Skip to main content
Log in

Compressed and raw video steganography techniques: a comprehensive survey and analysis

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In the last two decades, the science of covertly concealing and communicating data has acquired tremendous significance due to the technological advancement in communication and digital content. Steganography is the art of concealing secret data in a particular interactive media transporter, e.g., text, audio, image, and video data in order to build a covert communication between authorized parties. Nowadays, video steganography techniques have become important in many video-sharing and social networking applications such as Livestreaming, YouTube, Twitter, and Facebook because of the noteworthy development of advanced video over the Internet. The performance of any steganographic method ultimately relies on the imperceptibility, hiding capacity, and robustness. In the past decade, many video steganography methods have been proposed; however, the literature lacks of sufficient survey articles that discuss all techniques. This paper presents a comprehensive study and analysis of numerous cutting edge video steganography methods and their performance evaluations from literature. Both compressed and raw video steganography methods are surveyed. In the compressed domain, video steganography techniques are categorized according to the video compression stages as venues for data hiding such as intra frame prediction, inter frame prediction, motion vectors, transformed and quantized coefficients, and entropy coding. On the other hand, raw video steganography methods are classified into spatial and transform domains. This survey suggests current research directions and recommendations to improve on existing video steganography techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

References

  1. Abu-Marie W, Gutub A, Abu-Mansour H (2010) Image based steganography using truth table based and determinate Array on RGB indicator. Int J Signal and Image Process 1:196–204

    Google Scholar 

  2. Ahmad J, Sajjad M, Mehmood I, Rho S, Baik SW (2015) Saliency-weighted graphs for efficient visual content description and their applications in real-time image retrieval systems. J Real-Time Image Proc:1–17

  3. Alavianmehr MA, Rezaei M, Helfroush MS, and Tashk A (2012) A lossless data hiding scheme on video raw data robust against H.264/AVC compression In: 2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE), pp 194–198

  4. Arsalan M, Malik SA, Khan A (2012) Intelligent reversible watermarking in integer wavelet domain for medical images. J Syst Softw 85:883–894

    Article  Google Scholar 

  5. Barni M, Bartolini F, Checcacci N (2005) Watermarking of MPEG-4 video objects. IEEE Trans Multimedia 7:23–32

    Article  Google Scholar 

  6. Bhole AT, Patel R (2012) Steganography over video file using Random Byte Hiding and LSB technique, In: 2012 IEEE. International Conference on Computational Intelligence & Computing Research (ICCIC), pp. 1–6

  7. Bin H, Li-Yi Z, Wei-Dong Z (2011) A novel steganography algorithm based on motion vector and matrix encoding, In: 2011 IEEE. 3rd International Conference on Communication Software and Networks (ICCSN), pp 406–409

  8. Chang F-C, Huang H-C, Hang H-M (2007) Layered access control schemes on watermarked scalable media. The J VLSI Sig Proc Syst Sig, Image, and Video Technol 49:443–455

    Article  Google Scholar 

  9. Chang P-C, Chung K-L, Chen J-J, Lin C-H, Lin T-J (2014) A DCT/DST-based error propagation-free data hiding algorithm for HEVC intra-coded frames. J Vis Commun Image Represent 25:239–253

    Article  Google Scholar 

  10. Cheddad A, Condell J, Curran K, McKevitt P (2008) Skin tone based Steganography in video files exploiting the YCbCr colour space, In: IEEE International Conference on Multimedia and Expo, 2008, pp 905–908

  11. Cheddad A, Condell J, Curran K, Mc Kevitt P (2009a) A secure and improved self-embedding algorithm to combat digital document forgery. Signal Process 89:2324–2332

    Article  MATH  Google Scholar 

  12. Cheddad A, Condell J, Curran K, Mc Kevitt P (2009b) A skin tone detection algorithm for an adaptive approach to steganography. Signal Process 89:2465–2478

    Article  MATH  Google Scholar 

  13. Cheddad A, Condell J, Curran K, Mc Kevitt P (2010) Digital image steganography: survey and analysis of current methods. Signal Process 90:727–752

    Article  MATH  Google Scholar 

  14. Das R and Tuithung T (2012) A novel steganography method for image based on Huffman Encoding, In: 2012 3rd National Conference on Emerging Trends and Applications in Computer Science (NCETACS), pp. 14–18

  15. Dasgupta K, Mondal JK, Dutta P (2013) Optimized video steganography using genetic algorithm (GA). Procedia Technol 10:131–137

    Article  Google Scholar 

  16. Diop I, Farss SM, Tall K, Fall PA, Diouf ML, Diop AK (2014) Adaptive steganography scheme based on LDPC codes. In: 2014 16th International Conference on Advanced Communication Technology (ICACT), pp. 162–166

  17. Egiazarian K, Astola J, Ponomarenko N, Lukin V, Battisti F, and Carli M (2006) New full-reference quality metrics based on HVS In: CD-ROM proceedings of the second international workshop on video processing and quality metrics, Scottsdale, USA

  18. Eltahir ME, Kiah LM, and Zaidan BB (2009) High rate video streaming steganography In: International Conference on Information Management and Engineering, ICIME ‘09. pp 550–553

  19. Farschi S, Farschi H A novel chaotic approach for information hiding in image. Nonlinear Dyn 69:1525–1539 2012/09/01 2012

  20. Fontaine C, Galand F (2007) How can reed-solomon codes improve steganographic schemes? In: Furon T, Cayre F, Doërr G, Bas P (eds) Information Hiding, vol 4567. Springer, Berlin, pp 130–144

    Chapter  Google Scholar 

  21. Guangjie L, Weiwei L, Yuewei D, and Shiguo L (2011) An adaptive matrix embedding for image steganography, In: 2011 Third International Conference on Multimedia information networking and security (MINES) pp 642–646. doi:10.1109/MINES.2011.138

  22. Guangjie L, Weiwei L, Yuewei D, Shiguo L (2012) Adaptive steganography based on syndrome-trellis codes and local complexity, In: 2012 Fourth International Conference on Multimedia Information Networking and Security (MINES), pp 323–327

  23. Gutub AA-A (2010) Pixel indicator technique for RGB image steganography. J Emerging Technol Web Intell 2:56–64

    Google Scholar 

  24. Gutub A, Ankeer M, Abu-Ghalioun M, Shaheen A, Alvi A (2008) Pixel indicator high capacity technique for RGB image based steganography. In: WoSPA 2008-5th IEEE International Workshop on Signal Processing and its Applications, University of Sharjah, Sharjah, U.A.E. 18-20 March 2008

  25. Hanafy A, Salama G, Mohasseb YZ (2008) A secure covert communication model based on video steganography, In: IEEE Military Communications Conference, 2008 MILCOM 2008 pp 1–6

  26. Hasnaoui M, Mitrea M (2014) Multi-symbol QIM video watermarking. Signal Process Image Commun 29:107–127

    Article  Google Scholar 

  27. He Y, Yang G, Zhu N (2012) A real-time dual watermarking algorithm of H.264/AVC video stream for video-on-demand service. AEU Int J Electron Commun 66:305–312

    Article  Google Scholar 

  28. Horng S-J, Rosiyadi D, Li T, Takao T, Guo M, Khan MK (2013) A blind image copyright protection scheme for e-government. J Vis Commun Image Represent 24:1099–1105

    Article  Google Scholar 

  29. Horng S-J, Rosiyadi D, Fan P, Wang X, Khan MK (2014) An adaptive watermarking scheme for e-government document images. Multimed Tools Appl 72:3085–3103

    Article  Google Scholar 

  30. Hu S, KinTak U (2011) A novel video steganography based on non-uniform rectangular partition In: 2011 IEEE. 14th International Conference on Computational Science and Engineering (CSE), pp 57–61

  31. Hu Y, Zhang C, Su Y (2007) Information hiding based on intra prediction modes for H. 264/AVC In: IEEE. International Conference on Multimedia and Expo 2007, pp 1231–1234

  32. Huang J, Shi YQ (2002) Reliable information bit hiding. IEEE Trans Circuits Syst Video Technol 12:916–920

    Article  Google Scholar 

  33. Huang H-C, Chu S-C, Pan J-S, Huang C-Y, Liao B-Y (2011) Tabu search based multi-watermarks embedding algorithm with multiple description coding. Inf Sci 181:3379–3396

    Article  Google Scholar 

  34. Islam S, Modi MR, Gupta P (2014) Edge-based image steganography. EURASIP J Inf Secur 2014:1–14

    Article  Google Scholar 

  35. Jue W, Min-Qing Z Juan-Li S (2011) Video steganography using motion vector components In: 2011 IEEE. 3rd International Conference on Communication Software and Networks (ICCSN), pp 500–503

  36. Kapotas SK Skodras AN, (2008) A new data hiding scheme for scene change detection in H. 264 encoded video sequences, In: 2008 IEEE. International Conference on Multimedia and Expo

  37. Kawaguchi E, Eason RO (1999) Principles and applications of BPCS steganography In: Photonics East (ISAM, VVDC, IEMB), pp 464–473

  38. Ke N Weidong Z (2013) A video steganography scheme based on H. 264 bitstreams replaced In: 4th IEEE International Conference on Software Engineering and Service Science (ICSESS), pp 447–450

  39. Kelash HM, Abdel Wahab OF, Elshakankiry OA, El-sayed HS (2013) Hiding data in video sequences using steganography algorithms, In: 2013 International Conference on ICT Convergence (ICTC), pp. 353–358

  40. Khan A, Malik SA (2014) A high capacity reversible watermarking approach for authenticating images: exploiting down-sampling, histogram processing, and block selection. Inf Sci 256:162–183

    Article  Google Scholar 

  41. Khan A, Malik SA, Ali A, Chamlawi R, Hussain M, Mahmood MT, Usman I (2012) Intelligent reversible watermarking and authentication: hiding depth map information for 3D cameras. Inf Sci 216:155–175

    Article  Google Scholar 

  42. Khan A, Siddiqa A, Munib S, Malik SA (2014) A recent survey of reversible watermarking techniques. Inf Sci 279:251–272

    Article  Google Scholar 

  43. Khupse S and Patil NN (2014) An adaptive steganography technique for videos using Steganoflage In: 2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT), pp 811–815

  44. Li G, Ito Y, Yu X, Nitta N, Babaguchi N (2009) Recoverable privacy protection for video content distribution. EURASIP J Inf Secur 2009:4

    Google Scholar 

  45. Li Y, Chen H-X Zhao Y (2010) A new method of data hiding based on H. 264 encoded video sequences, In: IEEE 10th International Conference on Signal Processing (ICSP), 2010 pp. 1833–1836

  46. Liao K, Lian S, Guo Z, Wang J (2012) Efficient information hiding in H. 264/AVC video coding. Telecommun Syst 49:261–269

    Article  Google Scholar 

  47. Lie W-N, Lin C-W (2006) Enhancing video error resilience by using data-embedding techniques, IEEE Trans Circuits Syst Video Technol 16:300–308

  48. Lin W-H, Horng S-J, Kao T-W, Fan P, Lee C-L, Pan Y (2008) An efficient watermarking method based on significant difference of wavelet coefficient quantization. IEEE Trans Multimed 10:746–757

    Article  Google Scholar 

  49. Lin W-H, Horng S-J, Kao T-W, Chen R-J, Chen Y-H, Lee C-L, Terano T (2009a) Image copyright protection with forward error correction. Expert Syst Appl 36:11888–11894

    Article  Google Scholar 

  50. Lin W-H, Wang Y-R, Horng S-J, Kao T-W, Pan Y (2009b) A blind watermarking method using maximum wavelet coefficient quantization. Expert Syst Appl 36:11509–11516

    Article  Google Scholar 

  51. Lin W-H, Wang Y-R, Horng S-J (2009c) A wavelet-tree-based watermarking method using distance vector of binary cluster. Expert Syst Appl 36:9869–9878

    Article  Google Scholar 

  52. List P, Joch A, Lainema J, Bjontegaard G, Karczewicz M (2003) Adaptive deblocking filter. IEEE Trans Circuits Syst Video Technol 13:614–619

    Article  Google Scholar 

  53. Liu B, Liu F, Yang C and Sun Y (2008) Secure steganography in compressed video bitstreams, In: Availability, Reliability and Security, ARES 08. Conference on Third International, 2008, pp 1382–1387

  54. Liu Y, Li Z, Ma X, and Liu J (2012a) A novel data hiding scheme for H. 264/AVC video streams without intra-frame distortion drift In: IEEE 14th International Conference on Communication Technology (ICCT), 2012, pp 824–828

  55. Liu Y, Li Z, Ma X and Liu J (2012b) A robust data hiding algorithm for H. 264/AVC video streams without intra-frame distortion drift, In: Proceedings of the 2012 Second International Conference on Electric Information and Control Engineering-Volume 01, pp 182–186

  56. Liu Y, Li Z, Ma X Liu J (2013) A robust data hiding algorithm for H. 264/AVC video streams. J Syst Softw

  57. Lou D-C, Hu C-H (2012) LSB steganographic method based on reversible histogram transformation function for resisting statistical steganalysis. Inf Sci 188:346–358

    Article  Google Scholar 

  58. Lu C-S, Chen J-R, Fan K-C (2005) Real-time frame-dependent video watermarking in VLC domain. Signal Process Image Commun 20:624–642

    Article  Google Scholar 

  59. Lusson F, Bailey K, Leeney M, Curran K (2013) A novel approach to digital watermarking, exploiting colour spaces. Signal Process 93:1268–1294

    Article  Google Scholar 

  60. Ma X, Li Z, Tu H, Zhang B (2010) A data hiding algorithm for H. 264/AVC video streams without intra-frame distortion drift. IEEE Trans Circuits Syst Video Technol 20:1320–1330

    Article  Google Scholar 

  61. Masoumi M, Amiri S (2013) A blind scene-based watermarking for video copyright protection. AEU Int J Electron Commun 67:528–535

    Article  Google Scholar 

  62. Mehmood I, Sajjad M, Rho S, Baik SW (2016) Divide-and-conquer based summarization framework for extracting affective video content. Neurocomputing 174:393–403

    Article  Google Scholar 

  63. Mercuri RT (2004) The many colors of multimedia security. Commun ACM 47:25–29

    Google Scholar 

  64. Meuel P, Chaumont M, Puech W (2007) Data hiding in H. 264 video for lossless reconstruction of region of interest, In: EUSIPCO 07: 15th European Signal Processing Conference, pp. 2301–2305

  65. Mobasseri BG Marcinak MP (2005) Watermarking of MPEG-2 video in compressed domain using VLC mapping In: Proceedings of the 7th workshop on Multimedia and security, pp 91–94

  66. Moon SK Raut RD (2013) Analysis of secured video steganography using computer forensics technique for enhance data security In: 2013 IEEE. Second International Conference on Image Information Processing (ICIIP), pp. 660–665

  67. Mstafa R J Elleithy KM (2014) A highly secure video steganography using hamming code (7, 4) In: Systems, Applications and Technology Conference (LISAT), 2014 IEEE. Long Island, pp 1–6

  68. Mstafa RJ Elleithy KM (2015a) A novel video steganography algorithm in the wavelet domain based on the KLT tracking algorithm and BCH codes In: IEEE Long Island Systems Applications and Technology Conference (LISAT), 2015, pp. 1–7

  69. Mstafa RJ Elleithy KM (2015b) A high payload video steganography algorithm in DWT domain based on BCH codes (15, 11) In: Wirel Telecommunications Symp (WTS), 2015 pp 1–8

  70. Mstafa RJ and Elleithy KM (2015c) A new video steganography algorithm based on the multiple object tracking and hamming codes In: 2015 IEEE 14th International Conference on Machine Learning and Applications (ICMLA), pp 335–340

  71. Mstafa RJ, Elleithy KM (2016a) A DCT-based robust video steganographic method using BCH error correcting codes. IEEE Long Island Systems, Applications and Technology Conference (LISAT) 2016:1–6

    Google Scholar 

  72. Mstafa RJ, Elleithy KM (2016b) A video steganography algorithm based on Kanade-Lucas-Tomasi tracking algorithm and error correcting codes. Multimed Tools Appl 75:10311–10333

    Article  Google Scholar 

  73. Muhammad K, Jamil A, Haleem F, Zahoor J, Muhammad S, Sung Wook B (2015a) A Secure Method for Color Image Steganography using Gray-Level Modification and Multi-level Encryption. KSII Transactions on Internet and Information Systems (TIIS) 9:1938–1962

    Google Scholar 

  74. Muhammad K, Mehmood I, Lee MY, Ji SM Baik SW (2015b) Ontology-based secure retrieval of semantically significant visual contents, arXiv preprint arXiv:1510.02177,

  75. Muhammad K, Sajjad M, Mehmood I, Rho S, Baik S (2015c) A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image Multimed Tools Appl pp 1–27, 2015/05/24

  76. Muhammad K, Sajjad M, Baik SW (2016) Dual-level security based Cyclic18 steganographic method and its application for secure transmission of Keyframes during wireless capsule endoscopy. J Med Syst 40:1–16

    Article  Google Scholar 

  77. Noda H, Furuta T, Niimi M Kawaguchi E (2004) Application of BPCS steganography to wavelet compressed video, In: 2004 International Conference on Image Processing ICIP’04 pp 2147–2150

  78. Pan F, Xiang L, Yang X-Y, Guo Y (2010) Video steganography using motion vector and linear block codes In: 2010 IEEE. International Conference on Software Engineering and Service Sciences (ICSESS), pp 592–595

  79. Patel K, Rora KK, Singh K, and Verma S (2013) Lazy wavelet transform based steganography in video In: 2013 International Conference on Communication Systems and Network Technologies (CSNT), pp 497–500

  80. Paul R, Acharya AK, Yadav VK Batham S (2013) Hiding large amount of data using a new approach of video steganography In: Confluence 2013: The Next Generation Information Technology Summit (4th International Conference), pp 337–343

  81. Petitcolas FA, Anderson RJ, Kuhn MG (1999) Information hiding-a survey. Proc IEEE 87:1062–1078

    Article  Google Scholar 

  82. Ponomarenko N, Silvestri F, Egiazarian K, Carli M, Astola J Lukin V (2007) On between-coefficient contrast masking of DCT basis functions. In: Proceedings of the Third International Workshop on Video Processing and Quality Metrics for Consumer Electronics, VPQM 2007, Scottsdale, Arizona, USA, 25-26 January 2007

  83. Qazanfari K, Safabakhsh R (2014) A new steganography method which preserves histogram: generalization of LSB++. Inf Sci 277:90–101

    Article  MathSciNet  Google Scholar 

  84. Qian Z, Feng G, Zhang X, Wang S (2011) Image self-embedding with high-quality restoration capability. Digital Signal Process 21:278–286

    Article  Google Scholar 

  85. Ritchey PC, Rego VJ (2012) A context sensitive tiling system for information hiding. J Inf Hiding and Multimed Sig Process 3:212–226

    Google Scholar 

  86. Robie DL, Mersereau RM (2002) Video error correction using steganography. EURASIP J Appl Sig Proc 2002:164–173

    Article  MATH  Google Scholar 

  87. Rosiyadi D, Horng S-J, Fan P, Wang X, Khan MK, Pan Y (2012a) Copyright protection for e-government document images. IEEE MultiMedia 19:62–73

    Article  Google Scholar 

  88. Rosiyadi D, Horng S-J, Suryana N, Masthurah N (2012b) A comparison between the hybrid using genetic algorithm and the pure hybrid watermarking scheme. Int J Comput Theory Eng (IJCTE) 4:329–331

  89. Rupa C (2013) A digital image steganography using sierpinski gasket fractal and PLSB. J Inst Eng (India): Series B 94:147–151

    Google Scholar 

  90. Sadek MM, Khalifa AS, Mostafa MG (2015) Video steganography: a comprehensive review. Multimed Tools Appl 74(17):7063–7094

    Article  Google Scholar 

  91. Sadek MM, Khalifa AS, Mostafa MG (2016) Robust video steganography algorithm using adaptive skin-tone detection. Multimed Tools Appl:1–21

  92. Sajjad M, Muhammad K, Baik SW, Rho S, Jan Z, Yeo S-S, Mehmood I (2016) Mobile-cloud assisted framework for selective encryption of medical images with steganography for resource-constrained devices. Multimed Tools Appl:1–18

  93. Shahid Z, Chaumont M, Puech W (2013) Considering the reconstruction loop for data hiding of intra-and inter-frames of H. 264/AVC. SIViP 7:75–93

    Article  Google Scholar 

  94. Shanableh T (2012) Data hiding in MPEG video files using multivariate regression and flexible macroblock ordering. IEEE Trans Inf Forensics Secur 7:455–464

    Article  Google Scholar 

  95. Spaulding J, Noda H, Shirazi MN, Kawaguchi E (2002) BPCS steganography using EZW lossy compressed images. Pattern Recogn Lett 23:1579–1587

    Article  MATH  Google Scholar 

  96. Stanescu D, Stratulat M, Ciubotaru B, Chiciudean D, Cioarga R Micea M (2007) Embedding data in video stream using steganography In: 4th International Symposium on Applied Computational Intelligence and Informatics, 2007. SACI ‘07, pp 241–244

  97. Subhedar MS, Mankar VH (2014) Current status and key issues in image steganography: a survey. Comput Sci Rev 13–14:95–113

    Article  MATH  Google Scholar 

  98. Sun SL (2015) A new information hiding method based on improved BPCS steganography. Adv Multimedia 2015:1–7

  99. Tadiparthi GR, Sueyoshi T (2008) A novel steganographic algorithm using animations as cover. Decis Support Syst 45:937–948

    Article  Google Scholar 

  100. Thiesse JM, Jung J Antonini M (2010a) Data hiding of motion information in chroma and luma samples for video compression In: 2010 IEEE International Workshop on Multimedia Signal Processing (MMSP), pp 217–221

  101. Thiesse JM, Jung J, Antonini M (2010b) Data hiding of intra prediction information in chroma samples for video compression In: 2010 17th IEEE International Conference on Image Processing (ICIP), pp 2861–2864

  102. Thiesse JM, Jung J, Antonini M (2011) Rate distortion data hiding of motion vector competition information in Chroma and luma samples for video compression. IEEE Trans Circuits Syst Video Technol 21:729–741

    Article  Google Scholar 

  103. Tse-Hua L, Tewfik AH (2006) A novel high-capacity data-embedding system. IEEE Trans Image Process 15:2431–2440

    Article  Google Scholar 

  104. Wang R, HU L Xu D ( 2011) A watermarking algorithm based on the CABAC entropy coding for H.264/AVC. J Comput Inform Syst 7(6):2132–2141

  105. Wang X-y, Wang C-p, Yang H-y, Niu P-p (2013) A robust blind color image watermarking in quaternion Fourier transform domain. J Syst Softw 86:255–277

    Article  Google Scholar 

  106. Wedi T (2002) Adaptive interpolation filter for motion compensated prediction In: 2002 Proceedings International Conference on Image Processing II-509-II-512 2

  107. Xu C, Ping X and Zhang T (2006) Steganography in compressed video stream In: International Conference on Innovative Computing, Information and Control, 2006. ICICIC’06. First pp 269–272

  108. Yang G, Li J, He Y, Kang Z (2011) An information hiding algorithm based on intra-prediction modes and matrix coding for H. 264/AVC video stream. AEU Int J Electron Commun 65:331–337

    Article  Google Scholar 

  109. Yilmaz A and Alatan AA (2003) Error concealment of video sequences by data hiding In: 2003 Proceedings International Conference on Image Processing, 2003. ICIP 2003. pp II-679-82 vol.3

  110. Yiqi T, KokSheik W (2014) An overview of information hiding in H.264/AVC compressed video. IEEE Trans Circuits Syst Video Technol 24:305–319

    Article  Google Scholar 

  111. Zhang X and Liu S (2012) Method and apparatus for intra mode coding in HEVC ed: Google patents

  112. Zhang W, Cheung S-CS Chen M (2005) Hiding privacy information in video surveillance system In: ICIP (3), pp 868–871

  113. Zhang R, Sachnev V, Kim H (2009) Fast BCH syndrome coding for steganography. In: Katzenbeisser S, Sadeghi A-R (eds) Information hiding, vol 5806. Springer, Berlin, pp 48–58

    Chapter  Google Scholar 

  114. Zhang R, Sachnev V, Botnan MB, Kim HJ, Heo J (2012) An efficient embedder for BCH coding for steganography. IEEE Trans Inf Theory 58:7272–7279

    Article  MathSciNet  MATH  Google Scholar 

  115. Zhu H, Wang R, Xu D, and Zhou X (2010) Information Hiding Algorithm for H. 264 Based on the predition difference of Intra_4× 4 In: 2010 3rd International Congress on Image and Signal Processing (CISP), pp 487–490

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ramadhan J. Mstafa.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mstafa, R.J., Elleithy, K.M. Compressed and raw video steganography techniques: a comprehensive survey and analysis. Multimed Tools Appl 76, 21749–21786 (2017). https://doi.org/10.1007/s11042-016-4055-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-016-4055-1

Keywords

Navigation