{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:54:25Z","timestamp":1762005265876,"version":"3.40.5"},"reference-count":0,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,4,1]]},"abstract":"<p>Through the advent of digital information, information security has taken on a vital role. Use of the internet freely for contact has increased the attacks on users. Data protection is the present problem relating to privacy and security during storage and communication. This paper deals with a multilayered protected channel's proposal to transfer confidential data\/video through a channel. The hidden video is initially encrypted using the algorithm NOLSB. The created cipher video is hidden in a larger sized video file. In addition, this video file is encrypted using the (m, k) firm technique to optimize resource efficiency and bandwidth optimization. Video shares are then sent through all the network's channels to ensure security. This approach ensures that video files could be retrieved at the end receiver even though any shares were lost over the network, without the sender needing to resend the video file.<\/p>","DOI":"10.4018\/ijsppc.2020040103","type":"journal-article","created":{"date-parts":[[2020,7,28]],"date-time":"2020-07-28T12:39:44Z","timestamp":1595939984000},"page":"30-43","source":"Crossref","is-referenced-by-count":1,"title":["New Hybrid Proposed Solution for Video Steganography Based on Clustering Algorithm"],"prefix":"10.4018","volume":"12","author":[{"given":"Ahlem","family":"Fatnassi","sequence":"first","affiliation":[{"name":"ENSI, Manouba University, Tunisia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6171-2621","authenticated-orcid":true,"given":"Hamza","family":"Gharsellaoui","sequence":"additional","affiliation":[{"name":"Arab Open University, Riyadh, Saudi Arabia"}]},{"given":"Sadok","family":"Bouamama","sequence":"additional","affiliation":[{"name":"Higher Colleges of Technology, Dubai, UAE"}]}],"member":"2432","container-title":["International Journal of Security and Privacy in Pervasive Computing"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=259341","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T22:31:50Z","timestamp":1651876310000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJSPPC.2020040103"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2020,4,1]]},"references-count":0,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,4]]}},"URL":"https:\/\/doi.org\/10.4018\/ijsppc.2020040103","relation":{},"ISSN":["2643-7937","2643-7945"],"issn-type":[{"type":"print","value":"2643-7937"},{"type":"electronic","value":"2643-7945"}],"subject":[],"published":{"date-parts":[[2020,4,1]]}}}