,"version":"3.50.1"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,6,20]],"date-time":"2022-06-20T00:00:00Z","timestamp":1655683200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,6,20]],"date-time":"2022-06-20T00:00:00Z","timestamp":1655683200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972390"],"award-info":[{"award-number":["61972390"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61902391"],"award-info":[{"award-number":["61902391"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1736214"],"award-info":[{"award-number":["U1736214"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61802393"],"award-info":[{"award-number":["61802393"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872356"],"award-info":[{"award-number":["61872356"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key Technology Research and Development Program","award":["2019QY0701"],"award-info":[{"award-number":["2019QY0701"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["EURASIP J. on Info. Security"],"published-print":{"date-parts":[[2022,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Most social media channels are lossy where videos are transcoded to reduce transmission bandwidth or storage space, such as social networking sites and video sharing platforms. Video transcoding makes most video steganographic schemes unusable for hidden communication based on social media. This paper proposes robust video steganography against video transcoding to construct reliable hidden communication on social media channels. A new strategy based on principal component analysis is provided to select robust embedding regions. Besides, side information is generated to label these selected regions. Side information compression is designed to reduce the transmission bandwidth cost. Then, one luminance component and one chrominance component are joined to embed secret messages and side information, notifying the receiver of correct extraction positions. Video preprocessing is conducted to improve the applicability of our proposed method to various video transcoding mechanisms. Experimental results have shown that our proposed method provides stronger robustness against video transcoding than other methods and achieves satisfactory security performance against steganalysis. Compared with some existing methods, our proposed method is more robust and reliable to realize hidden communication over social media channels, such as YouTube and Vimeo.<\/jats:p>","DOI":"10.1186\/s13635-022-00130-z","type":"journal-article","created":{"date-parts":[[2022,6,20]],"date-time":"2022-06-20T10:04:17Z","timestamp":1655719457000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Robust video steganography for social media sharing based on principal component analysis"],"prefix":"10.1186","volume":"2022","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9881-988X","authenticated-orcid":false,"given":"Pingan","family":"Fan","sequence":"first","affiliation":[]},{"given":"Hong","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xianfeng","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,6,20]]},"reference":[{"key":"130_CR1","unstructured":"Cisco, Cisco Annual internet report (2018\u20132023) White Paper (2020). https:\/\/www.cisco.com\/c\/en\/us\/solutions\/collateral\/executive-perspectives\/annual-internet-report\/white-paper-c11-741490.html. Accessed 9 Mar 2019."},{"key":"130_CR2","first-page":"94","volume-title":"International Workshop on Digital Watermarking","author":"X. Zhao","year":"2020","unstructured":"X. Zhao, C. Yang, F. Liu, in International Workshop on Digital Watermarking. On the sharing-based model of steganography (SpringerNew York, 2020), pp. 94\u2013105."},{"key":"130_CR3","first-page":"1","volume-title":"IEEE International Workshop on Information Forensics and Security (WIFS)","author":"C. Kin-Cleaves","year":"2018","unstructured":"C. Kin-Cleaves, A. D. Ker, in IEEE International Workshop on Information Forensics and Security (WIFS). Adaptive steganography in the noisy channel with dual-syndrome trellis codes (IEEENew York, 2018), pp. 1\u20137."},{"key":"130_CR4","doi-asserted-by":"publisher","first-page":"1843","DOI":"10.1109\/TIFS.2018.2885438","volume":"14","author":"Z. Zhao","year":"2018","unstructured":"Z. Zhao, Q. Guan, H. Zhang, X. Zhao, Improving the robustness of adaptive steganographic algorithms based on transport channel matching. IEEE Trans. Inf. Forensics Secur.14:, 1843\u20131856 (2018).","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"130_CR5","doi-asserted-by":"publisher","first-page":"594","DOI":"10.1109\/TCSVT.2018.2881118","volume":"29","author":"J. Tao","year":"2018","unstructured":"J. Tao, S. Li, X. Zhang, Z. Wang, Towards robust image steganography. IEEE Trans. Circ. Syst. Video Technol.29:, 594\u2013600 (2018).","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"key":"130_CR6","doi-asserted-by":"publisher","first-page":"2750","DOI":"10.1109\/TCSVT.2019.2923980","volume":"30","author":"Y. Zhang","year":"2019","unstructured":"Y. Zhang, X. Luo, Y. Guo, C. Qin, F. Liu, Multiple robustness enhancements for image adaptive steganography in lossy channels. IEEE Trans. Circ. Syst. Video Technol.30:, 2750\u20132764 (2019).","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"key":"130_CR7","first-page":"406","volume-title":"IEEE International Conference on Communication Software and Networks","author":"L. Zhao","year":"2011","unstructured":"L. Zhao, W. Zhong, in IEEE International Conference on Communication Software and Networks. A novel steganography algorithm based on motion vector and matrix encoding (IEEENew York, 2011), pp. 406\u2013409."},{"key":"130_CR8","doi-asserted-by":"publisher","first-page":"13503","DOI":"10.1007\/s11042-015-2743-x","volume":"75","author":"H. Zhang","year":"2016","unstructured":"H. Zhang, Y. Cao, X. Zhao, Motion vector-based video steganography with preserved local optimality. Multimed. Tools Appl.75:, 13503\u201313519 (2016).","journal-title":"Multimed. Tools Appl."},{"key":"130_CR9","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1145\/2909827.2930801","volume-title":"ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec)","author":"P. Wang","year":"2016","unstructured":"P. Wang, H. Zhang, Y. Cao, X. Zhao, in ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec). A novel embedding distortion for motion vector-based steganography considering motion characteristic, local optimality and statistical distribution (ACMNew York, 2016), pp. 127\u2013137."},{"key":"130_CR10","first-page":"277","volume-title":"IEEE International Conference on Multimedia and Expo","author":"S. K. Kapotas","year":"2008","unstructured":"S. K. Kapotas, A. N. Skodras, in IEEE International Conference on Multimedia and Expo. A new data hiding scheme for scene change detection in h.264 encoded video sequences (ACMNew York, 2008), pp. 277\u2013280."},{"key":"130_CR11","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1016\/j.aeue.2010.03.011","volume":"65","author":"G. Yang","year":"2011","unstructured":"G. Yang, J. Li, Y. He, Z. Kang, An information hiding algorithm based on intra-prediction modes and matrix coding for h.264\/avc video stream. AEU-Int. J. Electron. Commun.65:, 331\u2013337 (2011).","journal-title":"AEU-Int. J. Electron. Commun."},{"key":"130_CR12","doi-asserted-by":"publisher","first-page":"1320","DOI":"10.1109\/TCSVT.2010.2070950","volume":"20","author":"X. Ma","year":"2010","unstructured":"X. Ma, Z. Li, H. Tu, B. Zhang, A data hiding algorithm for h.264\/avc video streams without intra-frame distortion drift. IEEE Trans. Circ. Syst. Video Technol.20:, 1320\u20131330 (2010).","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"key":"130_CR13","first-page":"1","volume":"1","author":"K. Dasgupta","year":"2012","unstructured":"K. Dasgupta, J. Mandal, P. Dutta, Hash based least significant bit technique for video steganography (hlsb). Int. J. Secur. Priv. Trust Manag.1:, 1\u201311 (2012).","journal-title":"Int. J. Secur. Priv. Trust Manag."},{"key":"130_CR14","doi-asserted-by":"publisher","first-page":"670","DOI":"10.1016\/j.cose.2009.04.002","volume":"28","author":"O. Cetin","year":"2009","unstructured":"O. Cetin, A. T. Ozcerit, A new steganography algorithm based on color histograms for data embedding into raw video streams. Comput. Secur.28:, 670\u2013682 (2009).","journal-title":"Comput. Secur."},{"key":"130_CR15","doi-asserted-by":"publisher","first-page":"17","DOI":"10.12785\/IJCNT\/020103","volume":"2","author":"H. M. Kelas","year":"2014","unstructured":"H. M. Kelas, O. F. A. Wahab, O. A. Elshakankiry, H. S. El-sayed, Utilization of steganographic techniques in video sequences. Int. J. Comput. Netw. Technol.2:, 17\u201324 (2014).","journal-title":"Int. J. Comput. Netw. Technol."},{"key":"130_CR16","first-page":"208","volume-title":"IEEE Sarnoff Symposium","author":"R. J. Mstafa","year":"2016","unstructured":"R. J. Mstafa, K. M. Elleithy, in IEEE Sarnoff Symposium. A novel video steganography algorithm in dct domain based on hamming and bch codes (IEEENew York, 2016), pp. 208\u2013213."},{"key":"130_CR17","first-page":"97","volume-title":"IEEE International Conference on Image and Graphics","author":"C. Xu","year":"2007","unstructured":"C. Xu, X. Ping, in IEEE International Conference on Image and Graphics. A steganographic algorithm in uncompressed video sequence based on difference between adjacent frames (IEEENew York, 2007), pp. 97\u2013302."},{"key":"130_CR18","first-page":"1","volume-title":"IEEE Wireless Telecommunications Symposium (WTS)","author":"R. J. Mstafa","year":"2015","unstructured":"R. J. Mstafa, K. M. Elleithy, in IEEE Wireless Telecommunications Symposium (WTS). A high payload video steganography algorithm in DWT domain based on bch codes (15, 11) (IEEENew York, 2015), pp. 1\u20138."},{"key":"130_CR19","doi-asserted-by":"publisher","first-page":"16159","DOI":"10.1007\/s11042-018-6892-6","volume":"78","author":"R. Esfahani","year":"2019","unstructured":"R. Esfahani, M. A. Akhaee, Z. Norouzi, A fast video watermarking algorithm using dual tree complex wavelet transform. Multimed. Tools Appl.78:, 16159\u201316175 (2019).","journal-title":"Multimed. Tools Appl."},{"key":"130_CR20","first-page":"5354","volume":"5","author":"R. J. Mstafa","year":"2017","unstructured":"R. J. Mstafa, K. M. Elleithy, E. Abdelfattah, A robust and secure video steganography method in DWT-DCT domains based on multiple object tracking and ecc. IEEE Access. 5:, 5354\u20135365 (2017).","journal-title":"IEEE Access"},{"key":"130_CR21","doi-asserted-by":"publisher","first-page":"14383","DOI":"10.1007\/s11042-020-10364-z","volume":"80","author":"M. Dalal","year":"2021","unstructured":"M. Dalal, M. Juneja, A secure and robust video steganography scheme for covert communication in h.264\/avc. Multimed. Tools Appl.80:, 14383\u201314407 (2021).","journal-title":"Multimed. Tools Appl."},{"key":"130_CR22","first-page":"127","volume-title":"ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec)","author":"P. Fan","year":"2020","unstructured":"P. Fan, H. Zhang, Y. Cai, P. Xie, X. Zhao, in ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec). A robust video steganographic method against social networking transcoding based on steganographic side channel (ACMNew York, 2020), pp. 127\u2013137."},{"issue":"7","key":"130_CR23","doi-asserted-by":"publisher","first-page":"560","DOI":"10.1109\/TCSVT.2003.815165","volume":"13","author":"T. Wiegand","year":"2003","unstructured":"T. Wiegand, G. J. Sullivan, G. Bjontegaard, A. Luthra, Overview of the H.264\/AVC video coding standard. IEEE Trans. Circ. Syst. Video Technol.13(7), 560\u2013576 (2003).","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"key":"130_CR24","doi-asserted-by":"publisher","first-page":"1649","DOI":"10.1109\/TCSVT.2012.2221191","volume":"22","author":"G. J. Sullivan","year":"2012","unstructured":"G. J. Sullivan, J. -R. Ohm, W. -J. Han, T. Wiegand, Overview of the high efficiency video coding (HEVC) standard. IEEE Trans. Circ. Syst. Video Technol.22:, 1649\u20131668 (2012).","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"key":"130_CR25","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1109\/6046.985560","volume":"4","author":"R. Liu","year":"2002","unstructured":"R. Liu, T. Tan, An svd-based watermarking scheme for protecting rightful ownership. IEEE Trans. Multimed.4:, 121\u2013128 (2002).","journal-title":"IEEE Trans. Multimed."},{"key":"130_CR26","first-page":"894","volume-title":"IEEE Visual Communications and Image Processing","author":"J. Zhang","year":"2000","unstructured":"J. Zhang, J. Schroeder, T. Cooke, N. Redding, T. Tang, in IEEE Visual Communications and Image Processing. Singular value features of images (IEEENew York, 2000), pp. 894\u2013903."},{"key":"130_CR27","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1109\/TIFS.2006.879281","volume":"1","author":"J. Fridrich","year":"2006","unstructured":"J. Fridrich, D. Soukal, Matrix embedding for large payloads. IEEE Trans. Inf. Forensic Secur.1:, 390\u2013395 (2006).","journal-title":"IEEE Trans. Inf. Forensic Secur."},{"key":"130_CR28","first-page":"314","volume-title":"International Workshop on Information Hiding","author":"Y. Kim","year":"2006","unstructured":"Y. Kim, Z. Duric, D. Richards, in International Workshop on Information Hiding. Modified matrix encoding technique for minimal distortion steganography (SpringerNew York, 2006), pp. 314\u2013327."},{"key":"130_CR29","doi-asserted-by":"publisher","first-page":"920","DOI":"10.1109\/TIFS.2011.2134094","volume":"6","author":"T. Filler","year":"2011","unstructured":"T. Filler, J. Judas, J. Fridrich, Minimizing additive distortion in steganography using Syndrome-Trellis Codes. IEEE Trans. Inf. Forensic Secur.6:, 920\u2013935 (2011).","journal-title":"IEEE Trans. Inf. Forensic Secur."},{"key":"130_CR30","doi-asserted-by":"crossref","unstructured":"B. Chen, G. W. Wornell, in IEEE International Conference on Acoustics, Speech, and Signal Processing. An information-theoretic approach to the design of robust digital watermarking systems, (1999), pp. 2061\u20132064.","DOI":"10.1109\/ICASSP.1999.758336"},{"key":"130_CR31","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1109\/TIFS.2007.897266","volume":"2","author":"Q. Li","year":"2007","unstructured":"Q. Li, I. J. Cox, Using perceptual models to improve fidelity and provide resistance to valumetric scaling for quantization index modulation watermarking. IEEE Trans. Inf. Forensic Secur.2:, 127\u2013139 (2007).","journal-title":"IEEE Trans. Inf. Forensic Secur."},{"key":"130_CR32","first-page":"147","volume":"2","author":"A. Hocquenghem","year":"1959","unstructured":"A. Hocquenghem, Codes correcteurs d\u2019erreurs. Chiffres. 2:, 147\u2013156 (1959).","journal-title":"Chiffres"},{"key":"130_CR33","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1016\/S0019-9958(60)90287-4","volume":"3","author":"R. C. Bose","year":"1960","unstructured":"R. C. Bose, D. K. Ray-Chaudhuri, On a class of error correcting binary group codes. Inf. Control. 3:, 68\u201379 (1960).","journal-title":"Inf. Control"},{"key":"130_CR34","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1137\/0108018","volume":"8","author":"I. S. Reed","year":"1960","unstructured":"I. S. Reed, G. Solomon, Polynomial codes over certain finite fields. J. Soc. Ind. Appl. Math.8:, 300\u2013304 (1960).","journal-title":"J. Soc. Ind. Appl. Math."},{"key":"130_CR35","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1109\/TCSVT.2008.918761","volume":"18","author":"Z. Ni","year":"2008","unstructured":"Z. Ni, Y. Q. Shi, N. Ansari, W. Su, Q. Sun, X. Lin, Robust lossless image data hiding designed for semi-fragile image authentication. IEEE Trans. Circ. Syst. Video Technol.18:, 497\u2013509 (2008).","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"key":"130_CR36","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1145\/1597817.1597841","volume-title":"ACM Workshop on Multimedia and Security","author":"V. Sachnev","year":"2009","unstructured":"V. Sachnev, H. J. Kim, R. Zhang, in ACM Workshop on Multimedia and Security. Less detectable jpeg steganography method based on heuristic optimization and bch syndrome coding (ACMNew York, 2009), pp. 131\u2013140."},{"key":"130_CR37","first-page":"1","volume-title":"IEEE International Conference on Anti-Counterfeiting, Security and Identification","author":"Q. Lin","year":"2013","unstructured":"Q. Lin, in IEEE International Conference on Anti-Counterfeiting, Security and Identification. An error correction coding combined robust video watermarking algorithm for h.264 standard (IEEENew York, 2013), pp. 1\u20134."},{"key":"130_CR38","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.sigpro.2018.01.011","volume":"146","author":"Y. Zhang","year":"2018","unstructured":"Y. Zhang, C. Qin, W. Zhang, F. Liu, X. Luo, On the fault-tolerant performance for a class of robust image steganography. Signal Process.146:, 99\u2013111 (2018).","journal-title":"Signal Process."},{"key":"130_CR39","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1109\/TIFS.2010.2045842","volume":"5","author":"T. Pevny","year":"2010","unstructured":"T. Pevny, P. Bas, J. Fridrich, Steganalysis by subtractive pixel adjacency matrix. IEEE Trans. Inf. Forensic Secur.5:, 215\u2013224 (2010).","journal-title":"IEEE Trans. Inf. Forensic Secur."},{"key":"130_CR40","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1145\/3082031.3083245","volume-title":"ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec)","author":"P. Wang","year":"2017","unstructured":"P. Wang, Y. Cao, X. Zhao, M. Zhu, in ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec). A steganalytic algorithm to detect dct-based data hiding methods for h.264\/avc videos (ACMNew York, 2017), pp. 123\u2013133."},{"key":"130_CR41","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1109\/TIFS.2011.2175919","volume":"7","author":"J. Kodovsky","year":"2012","unstructured":"J. Kodovsky, J. Fridrich, V. Holub, Ensemble classifiers for steganalysis of digital media. IEEE Trans. Inf. Forensic Secur.7:, 432\u2013444 (2012).","journal-title":"IEEE Trans. Inf. Forensic Secur."},{"key":"130_CR42","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/978-3-642-24178-9_14","volume-title":"International Workshop on Information Hiding","author":"Y. Cao","year":"2011","unstructured":"Y. Cao, X. Zhao, D. Feng, R. Sheng, in International Workshop on Information Hiding. Video steganography with perturbed motion estimation (SpringerNew York, 2011), pp. 193\u2013207."}],"container-title":["EURASIP Journal on Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13635-022-00130-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13635-022-00130-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13635-022-00130-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,20]],"date-time":"2022-06-20T10:13:19Z","timestamp":1655719999000},"score":1,"resource":{"primary":{"URL":"https:\/\/jis-eurasipjournals.springeropen.com\/articles\/10.1186\/s13635-022-00130-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,20]]},"references-count":42,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["130"],"URL":"https:\/\/doi.org\/10.1186\/s13635-022-00130-z","relation":{},"ISSN":["2510-523X"],"issn-type":[{"value":"2510-523X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,6,20]]},"assertion":[{"value":"24 November 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 April 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 June 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"4"}}