{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,6]],"date-time":"2026-05-06T15:57:52Z","timestamp":1778083072779,"version":"3.51.4"},"reference-count":29,"publisher":"MDPI AG","issue":"9","license":[{"start":{"date-parts":[[2022,8,25]],"date-time":"2022-08-25T00:00:00Z","timestamp":1661385600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>In today\u2019s world of computers everyone is communicating their personal information through the web. So, the security of personal information is the main concern from the research point of view. Steganography can be used for the security purpose of personal information. Storing and forwarding of embedded personal information specifically in public places is gaining more attention day by day. In this research work, the Integer Wavelet Transform technique along with JPEG (Joint Photograph Expert Group) compression is proposed to overcome some of the issues associated with steganography techniques. Video cover files and JPEG compression improve concealing capacity because of their intrinsic properties. Integer Wavelet Transform is used to improve the imperceptibility and robustness of the proposed technique. The Imperceptibility of the proposed work is analyzed through evaluation parameters such as PSNR (Peak Signal to Noise Ratio), MSE (Mean Square Error), SSIM (Structure Similarity Metric), and CC (Correlation Coefficient). Robustness is validated through some image processing attacks. Complexity is calculated in terms of concealing and retrieval time along with the amount of secret information hidden.<\/jats:p>","DOI":"10.3390\/fi14090254","type":"journal-article","created":{"date-parts":[[2022,8,25]],"date-time":"2022-08-25T21:28:12Z","timestamp":1661462892000},"page":"254","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Framework for Video Steganography Using Integer Wavelet Transform and JPEG Compression"],"prefix":"10.3390","volume":"14","author":[{"given":"Urmila","family":"Pilania","sequence":"first","affiliation":[{"name":"Department of CST, Manav Rachna University, Faridabad 121004, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9087-6019","authenticated-orcid":false,"given":"Rohit","family":"Tanwar","sequence":"additional","affiliation":[{"name":"School of Computer Science, University of Petroleum and Energy Studies, Dehradun 248007, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6421-0053","authenticated-orcid":false,"given":"Mazdak","family":"Zamani","sequence":"additional","affiliation":[{"name":"Department of Computer Science, New York University, 251 Mercer, New York, NY 10012, USA"}]},{"given":"Azizah Abdul","family":"Manaf","sequence":"additional","affiliation":[{"name":"Department of Internet Engineering and Computer Science, LKCFES, Universiti Tuanku Abdul Rahman, Kampar 31900, Malaysia"}]}],"member":"1968","published-online":{"date-parts":[[2022,8,25]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"1062","DOI":"10.1109\/5.771065","article-title":"Information hiding\u2014A survey","volume":"87","author":"Petitcolas","year":"1999","journal-title":"Proceeding IEEE"},{"key":"ref_2","first-page":"382","article-title":"UN-Substituted Video Steganography","volume":"14","author":"Maria","year":"2020","journal-title":"KSII Trans. Internet Inf. Syst. (TIIS)"},{"key":"ref_3","first-page":"4780","article-title":"A comprehensive review on steganographic techniques and implementation","volume":"13","author":"Jeevitha","year":"2018","journal-title":"ARPN J. Eng. Appl. Sci."},{"key":"ref_4","first-page":"53","article-title":"Steganography-time to time: A review","volume":"5","author":"Amirtharajan","year":"2013","journal-title":"Res. J. Inf. Technol."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"7743","DOI":"10.1109\/TII.2021.3053595","article-title":"A novel image steganography method for industrial internet of things security","volume":"17","author":"Hassaballah","year":"2021","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Ghazal, T., Hasan, M.K., Alshurideh, M.T., Alzoubi, H.M., Ahmad, M., Akbar, S.S., and Akour, I.A. (2021). IoT for smart cities: Machine learning approaches in smart healthcare\u2014A review. Future Internet, 13.","DOI":"10.3390\/fi13080218"},{"key":"ref_7","unstructured":"Osman, B. (2021, March 13). Capacity Performance of Steganography Method in Text-Based Domain Multi-Binary Scheme Representation on Text Steganography Technique View Project Spatial Multiplexing and Multi-Mode Fiber Communication View Project. Available online: https:\/\/www.researchgate.net\/publication\/282279208."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Shirali-Shahreza, M.H., and Shirali-Shahreza, M. (2006, January 10\u201312). A new approach to Persian\/Arabic text steganography. Proceedings of the 5th IEEE\/ACIS International Conference Computer Information Science, ICIS 2006. Conjunction with 1st IEEE\/ACIS, International Workshop Component-Based Software Engineering, Software Architecture Reuse, COMSAR 2006, Honolulu, HI, USA.","DOI":"10.1109\/ICIS-COMSAR.2006.2"},{"key":"ref_9","first-page":"65","article-title":"Developing a Secure Image Steganographic System Using TPVD Adaptive LSB Matching Revisited Algorithm for Maximizing the Embedding Rate","volume":"21","author":"Kumar","year":"2012","journal-title":"Inf. Secur. J."},{"key":"ref_10","first-page":"318","article-title":"Bio-Authentication Based Secure Transmission System using Steganography","volume":"8","author":"Zehra","year":"2010","journal-title":"arXiv"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"581","DOI":"10.1007\/978-981-10-3773-3_56","article-title":"Audio steganography techniques: A survey","volume":"554","author":"Mishra","year":"2018","journal-title":"Adv. Intell. Syst. Comput."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Muyco, S.D., and Hernandez, A.A. (2019, January 10\u201312). A modified hash based least significant bits algorithm for steganography. Proceedings of the 2019 4th International Conference on Big Data and Computing, Guangzhou, China.","DOI":"10.1145\/3335484.3335514"},{"key":"ref_13","first-page":"833","article-title":"A dynamic RGB intensity based steganography scheme","volume":"43","author":"Kaur","year":"2010","journal-title":"World Acad. Sci. Eng. Technol."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"107809","DOI":"10.1016\/j.compeleceng.2022.107809","article-title":"An adaptive image steganography method based on integer wavelet transform using genetic algorithm","volume":"99","author":"Sabeti","year":"2022","journal-title":"Comput. Electr. Eng."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1515\/comp-2020-0229","article-title":"An ROI-based robust video steganography technique using SVD in wavelet domain","volume":"12","author":"Pilania","year":"2022","journal-title":"Open Comput. Sci."},{"key":"ref_16","first-page":"499","article-title":"Image Steganography Technique Based on Integer Wavelet Transform Using Most Significant Bit Categories","volume":"15","author":"Yassin","year":"2022","journal-title":"Int. J. Intell. Eng. Syst."},{"key":"ref_17","first-page":"144","article-title":"Audio Steganography\u2014A Review","volume":"6","author":"Chakraborty","year":"2019","journal-title":"Int. J. Trend Res. Dev."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Yadav, S.K., and Bhogal, R.K. (2018, January 20\u201321). A video steganography in spatial, discrete wavelet transform and integer wavelet domain. Proceedings of the 2nd International Conference Intelligence Circuits System ICICS 2018, Phagwara, India.","DOI":"10.1109\/ICICS.2018.00060"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Jambhekar, N.D., Dhawale, C.A., and Hegadi, R. (2014, January 14\u201316). Performance analysis of digital image steganographic algorithm. Proceedings of the 2014 International Conference on Information and Communication Technology for Competitive Strategies, Jaipur, India.","DOI":"10.1145\/2677855.2677937"},{"key":"ref_20","unstructured":"Prabakaran, G. (2015). A High Capacity Video Steganography Based on Integer Wavelet Transform. J. Comput. Appl., 5."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"10825","DOI":"10.1007\/s11042-019-08476-2","article-title":"A secure multimedia steganography scheme using hybrid transform and support vector machine for cloud-based storage","volume":"79","author":"Sukumar","year":"2020","journal-title":"Multimed. Tools Appl."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"9971","DOI":"10.1007\/s11042-018-6584-2","article-title":"An integer wavelet transform image steganography method based on 3D sine chaotic map","volume":"78","author":"Valandar","year":"2019","journal-title":"Multimed. Tools Appl."},{"key":"ref_23","first-page":"2277","article-title":"A Review on the Various Recent Steganography","volume":"2","author":"Singh","year":"2013","journal-title":"IJCSN Int. J. Comput. Sci. Netw."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"369","DOI":"10.36478\/jeasci.2020.369.372","article-title":"A Study of Text Steganography Methods","volume":"15","author":"Akbar","year":"2019","journal-title":"J. Eng. Appl. Sci."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Shirali-Shahreza, M., and Shirali-Shahreza, M.H. (2007, January 21\u201323). Text Steganography in SMS. Proceedings of the 2007 International Conference on Convergence Information Technology (ICCIT 2007), Gyeongbuk, Korea.","DOI":"10.1109\/ICCIT.2007.4420590"},{"key":"ref_26","first-page":"3505","article-title":"Performance evaluation measurement of image steganography techniques with analysis of LSB based on variation image formats","volume":"7","author":"Hashim","year":"2018","journal-title":"Int. J. Eng. Technol."},{"key":"ref_27","first-page":"113","article-title":"Image quality assessment\u2014Comparison of objective measures with results of the subjective test","volume":"2014","author":"Zaric","year":"2010","journal-title":"Proceeding Elmar Int. Symp. Electron."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/s40998-018-0109-x","article-title":"A Hybrid Domain Color Image Watermarking Based on DWT\u2013SVD","volume":"43","author":"Roy","year":"2019","journal-title":"Iran. J. Sci. Technol. Trans. Electron. Eng."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"14383","DOI":"10.1007\/s11042-020-10364-z","article-title":"A secure and robust video steganography scheme for covert communication in H. 264\/AVC","volume":"80","author":"Dalal","year":"2021","journal-title":"Multimed. Tools Appl."}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/14\/9\/254\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T00:15:26Z","timestamp":1760141726000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/14\/9\/254"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,25]]},"references-count":29,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2022,9]]}},"alternative-id":["fi14090254"],"URL":"https:\/\/doi.org\/10.3390\/fi14090254","relation":{},"ISSN":["1999-5903"],"issn-type":[{"value":"1999-5903","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,8,25]]}}}