{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T02:26:12Z","timestamp":1763346372140,"version":"3.45.0"},"reference-count":44,"publisher":"Tech Science Press","issue":"3","license":[{"start":{"date-parts":[[2025,10,26]],"date-time":"2025-10-26T00:00:00Z","timestamp":1761436800000},"content-version":"vor","delay-in-days":298,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.068429","type":"journal-article","created":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T07:47:36Z","timestamp":1756280856000},"page":"4995-5013","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":0,"title":["Lightweight Multi-Layered Encryption and Steganography Model for Protecting Secret Messages in MPEG Video Frames"],"prefix":"10.32604","volume":"85","author":[{"given":"Sara H.","family":"Elsayed","sequence":"first","affiliation":[]},{"given":"Rodaina","family":"Abdelsalam","sequence":"additional","affiliation":[]},{"given":"Mahmoud A. Ismail","family":"Shoman","sequence":"additional","affiliation":[]},{"given":"Raed","family":"Alotaibi","sequence":"additional","affiliation":[]},{"given":"Omar","family":"Reyad","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"63027","DOI":"10.1109\/ACCESS.2023.3287858","article-title":"Multimedia security using encryption: a survey","volume":"11","author":"Hosny","year":"2023","journal-title":"IEEE Access"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"3581","DOI":"10.1007\/s13369-020-05196-w","article-title":"Secure CT-image encryption for COVID-19 infections using HBBS-based multiple keystreams","volume":"46","author":"Reyad","year":"2021","journal-title":"Arab J Sci Eng"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"491","DOI":"10.1016\/j.aej.2023.03.072","article-title":"Intrusion detection model using optimized quantum neural network and elliptical curve cryptography for data security","volume":"71","author":"Kadry","year":"2023","journal-title":"Alex Eng J"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"276","DOI":"10.1080\/19361610.2022.2157193","article-title":"Enhancing multimedia security using shortest weight first algorithm and symmetric cryptography","volume":"19","author":"Mehta","year":"2024","journal-title":"J Appl Secur Res"},{"key":"ref5","first-page":"211","article-title":"Medical image privacy enhancement using key extension of advanced encryption standard","volume":"9","author":"Reyad","year":"2024","journal-title":"Sohag J Sci"},{"key":"ref6","first-page":"3591","article-title":"Survey on video security: examining threats, challenges, and future trends","volume":"80","author":"Asghar","year":"2024","journal-title":"Comput Mater Contin"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"76","DOI":"10.3390\/technologies11030076","article-title":"Smartphone security and privacy: a Survey on apts, sensor-based attacks, side-channel attacks, google play attacks, and defenses","volume":"11","author":"Muhammed","year":"2023","journal-title":"Technologies"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"6","DOI":"10.69882\/adba.chf.2024072","article-title":"A novel chaos-based encryption technique with parallel processing using CUDA for mobile powerful GPU control center","volume":"1","author":"K\u0131ran","year":"2024","journal-title":"Chaos Fractals"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"188","DOI":"10.51537\/chaos.1348302","article-title":"Anomaly detection in cyber security with graph-based LSTM in log analysis","volume":"5","author":"Alaca","year":"2023","journal-title":"Chaos Theory Appl"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"S68","DOI":"10.1016\/j.diin.2014.03.009","article-title":"Forensic analysis of video file formats","volume":"11","author":"Thomas","year":"2014","journal-title":"Digit Investig"},{"key":"ref11","series-title":"Proceedings of the International Conference on Advances in Computing, Communication and Control; 2009 Jan 23\u201324","first-page":"289","article-title":"Comparison of MPEG video encryption algorithms","author":"Potdar","year":"2009"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"5831","DOI":"10.1007\/s10462-021-09968-0","article-title":"A survey on information hiding using video steganography","volume":"54","author":"Dalal","year":"2021","journal-title":"Artif Intell Rev"},{"key":"ref13","first-page":"351","article-title":"A combination of Hill cipher and RC4 methods for text security","volume":"22","author":"Azanuddin","year":"2024","journal-title":"Telecommun Comput Electron Control"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"20220552","DOI":"10.1515\/eng-2022-0552","article-title":"An image encryption method based on modified elliptic curve Diffie-Hellman key exchange protocol and Hill Cipher","volume":"14","author":"Hadi","year":"2024","journal-title":"Open Eng"},{"key":"ref15","first-page":"3641927","article-title":"Enhancing image cryptography performance with block left rotation operations","volume":"1","author":"Al-Batah","year":"2024","journal-title":"Appl Comput Intell Soft Comput"},{"key":"ref16","first-page":"295","article-title":"Encryption techniques and algorithms to combat cybersecurity attacks: a review","volume":"11","author":"Wadho","year":"2023","journal-title":"Trans Comput Sci"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"253","DOI":"10.37394\/23205.2023.22.29","article-title":"Hybrid of least significant bits and most significant bits for improving security and quality of digital image steganography","volume":"22","author":"Abubakar","year":"2023","journal-title":"WSEAS Trans Comput"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"21948","DOI":"10.1109\/ACCESS.2019.2898838","article-title":"The pixogram: addressing high payload demands for video steganography","volume":"7","author":"Rabie","year":"2019","journal-title":"IEEE Access"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1016\/j.eij.2022.06.003","article-title":"A new method for hiding a secret file in several WAV files depends on circular secret key","volume":"23","author":"Suhail","year":"2022","journal-title":"Egypt Inform J"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"180","DOI":"10.3390\/computers13070180","article-title":"Stego-STFAN: a novel neural network for video steganography","volume":"13","author":"Vergara","year":"2024","journal-title":"Computers"},{"key":"ref21","first-page":"23203\u20132021","article-title":"Securing data: a study on different transform domain techniques","volume":"16","author":"Dutta","year":"2021","journal-title":"WSEAS Trans Syst Control"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"83","DOI":"10.30684\/etj.v38i1A.266","article-title":"Improvement of image steganography using discrete wavelet transform","volume":"38","author":"Oudah","year":"2022","journal-title":"Eng Technol J"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"4483","DOI":"10.1016\/j.jksuci.2020.10.008","article-title":"Development and analysis of IWT-SVD and DWT-SVD steganography using fractal cover","volume":"34","author":"Durafe","year":"2022","journal-title":"J King Saud Univ\u2014Comput Inf Sci"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"1317","DOI":"10.12928\/telkomnika.v20i6.23596","article-title":"A coverless image steganography based on robust image wavelet hashing","volume":"20","author":"Karim","year":"2022","journal-title":"TELKOMNIKA (Telecommun Comput Electron Control)"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"82303","DOI":"10.1007\/s11042-024-18613-1","article-title":"Selective encryption of video frames using the one-time random key algorithm and permutation techniques for secure transmission over the content delivery network","volume":"83","author":"Murari","year":"2024","journal-title":"Multimed Tools Appl"},{"article-title":"From covert hiding to visual editing: robust generative video steganography","series-title":"Proceedings of the MM\u201924: The 32nd ACM International Conference on Multimedia; 2024 Oct 28\u2013Nov 1","author":"Mao","key":"ref26"},{"key":"ref27","first-page":"89","article-title":"Video steganography using least significant bit in frequency domain","volume":"16","author":"Ibrahim","year":"2016","journal-title":"Int J Intell Comput Inf Sci"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"993","DOI":"10.1007\/s12530-022-09482-w","article-title":"EGPIECLMAC: efficient grayscale privacy image encryption with chaos logistics maps and Arnold Cat","volume":"14","author":"Zareai","year":"2023","journal-title":"Evol Syst"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"1535","DOI":"10.1049\/iet-ipr.2019.0051","article-title":"Chaotic image encryption algorithm using frequency-domain DNA encoding","volume":"13","author":"Guan","year":"2019","journal-title":"IET Image Process"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"348","DOI":"10.1016\/j.ijleo.2018.01.064","article-title":"A color image encryption technique using exclusive-OR with DNA complementary rules based on chaos theory and SHA-2","volume":"159","author":"Ur Rehman","year":"2018","journal-title":"Optik"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1016\/j.optlaseng.2016.10.019","article-title":"Color image encryption based on hybrid hyper-chaotic system and cellular automata","volume":"90","author":"Niyat","year":"2017","journal-title":"Opt Lasers Eng"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"1591","DOI":"10.1007\/s12652-021-03382-8","article-title":"Efficient opto MVC\/HEVC cybersecurity framework based on arnold map and discrete cosine transform","volume":"14","author":"Faragallah","year":"2023","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"128548","DOI":"10.1109\/ACCESS.2020.3008644","article-title":"A novel hybrid cryptosystem for secure streaming of high efficiency H.265 compressed videos in IoT multimedia applications","volume":"8","author":"Alarifi","year":"2020","journal-title":"IEEE Access"},{"key":"ref34","first-page":"1","article-title":"New video encryption schemes based on chaotic maps","volume":"14","author":"Salama","year":"2019","journal-title":"Let Image Process"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"106750","DOI":"10.1109\/ACCESS.2022.3211657","article-title":"Privacy protection in surveillance videos using block scrambling-based encryption and DCNN-based face detection","volume":"10","author":"Hosny","year":"2022","journal-title":"IEEE Access"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"373","DOI":"10.3390\/a15100373","article-title":"Computational complexity of modified blowfish cryptographic algorithm on video data","volume":"15","author":"Adeniyi","year":"2022","journal-title":"Algorithms"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"16395","DOI":"10.1007\/s11042-023-16223-x","article-title":"A secure system for digital video applications using an intelligent crypto model","volume":"83","author":"Kumar","year":"2024","journal-title":"Multimed Tools Appl"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"460","DOI":"10.30526\/37.2.3907","article-title":"A modern encryption approach to improve video security as an advanced standard adopted","volume":"37","author":"Al-Khafaji","year":"2024","journal-title":"Ibn AL-Haitham J Pure Appl Sci"},{"key":"ref39","first-page":"50","article-title":"Stegovideo: an efficient mechanism for securing video data using steganography and cryptography techniques","volume":"42","author":"Ojo","year":"2024","journal-title":"J Sci Technol"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"69388","DOI":"10.1109\/ACCESS.2022.3187317","article-title":"Rotation left digits to enhance the security level of message blocks cryptography","volume":"10","author":"Abu-Faraj","year":"2022","journal-title":"IEEE Access"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"395","DOI":"10.18576\/amis\/180214","article-title":"The cryptography of secret messages using block rotation left operation","volume":"18","author":"Alzyoud","year":"2024","journal-title":"Appl Math Inf Sci"},{"key":"ref42","doi-asserted-by":"crossref","first-page":"1693","DOI":"10.1007\/s11042-023-15593-6","article-title":"A chaos-based novel approach to video encryption using dynamic S-box","volume":"83","author":"Dhingra","year":"2024","journal-title":"Multimed Tools Appl"},{"key":"ref43","article-title":"A colour video encryption scheme based on chaotic maps","volume":"39","author":"Jaafar","year":"2024","journal-title":"Taiz Univ Res J"},{"key":"ref44","unstructured":"Hamdy S. Lightweight-multi-layered-research [Internet]. [cited 2025 Jul 1]. Available from: https:\/\/github.com\/shamdy1993\/Lightweight-Multi-Layered-Research."}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-85-3\/TSP_CMC_68429\/TSP_CMC_68429.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T02:22:47Z","timestamp":1763346167000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v85n3\/64181"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":44,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.068429","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2025-05-28","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-07-30","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-10-23","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}