Abstract
In the technological era, the primary source of information is in the form of digital data, which has to be secured while storing or transmitting during communication over an unsecured network. Different approaches are used to provide security to digital data, viz. text, audio, image, and video. This paper initially explains the security system such as cryptography, watermarking, and steganography and their comparative analysis based on different characteristics, viz. satisfaction level of objective, type of carrier object and secret information to be used, dependency of security level, and quality assessment parameters. This review article focuses more on steganography methods applied over video. The various methods implemented for video steganography in compressed domain, viz. inter-frame and intra-frame prediction, motion vector estimation, entropy coding (CAVLC and CABAC), and transformed and quantized coefficients of DCT, DST, and DWT, etc. and the methods based on spatial and transform domain for uncompressed video are briefly described. It is followed by the detailed analysis of related work done by various researchers in video steganography and the obtained experimental results. Furthermore, the confidential data hiding in compressed videos are explained using Moving Picture Expert Group (MPEG—1, MPEG—2, MPEG—4), Advanced Video Coding (AVC)/H.264, and High-Efficiency Video Coding (HEVC)/H.265 that includes both spatial and transform domain. This paper summarizes and explains the detailed investigations of numerous techniques of video steganography based on the comprehensive literature survey. The methods used to assess the performance of video steganography are analyzed based on the quality assessment parameters such as imperceptibility; measured by peak signal to noise ratio (PSNR), mean square error (MSE), and structural similarity (SSIM), robustness; measured by bit error rate (BER) and similarity (Sim), and embedding capacity; measured by hiding ratio. The overall review of past literature facilitates to have in-depth knowledge for upgrading the video steganography.
Similar content being viewed by others
References
Dasgupta, K., Mandal, J.K., Dutta, P.: Hash based least significant bit technique for video steganography (HLSB). Int. J. Secur. Privacy Trust Manag. (IJSPTM) (2012). https://doi.org/10.5121/ijsptm.2012.2201
Mstafa, R.J., Elleithy, K.M.: “A video steganography algorithm based on Kanade-Lucas-Tomasi tracking algorithm and error correcting codes. Multimed. Tools Appl. 75(17), 10311–10333 (2015). https://doi.org/10.1007/s11042-015-3060-0
Mstafa, R.J., Elleithy, K.M., Abdelfattah, E.: Video steganography techniques: taxonomy, challenges, and future directions. In: Applications and Technology Conference (LISAT), 2017 IEEE Long Island. pp. 1–6, IEEE 2017. https://doi.org/10.1109/LISAT.2017.8001965
Liu, S., Xu, D.: A robust steganography method for HEVC based on secret sharing. Cognitive Syst. Res. 59, 207–220 (2020). https://doi.org/10.1016/j.cogsys.2019.09.008
Sadek, M.M., Khalifa, A.S., Mostafa, G.M.: Video steganography: a comprehensive review. Multimed. Tools Appl. 74(17), 7063–7094 (2014). https://doi.org/10.1007/s11042-014-1952-z
Chang, F.-C., Hang, H.-M.: Layered access control schemes on watermarked scalable media. J. VLSI Signal Process. 49(3), 443–455 (2007). https://doi.org/10.1007/s11265-007-0095-0
Huang, H.-C., Chu, S.-C., Pan, J.-S., Huang, C.-Y., Liao, B.-Y.: Tabu search based multi-watermarks embedding algorithm with multiple description coding. Inf. Sci. J. 181(16), 3379–3396 (2011). https://doi.org/10.1016/j.ins.2011.04.007
Disha, K.S.: A review on video steganography techniques in spatial domain. In: Recent Developments in Control, Automation & Power Engineering (RDCAPE) 2017, pp. 366–371, IEEE 2017. https://doi.org/10.1109/RDCAPE.2017.8358298
Srinivasan, Y., Nutter, B., Mitra, S., Phillips, B., Ferris, D.: Secure transmission of medical records using high capacity steganography. In: 17th IEEE Symposium on Computer-Based Medical Systems, IEEE 2004. https://doi.org/10.1109/CBMS.2004.1311702
Balu, S., Babu, C.N.K., Amudha, K.: “Secure and efficient data transmission by video steganography in medical imaging system. Cluster Comput. (2018). https://doi.org/10.1007/s10586-018-2639-4
Mohsin, A.H., Zaidan, A.A., Zaidan, B.B., Ariffin, S.A.B., Albahri, O.S., Albahri, A.S., Alsalem, M.A., Mohammed, K.I., Hashim, M.: Real-time medical systems based on human biometric steganography: a systematic review. J. Med. Syst. 42, 245 (2018). https://doi.org/10.1007/s10916-018-1103-6
Hanafy, A.A., Salama, G.I., Mohasseb, Y.Z.: A secure covert communication model based on video steganography. In: 2008 IEEE military communications conference, pp. 1–6, IEEE 2008. https://doi.org/10.1109/MILCOM.2008.4753107
Kaur, M., Kaur, A.: Improved security mechanism of text in video by using steganographic technique. Int. J. Adv. Res. Comput. Sci. Manag. Stud. 2(10), 44–51 (2014)
Khan, N., Gorde, K.S.: Video steganography by using statistical key frame extraction method and LSB technique. Int J Innov Res Sci Eng Technol (2015). https://doi.org/10.15680/IJIRSET.2015.0410114]
Cetin, O., Ozcerit, A.T.: “A new steganography algorithm based on color histograms for data embedding into raw video streams. Comput. Secur. J. 28, 670–682 (2009). https://doi.org/10.1016/j.cose.2009.04.002
Cheddad, A., Condell, J., Curran, K., McKevitt, P.: Skin tone based Steganography in video files exploiting the YCbCr colour space. In: 2008 IEEE International Conference on Multimedia and Expo, pp. 905–908, IEEE 2008. https://doi.org/10.1109/ICME.2008.4607582
Tadiparthi, G.R., Sueyoshi, T.: A novel steganographic algorithm using animations as cover. Decision Support Syst. 45, 937–948 (2008). https://doi.org/10.1016/j.dss.2008.03.005
Cetin, O., Ozcerit, A.T.: A new steganography algorithm based on color histograms for data embedding into raw video streams. Comput. Secur. 28(7), 670–682 (2009). https://doi.org/10.1016/j.cose.2009.04.002
Cheddad, A., Condell, J., Curran, K., McKevitt, P.: A skin tone detection algorithm for an adaptive approach to steganography. Signal Process J 89(12), 2465–2478 (2009). https://doi.org/10.1016/j.sigpro.2009.04.022
Ramalingam, M.: Stego machine—video steganography using modified LSB algorithm. World Acad. Sci. Eng. Technol. Int. J. Inf. Commun. Eng. 5(2), 170–173 (2011)
Bhole, A.T., Patel, R.: Steganography over video file using random byte hiding and LSB technique. In: 2012 IEEE International Conference on Computational Intelligence and Computing Research, 2012. https://doi.org/10.1109/ICCIC.2012.6510230
Lou, D.-C., Hu, C.-H.: LSB steganographic method based on reversible histogram transformation function for resisting statistical steganalysis. Inf. Sci. 188, 346–358 (2012). https://doi.org/10.1016/j.ins.2011.06.003
Alavianmehr, M.A., Rezaei, M., Helfroush, M.S., Tashk, A.: A lossless data hiding scheme on video raw data robust against H.264/AVC compression. In: 2nd International e-Conference on Computer and Knowledge Engineering (ICCKE), pp. 194–198, IEEE 2012. https://doi.org/10.1109/ICCKE.2012.6395377
Zhang, R., Sachnev, A., Botnan, M.B., Kim, H.J., Heo, J.: An efficient embedder for BCH coding for steganography. IEEE Trans Inf Theory J 58(12), 7272–7279 (2012). https://doi.org/10.1109/TIT.2012.2217072
Moon, S.K., Raut, R.D.: Analysis of secured video steganography using computer forensics technique for enhance data security. In: IEEE Second International Conference on Image Information Processing (ICIIP-2013), pp. 660–665, IEEE 2013. https://doi.org/10.1109/ICIIP.2013.6707677
Kelash, H.M., Abdel Wahab, O.F., Elshakankiry, O.A., El-Sayed, H.S.: Hiding Data in Video Sequences using Steganography Algorithms. Int Conf ICT Converg ICTC (2013). https://doi.org/10.1109/ICTC.2013.6675372
Paul, R., Acharya, A.K., Yadav, V.K., Batham, S.: Hiding large amount of data using a new approach of video steganography. In: Confluence 2013: The Next Generation Information Technology Summit (4th International Conference), pp. 337–343, IEEE 2013. https://doi.org/10.1049/cp.2013.2338
Dasgupta, K., Mondal, J.K., Dutta, P.: Optimized video steganography using genetic algorithm (GA). Int. Conf. Comput. Intell. Model Tech Appl (CIMTA) 10, 131–137 (2013). https://doi.org/10.1016/j.protcy.2013.12.345
Khupse, S., Patil, N.N.: An adaptive steganography technique for videos using steganoflage. In: 2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT), pp. 811–815, IEEE 2014. https://doi.org/10.1109/ICICICT.2014.6781384
Ramalingam, M., Isa, N.A.M.: Fast retrieval of hidden data using enhanced hidden Markov model in video steganography. Appl. Soft Comput. 34, 744–757 (2015). https://doi.org/10.1016/j.asoc.2015.05.040
Sun, S.: A new information hiding method based on improved BPCS steganography. Adv. Multimed. 2015, 1–7 (2015). https://doi.org/10.1155/2015/698492. (Article ID 698492)
Sadek, M.M., Khalifa, A.S., Mostafa, G.M.: Robust video steganography algorithm using adaptive skin-tone detection. Multimed. Tools Appl. 76(2), 3065–3085 (2016). https://doi.org/10.1007/s11042-015-3170-8
Patel, K., Rora, K.K., Singh, K., Verma, S.: Lazy wavelet transform based steganography in video. In: 2013 International Conference on Communication Systems and Network Technologies, pp. 497–500, IEEE 2013. https://doi.org/10.1109/CSNT.2013.109
Mstafa, R.J., Elleithy, K.M.: A novel video steganography algorithm in the wavelet domain based on the KLT tracking algorithm and BCH Codes. In: Applications and Technology Conference (LISAT), IEEE 2015. https://doi.org/10.1109/LISAT.2015.7160192
Mstafa, R.J., Elleithy, K.M.: A novel video steganography algorithm in DCT domain based on hamming and BCH codes. In: 37th IEEE Sarnoff symposium, pp. 208–213, IEEE 2016. https://doi.org/10.1109/SARNOF.2016.7846757
Ramalingam, M., Isa, N.A.M.: A data-hiding technique using scene-change detection for video steganography. Comput. Electric. Eng. J. (2016). https://doi.org/10.1016/j.compeleceng.2015.10.005
Mstafa, R.J., Elleithy, K.M., Abdelfattah, E.: A robust and secure video steganography method in DWT-DCT domains based on multiple object tracking and ECC. In: IEEE access, IEEE—Institute of Electrical Electronics Engineers, Vol. 5, pp. 5354–5365, IEEE 2017. https://doi.org/10.1109/ACCESS.2017.2691581
Shukur, W.A., Abdullah, W.N., Qurban, L.K.: Information Hiding in DigitalVideo Using DCT, DWT and CvT. In: Journal of Physics: Conference Series, Volume 1003, Conference 1, 2018. https://doi.org/10.1088/1742-6596/1003/1/012035
Spaulding, J., Noda, H., Shirazi, M.N., Kawaguchi, E.: BPCS Steganography using EZW Lossy Compressed Images. Pattern Recognit. Lett. 23(13), 1579–1587 (2002). https://doi.org/10.1016/S0167-8655(02)00122-8
Noda, H., Furuta, T., Niimi, M., Kawaguchi, E.: Application of BPCS steganography to wavelet compressed video. In: 2004 International Conference on Image Processing (ICIP), pp. 2147–2150, IEEE 2004. https://doi.org/10.1109/ICIP.2004.1421520
Richardson, I.E.: The H.264 advanced video compression standard. Wiley, New York (2010).. (ISBN: 978-0-470-51692-8)
Chen, J., Koc, U.V., Liu, K.J.R.: Design of digital video coding systems: a complete compressed domain approach. In: Signal processing and communications. CRC Press, New York (2001)
Sze, V., Budagavi, M., Sullivan, G.J.: High efficiency video coding (HEVC). Springer, New York (2014). https://doi.org/10.1007/978-3-319-06895-4 . (ISBN: 978-3-319-06895-4 (eBook))
Akramullah, S.: Digital video concepts, methods, and metrics quality, compression, performance, and power trade-off analysis. The Optimization Guidebook for Multimedia and Telecommunications Professionals. Apress Open, (2014) (ISBN: 978-1-4302-6712-6)
Zhai, L., Wang, L., Ren, Y.: Combined and calibrated features for steganalysis of motion vector-based steganography in H.264/AVC. In: Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, Session: Video Steganalysis, pp. 135–146, June 2017. https://doi.org/10.1145/3082031.3083237
Yang, J., Li, S.: An efficient information hiding method based on motion vector space encoding for HEVC. Multimed. Tools Appl. 77(10), 11979–12001 (2017). https://doi.org/10.1007/s11042-017-4844-1
Mstafa, R.J., Elleithy, K.M.: An ECC/DCT—based robust video steganography algorithm for secure data communication. J. Cyber Secur. 53, 167–194 (2017). https://doi.org/10.13052/jcsm2245-1439.531
Liu, Y., Ju, L., Hu, M., Zhao, H., Jia, S., Jia, Z.: A new data hiding method for H.264 based on secret sharing. Neurocomputing 188, 113–119 (2016). https://doi.org/10.1016/j.neucom.2015.02.102
Hu, Y., Zhang, C., Su, Y.: Information hiding based on intra prediction modes for H.264/AVC. In: 2007 IEEE International Conference on Multimedia and Expo, pp. 1231–1234, IEEE 2007. https://doi.org/10.1109/ICME.2007.4284879
Liu, B., Liu, F., Yang, C., Sun, Y.: Secure steganography in compressed video bitstreams. In: The Third International Conference on Availability, Reliability and Security, pp. 1382–1387, IEEE 2008. https://doi.org/10.1109/ARES.2008.140
Ma, X., Li, Z., Lv, J., Wang, W.: Data hiding in H.264/AVC streams with limited intra-frame distortion drift. In: International Symposium on Computer Network and Multimedia Technology, IEEE 2009. https://doi.org/10.1109/CNMT.2009.5374766
Zhu, H., Wang, R., Xu, D., Zhou, X.: Information Hiding Algorithm for H.264 Based on the prediction difference of Intra_4×4. In: 3rd International Congress on Image and Signal Processing (CISP2010), pp. 487–490, IEEE 2010. https://doi.org/10.1109/CISP.2010.5646792
Shahid, Z., Chaumont, M., Puech, W.: Considering the reconstruction loop for data hiding of intra- and inter-frames of H264/AVC. Signal Image Video Process J (SIViP) 7(1), 75–93 (2011). https://doi.org/10.1007/s11760-011-0225-9
Chang, P.-C., Chung, K.-L., Chen, J.-J., Lin, C.-H., Lin, T.-J.: A DCT/DST-based error propagation-free data hiding algorithm for HEVC intra-coded frames. J. Visual Commun. Image Represent. 25(2), 239–253 (2014). https://doi.org/10.1016/j.jvcir.2013.10.007
Liu, Y., Li, Z., Ma, X., Liu, J.: A robust without intra-frame distortion drift data hiding algorithm based on H.264/AVC. Multimed. Tools Appl. 72(1), 613–636 (2014). https://doi.org/10.1007/s11042-013-1393-0
Liu, Y., Hu, M., Ma, X., Zhao, H.: A new robust data hiding method for H.264/AVC without intra-frame distortion drift. Neurocomputing 151, 1076–1085 (2015). https://doi.org/10.1016/j.neucom.2014.03.089
Kapotas, S.K., Skodras, A.N.: A new data hiding scheme for scene change detection in H.264 encoded video sequences. In: IEEE International Conference on Multimedia and Expo, pp. 277–280, IEEE 2008. https://doi.org/10.1109/ICME.2008.4607425
Xu, C., Ping, X., Zhang, T.: Steganography in compressed video stream. In: First International Conference on Innovative Computing, Information and Control (ICICIC'06), Vol. 1, IEEE 2006. https://doi.org/10.1109/ICICIC.2006.158
Pan, F., Xiang, L., Yang, X.-Y., Guo, Y.: Video steganography using motion vector and linear block codes. In: 2010 IEEE International Conference on Software Engineering and Service Sciences, pp. 592–595, IEEE 2010. https://doi.org/10.1109/ICSESS.2010.5552283
Li-Yi, Z., Wei-Dong, Z.: A novel steganography algorithm based on motion vector and matrix encoding. In: IEEE 3rd International Conference on Communication Software and Networks, pp. 406–409, IEEE 2011. https://doi.org/10.1109/ICCSN.2011.6013622
Jue, W., Min-qing, Z., Juan-li, S.: Video steganography using motion vector components. In: IEEE 3rd International Conference on Communication Software and Networks, pp. 500–503, IEEE 2011. https://doi.org/10.1109/ICCSN.2011.6013642
Song, G., Li, Z., Zhao, J., Hu, J., Tu, H.: A reversible video steganography algorithm for MVC based on motion vector. Multimed. Tools Appl. 74(11), 3759–3782 (2013). https://doi.org/10.1007/s11042-013-1798-9
Yao, Y., Zhang, W., Yu, N., Zhao, X.: Defining embedding distortion for motion vector-based video steganography. Multimed. Tools Appl. 74(24), 11163–11186 (2014). https://doi.org/10.1007/s11042-014-2223-8
Zhang, H., Cao, Y., Zhao, X.: Motion vector-based video steganography with preserved local optimality. Multimed. Tools Appl. 75(21), 13503–13519 (2015). https://doi.org/10.1007/s11042-015-2743-x
Niu, K., Yang, X., Zhang, Y.: A novel video reversible data hiding algorithm using motion vector for H.264/AVC. Tsinghua Sci. Technol. J. 22(5), 489–498 (2017). https://doi.org/10.23919/TST.2017.8030538
Fuad, M., Ernawan, F.: Video steganography based on DCT psychovisual and object motion. Bull. Electric. Eng. Inform. J. 9(3), 1015–1023 (2020). https://doi.org/10.11591/eei.v9i3.1859
Britanak, V., Rao, K.R.: Two-dimensional DCT/DST universal computational structure for block sizes. IEEE Trans. Signal Process. (2000). https://doi.org/10.1109/78.875483
Sullivan, G.J., Ohm, J.-R., Han, W.-J., Wiegand, T.: Overview of the High Efficiency Video Coding (HEVC) Standard. IEEE Trans. Circuits Syst. Video Technol. 22(12), 1649–1668 (2012). https://doi.org/10.1109/TCSVT.2012.2221191
Yadav, S.K., Bhogal, R.K.: A video steganography in spatial, discrete wavelet transform and integer wavelet domain. In: 2018 International Conference on Intelligent Circuits and Systems (ICICS), pp. 258–264. IEEE (2018). https://doi.org/10.1109/ICICS.2018.00060
Gonzalez, R.C., Woods, R.E.: Digital Image Processing, 3rd edn. Pearson Education, London (2008).. (ISBN: 0-13-168728-x 978-0-13-168728-8)
Huang, J., Shi, Y.Q.: Reliable information bit hiding. IEEE Trans. Circuits Syst. Video Technol. 12(10), 916–920 (2002). https://doi.org/10.1109/TCSVT.2002.804897
Yilmaz, A., Alatan, A.A.: Error concealment of video sequences by data hiding. In: 2003 International Conference on Image Processing, pp. 679–682, IEEE 2003. https://doi.org/10.1109/ICIP.2003.1246771
Meuel, P., Chaumont, M., Puech, W.: Data hiding in H.264 video for lossless reconstruction of region of interest. In: 2007 15th European Signal Processing Conference, pp. 2301–2305, IEEE 2007. https://doi.org/10.5281/ZENODO.40675
Li, G., Ito, Y., Yu, X., Nitta, N., Babaguchi, N.: Recoverable privacy protection for video content distribution. EURASIP J. Inf. Secur. 2009, 1–11 (2010). https://doi.org/10.1155/2009/293031
Li, Y., Chen, H.-X., Zhao, Y.: A new method of data hiding based on H.264 encoded video sequences. In: IEEE 10th International Conference on Signal Processing Proceedings, pp. 1833–1836, IEEE 2010. https://doi.org/10.1109/ICOSP.2010.5656918
Liu, Y.X., Li, Z., Ma, X., Liu, J.: A novel data hiding scheme for H.264/AVC video streams without intra-frame distortion drift. In: IEEE 14th International Conference on Communication Technology, pp. 824–828, IEEE 2012. https://doi.org/10.1109/ICCT.2012.6511318
Liu, Y., Li, Z., Maa, X., Liu, J.: A robust data hiding algorithm for H.264/AVC video streams. J. Syst. Softw. 86(8), 2174–2183 (2013). https://doi.org/10.1016/j.jss.2013.03.101
Mstafa, R.J., Elleithy, K.M.: A DCT-based robust video steganographic method using BCH error correcting codes. In: 2016 IEEE long island systems, applications and technology conference (LISAT), IEEE 2016. https://doi.org/10.1109/LISAT.2016.7494111
Khan, A., Sarfaraz, A.: FFT-ETM based distortion less and high payload image steganography. Multimed. Tools Appl. (2019). https://doi.org/10.1007/s11042-019-7664-7
Lu, C.-S., Chen, J.-R., Fan, K.-C.: Real-time frame-dependent video watermarking in VLC domain. Signal Process. Image Commun. 20, 624–642 (2005). https://doi.org/10.1016/j.image.2005.03.012
Mobasseri, B.G., Marcinak, M.P. Watermarking of MPEG-2 video in compressed domain using VLC mapping. In: 7th Workshop on Multimedia & Security, pp. 91–94, 2005. https://doi.org/10.1145/1073170.1073187
Liao, K., Lian, S., Guo, Z., Wang, J.: Efficient information hiding in H.264/AVC video coding. Telecommun. Syst. 49(2), 261–269 (2012). https://doi.org/10.1007/s11235-010-9372-5
Shahid, Z., Chaumont, M., Puech, W.: Fast protection of H.264/AVC by selective encryption of CAVLC and CABAC for I and P frames. IEEE Trans. Circuits Syst. Video Technol. 21(5), 565–576 (2011). https://doi.org/10.1109/TCSVT.2011.2129090
Ke, N., Weidong, Z.: A video steganography scheme based on H.264 bitstreams replaced. In: IEEE 4th International Conference on Software Engineering and Service Science, pp. 447–450, IEEE 2013. https://doi.org/10.1109/ICSESS.2013.6615345
Wang, Y., Oneill, M., Kurugollu, F.: A tunable encryption scheme and analysis of fast selective encryption for CAVLC and CABAC in H.264/AVC. IEEE Trans. Circuits Syst. Video Technol. 23(9), 1476–1490 (2013). https://doi.org/10.1109/TCSVT.2013.2248588
Zhang, Y., Zhang, M., Wang, X.A., Niu, K., Liu, J.: A novel video steganography algorithm based on trailing coefficients for H264/AVC. Inform. Int. J. Comput. Inform. 40(1), 63–70 (2016)
Abd-El-Atty, B., Iliyasu, A.M., Alaskar, H., Abd-El-Latif, A.A.: A robust quasi-quantum walks-based steganography protocol for secure transmission of images on cloud-based E-healthcare platforms. Sensors 20(11), 3108 (2020). https://doi.org/10.3390/s20113108
Abd-El-Latif, A.A., Abd-El-Atty, B., Elseuofi, S., Khalifa, H.S., Alghamdi, A., Polat, K., Amin, M.: Secret images transfer in cloud system based on investigating quantum walks in steganography approaches. Phys. A Stat. Mech. Appl. 541, 123687 (2020). https://doi.org/10.1016/j.physa.2019.123687
Peng, J., Abd El-Atty, B., Khalifa, H.S., Abd El-Latif, A.A.: Image steganography algorithm based on key matrix generated by quantum walks. In: Eleventh International Conference on Digital Image Processing, Vol. 11179, 1117905, ICDIP 2019. https://doi.org/10.1117/12.2539630
Abd-EL-Latif, A.A., Abd-El-Atty, B., Venegas-Andraca, S.E.: A novel image steganography technique based on quantum substitution boxes. Opt. Laser Technol. 116, 92–102 (2019). https://doi.org/10.1016/j.optlastec.2019.03.005
Li, L., Hossain, M.S., Abd-El-Latif, A.A., Alhamid, M.F.: Distortion less secret image sharing scheme for Internet of Things system. Cluster Comput. J. 22(1), 2293–2307 (2019). https://doi.org/10.1007/s10586-017-1345-y
Abd-El-Latif, A.A., Abd-El-Atty, B., Hossain, M.S., Abdur Rahman, M.D., Alamri, A., Gupta, B.B.: Efficient quantum information hiding for remote medical image sharing. IEEE Access J. 6, 21075–21083 (2018). https://doi.org/10.1109/ACCESS.2018.2820603
Yan, C., Gong, B., Wei, Y., Gao, Y.: Deep multi-view enhancement hashing for image retrieval. IEEE Trans. Pattern Anal. Mach. Intell. (2020). https://doi.org/10.1109/TPAMI.2020.2975798
Yan, C., Shao, B., Zhao, H., Ning, R., Zhang, Y., Xu, F.: 3D room layout estimation from a single RGB image. IEEE Trans. Multimed. (2020). https://doi.org/10.1109/TMM.2020.2967645]
Peng, J., Abd El-Atty, B., Khalifa, H.S., Abd El-Latif, A.A.: Image watermarking algorithm based on quaternion and chaotic Lorenz system. In: Eleventh International Conference on Digital Image Processing, Vol. 11179, 111790W, ICDIP 2019. https://doi.org/10.1117/12.2539753
Author information
Authors and Affiliations
Corresponding author
Additional information
Communicated by Y. Zhang.
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Patel, R., Lad, K. & Patel, M. Study and investigation of video steganography over uncompressed and compressed domain: a comprehensive review. Multimedia Systems 27, 985–1024 (2021). https://doi.org/10.1007/s00530-021-00763-z
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00530-021-00763-z