{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,4]],"date-time":"2024-08-04T13:54:24Z","timestamp":1722779664194},"reference-count":36,"publisher":"Walter de Gruyter GmbH","issue":"1","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,2,21]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>Steganography is a technique that embeds secret information in a suitable cover file such as text, image, audio, and video in such a manner that secret information remains invisible to the outside world. The study of the literature relevant to video steganography reveals that a tradeoff exists in attaining the acceptable values of various evaluation parameters such as a higher capacity usually results in lesser robustness or imperceptibility. In this article, we propose a technique that achieves high capacity along with required robustness. The embedding capacity is increased using singular value decomposition compression. To achieve the desired robustness, we constrain the embedding of the secret message in the region of interest in the cover video file. In this manner, we also succeed in maintaining the required imperceptibility. We prefer Haar-based lifting scheme in the wavelet domain for embedding the information because of its intrinsic benefits. We have implemented our suggested technique using MATLAB. The analysis of results on the prespecified parameters of the steganography justifies the effectiveness of the proposed technique.<\/jats:p>","DOI":"10.1515\/comp-2020-0229","type":"journal-article","created":{"date-parts":[[2022,2,21]],"date-time":"2022-02-21T20:39:14Z","timestamp":1645475954000},"page":"1-16","source":"Crossref","is-referenced-by-count":8,"title":["An ROI-based robust video steganography technique using SVD in wavelet domain"],"prefix":"10.1515","volume":"12","author":[{"given":"Urmila","family":"Pilania","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Manav Rachna University , Faridabad-121004 , Haryana , India"}]},{"given":"Rohit","family":"Tanwar","sequence":"additional","affiliation":[{"name":"Department of Systemics, School of Computer Science, University of Petroleum & Energy Studies , Dehradun-248007 , Uttrakhand , India"}]},{"given":"Prinima","family":"Gupta","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Manav Rachna University , Faridabad-121004 , Haryana , India"}]}],"member":"374","published-online":{"date-parts":[[2022,2,21]]},"reference":[{"key":"2022081707553230446_j_comp-2020-0229_ref_001","unstructured":"A. Kala and K. Thaiyalnayaki, \u201cRobust lossless image watermarking in integer wavelet domain using SVD,\u201d Int. J. Computer Sci. Eng., vol. 2, pp. 30\u201335, 2013."},{"key":"2022081707553230446_j_comp-2020-0229_ref_002","unstructured":"K. Madhavi, D. Kumar, and S. Mahitha, \u201cA robust and efficient steganography using skin tone as biometric for real time images,\u201d Int. Res. J. Eng. Technol. (IRJET), vol. 5, pp. 3289\u20133292, 2018."},{"key":"2022081707553230446_j_comp-2020-0229_ref_003","doi-asserted-by":"crossref","unstructured":"S. Sharma and D. Somwanshi, \u201cA. DWT, based attack resistant video steganography,\u201d Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies, New York, NY, United States: Association for Computing Machinery, 2016, pp. 1\u20135.","DOI":"10.1145\/2905055.2905176"},{"key":"2022081707553230446_j_comp-2020-0229_ref_004","doi-asserted-by":"crossref","unstructured":"S. Hemalatha, and A. D. Shamathmika, MP4 video steganography in wavelet domain, IEEE, 2017, pp. 1229\u20131235.","DOI":"10.1109\/ICACCI.2017.8126010"},{"key":"2022081707553230446_j_comp-2020-0229_ref_005","doi-asserted-by":"crossref","unstructured":"D. R. I. M. Setiadi, \u201cImproved payload capacity in LSB image steganography uses dilated hybrid edge detection,\u201d J. King Saud. Univ.-Computer Inf. Sci., vol. 34, pp. 1\u201311, 2019.","DOI":"10.1016\/j.jksuci.2019.12.007"},{"key":"2022081707553230446_j_comp-2020-0229_ref_006","doi-asserted-by":"crossref","unstructured":"S. Bhatnagar, S. Kumar, and A. Gupta, \u201cAn approach of efficient and resistive digital watermarking using SVD,\u201d International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2014, pp. 2470\u20132475.","DOI":"10.1109\/ICACCI.2014.6968275"},{"key":"2022081707553230446_j_comp-2020-0229_ref_007","doi-asserted-by":"crossref","unstructured":"A. Bhardwaj, D. Verma, and V. Verma, \u201cA robust watermarking scheme using lifting wavelet transform and singular value decomposition,\u201d AIP Conference Proceedings, Vol. 1802, No. 1, AIP Publishing LLC, 2017, p. 020002.","DOI":"10.1063\/1.4973252"},{"key":"2022081707553230446_j_comp-2020-0229_ref_008","doi-asserted-by":"crossref","unstructured":"S. Hemalatha, A. Renuka, D. Acharya, and P. Kamath, \u201cA secure image steganography technique using Integer Wavelet Transform,\u201d World Congr. Inf. Commun. Technol., vol. 1, pp. 755\u2013758, 2012.","DOI":"10.1109\/WICT.2012.6409175"},{"key":"2022081707553230446_j_comp-2020-0229_ref_009","doi-asserted-by":"crossref","unstructured":"A. Sharp, Y. Yang, D. Peng, and H. Sharif, \u201cA video steganography attack using multi-dimensional discrete spring transform,\u201d IEEE International conference on Signal and Image Processing Applications, 2013, pp. 182\u2013186.","DOI":"10.1109\/ICSIPA.2013.6708000"},{"key":"2022081707553230446_j_comp-2020-0229_ref_010","doi-asserted-by":"crossref","unstructured":"S. Kejgir and M. Kokare, \u201cLifting wavelet transform with singular value decomposition for robust digital image watermarking,\u201d Int. J. Computer Appl., vol. 39, pp. 10\u201318, 2012.","DOI":"10.5120\/5078-7193"},{"key":"2022081707553230446_j_comp-2020-0229_ref_011","doi-asserted-by":"crossref","unstructured":"P. Patel, and Y. Patel, \u201cSecure and authentic DCT image steganography through DWT-SVD Based Digital Watermarking with RSA Encryption,\u201d Fifth International Conference on Communication Systems and Network Technologies, 2015, pp. 736\u2013739.","DOI":"10.1109\/CSNT.2015.193"},{"key":"2022081707553230446_j_comp-2020-0229_ref_012","unstructured":"R. Harshitha and S. Vidya, \u201cRobust and high limit watermarking using DWT-IWT,\u201d Int. J. Advance Sci. Resour. Manag., vol. 2, pp. 18\u201321, 2017."},{"key":"2022081707553230446_j_comp-2020-0229_ref_013","doi-asserted-by":"crossref","unstructured":"A. Sharp, Q. Qi, Y. Ang, D. Peng, and H. Sharif, \u201cA novel active warden steganographic attack for next-generation steganography,\u201d 9th International Wireless Communications and Mobile Computing Conference (IWCMC), 2013, pp. 1138\u20131143.","DOI":"10.1109\/IWCMC.2013.6583717"},{"key":"2022081707553230446_j_comp-2020-0229_ref_014","doi-asserted-by":"crossref","unstructured":"A. Hussain, \u201cMulti-level Steganography System Using Wavelet Transform,\u201d J. Eng. Sustain. Dev., vol. 2018, pp. 50\u201361, 2018.","DOI":"10.31272\/jeasd.2018.3.5"},{"key":"2022081707553230446_j_comp-2020-0229_ref_015","doi-asserted-by":"crossref","unstructured":"K. Vikram, and S. Padmavathi, \u201cFacial parts detection using Viola Jones algorithm,\u201d 2017 4th International Conference on Advanced Computing and Communication Systems (ICACCS), 2017, pp. 1\u20134.","DOI":"10.1109\/ICACCS.2017.8014636"},{"key":"2022081707553230446_j_comp-2020-0229_ref_016","doi-asserted-by":"crossref","unstructured":"E. Ghasemi, J. Shanbehzadeh, and B. ZahirAzami, \u201cA steganographic method based on Integer Wavelet Transform and Genetic Algorithm,\u201d 2011 International Conference on Communications and Signal Processing, 2011, pp. 42\u201345.","DOI":"10.1109\/ICCSP.2011.5739395"},{"key":"2022081707553230446_j_comp-2020-0229_ref_017","doi-asserted-by":"crossref","unstructured":"M. Kawulok, J. Kawulok, and J. Nalepa, \u201cSpatial-based skin detection using discriminative skin-presence features,\u201d Pattern Recognit. Lett., vol. 41, pp. 3\u201313, 2014.","DOI":"10.1016\/j.patrec.2013.08.028"},{"key":"2022081707553230446_j_comp-2020-0229_ref_018","doi-asserted-by":"crossref","unstructured":"A. Cheddad, J. Condell, K. Curran, and P. Mc Kevitt, \u201cA skin tone detection algorithm for an adaptive approach to steganography,\u201d Signal. Process., vol. 89, pp. 2465\u20132478, 2009.","DOI":"10.1016\/j.sigpro.2009.04.022"},{"key":"2022081707553230446_j_comp-2020-0229_ref_019","doi-asserted-by":"crossref","unstructured":"J. Viola and J. Paul Michael, \u201cRobust real-time face detection,\u201d Int. J. Computer Vis., vol. 57, no. 2. pp. 137\u2013154, 2004.","DOI":"10.1023\/B:VISI.0000013087.49260.fb"},{"key":"2022081707553230446_j_comp-2020-0229_ref_020","doi-asserted-by":"crossref","unstructured":"M. Wall, A. Rechtsteiner, and L. Rocha, \u201cSingular value decomposition and principal component analysis,\u201d A practical approach to microarray data analysis, Boston, MA, Springer, 2003, pp. 91\u2013109.","DOI":"10.1007\/0-306-47815-3_5"},{"key":"2022081707553230446_j_comp-2020-0229_ref_021","doi-asserted-by":"crossref","unstructured":"S. Acharya, H. Kabra, P. Kasambe, and S. Rathod, \u201cPerformance evaluation of an integer wavelet transform for FPGA implementation,\u201d International Conference on Nascent Technologies in the Engineering Field (ICNTE), 2015, pp. 1\u20135.","DOI":"10.1109\/ICNTE.2015.7029945"},{"key":"2022081707553230446_j_comp-2020-0229_ref_022","doi-asserted-by":"crossref","unstructured":"K. Raja, K. Venugopal, and L. Patnaik, \u201cHigh capacity lossless secure image steganography using wavelets,\u201d International Conference on Advanced Computing and Communications, 2006, pp. 230\u2013235.","DOI":"10.1109\/ADCOM.2006.4289889"},{"key":"2022081707553230446_j_comp-2020-0229_ref_023","doi-asserted-by":"crossref","unstructured":"W. Jue, Z. Min-qing, and S. Juan-li, \u201cVideo steganography using motion vector components,\u201d IEEE 3rd International Conference on Communication Software and Networks, 2011, pp. 500\u2013503.","DOI":"10.1109\/ICCSN.2011.6013642"},{"key":"2022081707553230446_j_comp-2020-0229_ref_024","doi-asserted-by":"crossref","unstructured":"A. K. Sahu, G. Swain, and E. S. Babu, \u201cDigital image steganography using bit flipping,\u201d Cybern. Inf. Technol., vol. 18, pp. 69\u201380, 2018.","DOI":"10.2478\/cait-2018-0006"},{"key":"2022081707553230446_j_comp-2020-0229_ref_025","doi-asserted-by":"crossref","unstructured":"A. A. Hanafy, G. I. Salama, and Y. Z. Mohasseb, \u201cA secure covert communication model based on video steganography,\u201d MILCOM 2008\u20132008 IEEE Military Communications Conference, 2008, pp. 1\u20136.","DOI":"10.1109\/MILCOM.2008.4753107"},{"key":"2022081707553230446_j_comp-2020-0229_ref_026","doi-asserted-by":"crossref","unstructured":"S. Khosla and P. Kaur, \u201cSecure data hiding technique using video steganography and watermarking,\u201d Int. J. Computer Appl., vol. 95, pp. 7\u201312, 2014.","DOI":"10.5120\/16708-6861"},{"key":"2022081707553230446_j_comp-2020-0229_ref_027","doi-asserted-by":"crossref","unstructured":"M. Grangetto, E. Magli, M. Martina, and G. Olmo, \u201cOptimization and implementation of the integer wavelet transform for image coding,\u201d IEEE Trans. image Process, vol. 11, pp. 596\u2013604, 2002.","DOI":"10.1109\/TIP.2002.1014991"},{"key":"2022081707553230446_j_comp-2020-0229_ref_028","doi-asserted-by":"crossref","unstructured":"M. Dalal and M. Juneja, \u201cA robust and imperceptible steganography technique for SD and HD videos,\u201d Multimed. Tools Appl., vol. 78, pp. 5769\u20135789, 2019.","DOI":"10.1007\/s11042-018-6093-3"},{"key":"2022081707553230446_j_comp-2020-0229_ref_029","doi-asserted-by":"crossref","unstructured":"R. J. Mstafa, K. Elleithy, and E. Abdelfattah, \u201cA robust and secure video steganography method in DWT-DCT domains based on multiple object tracking and ECC,\u201d IEEE Access, vol. 5, pp. 5354\u20135365, 2017.","DOI":"10.1109\/ACCESS.2017.2691581"},{"key":"2022081707553230446_j_comp-2020-0229_ref_030","doi-asserted-by":"crossref","unstructured":"P. K. Paramesh, N. Ranjitha, and S. Swetha, \u201cVideo Steganography using MATLAB,\u201d EAI Endorsed Trans. Cloud Syst., vol. 310, 2017, p. e3.","DOI":"10.4108\/eai.20-12-2017.153493"},{"key":"2022081707553230446_j_comp-2020-0229_ref_031","doi-asserted-by":"crossref","unstructured":"H. Shivaram, D. U. Acharya, and R. Adige, \u201cWavelet transform based steganography technique to hide audio signals in image,\u201d Proc. Computer Sci., vol. 47, pp. 272\u2013281, 2015.","DOI":"10.1016\/j.procs.2015.03.207"},{"key":"2022081707553230446_j_comp-2020-0229_ref_032","doi-asserted-by":"crossref","unstructured":"M. Sadek, A. Khalifa, and M. Mostafa, \u201cVideo steganography: a comprehensive review,\u201d Multimed. tools Appl., vol. 74, pp. 7063\u20137094, 2015.","DOI":"10.1007\/s11042-014-1952-z"},{"key":"2022081707553230446_j_comp-2020-0229_ref_033","doi-asserted-by":"crossref","unstructured":"V. Kumar, and D. Kumar, \u201cPerformance evaluation of DWT based image steganography,\u201d IEEE 2nd International Advance Computing Conference (IACC), 2010, pp. 223\u2013228.","DOI":"10.1109\/IADCC.2010.5423005"},{"key":"2022081707553230446_j_comp-2020-0229_ref_034","doi-asserted-by":"crossref","unstructured":"K. Ng, S. Liew, and F. Ernawan, \u201cAn improved RDWT-based image steganography scheme with qr decomposition and double entropy,\u201d IOP Conference Series: Materials Science and Engineering, 2020, 10.1088\/1757-899X\/769\/1\/012069.","DOI":"10.14569\/IJACSA.2020.0110327"},{"key":"2022081707553230446_j_comp-2020-0229_ref_035","unstructured":"S. Bhattacharyya and G. Sanyal, \u201cData hiding in images in discrete wavelet domain using PMM,\u201d Int. J. Electr. Computer Eng., pp. 359\u2013367, 2010."},{"key":"2022081707553230446_j_comp-2020-0229_ref_036","doi-asserted-by":"crossref","unstructured":"M. Barani, P. Ayubi, M. Valandar, and B. Irani, \u201cA blind video watermarking algorithm robust to lossy video compression attacks based on generalized Newton complex map and contourlet transform,\u201d Multimed. Tools Appl., vol. 79, pp. 2127\u20132159, 2020.","DOI":"10.1007\/s11042-019-08225-5"}],"container-title":["Open Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/comp-2020-0229\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/comp-2020-0229\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,17]],"date-time":"2022-08-17T07:58:59Z","timestamp":1660723139000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/comp-2020-0229\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,1]]},"references-count":36,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2022,3,16]]},"published-print":{"date-parts":[[2022,3,16]]}},"alternative-id":["10.1515\/comp-2020-0229"],"URL":"https:\/\/doi.org\/10.1515\/comp-2020-0229","relation":{},"ISSN":["2299-1093"],"issn-type":[{"value":"2299-1093","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,1]]}}}