An overview of digital video watermarking

M Asikuzzaman, MR Pickering - IEEE Transactions on Circuits …, 2017 - ieeexplore.ieee.org
The illegal distribution of a digital movie is a common and significant threat to the film
industry. With the advent of high-speed broadband Internet access, a pirated copy of a …

A survey of reversible data hiding in encrypted images–the first 12 years

P Puteaux, SY Ong, KS Wong, W Puech - Journal of Visual Communication …, 2021 - Elsevier
In the last few years, with the increasing popularity of cloud computing and the availability of
mobile smart devices as well as ubiquitous network connections, more and more users are …

A robust and secure video steganography method in DWT-DCT domains based on multiple object tracking and ECC

RJ Mstafa, KM Elleithy, E Abdelfattah - IEEE access, 2017 - ieeexplore.ieee.org
Over the past few decades, the art of secretly embedding and communicating digital data
has gained enormous attention because of the technological development in both digital …

Linguistic steganography based on adaptive probability distribution

X Zhou, W Peng, B Yang, J Wen… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Text has become one of the most extensively used digital media in Internet, which provides
steganography an effective carrier to realize confidential message hiding. Nowadays …

A video steganography algorithm based on Kanade-Lucas-Tomasi tracking algorithm and error correcting codes

RJ Mstafa, KM Elleithy - Multimedia Tools and Applications, 2016 - Springer
Due to the significant growth of video data over the Internet, video steganography has
become a popular choice. The effectiveness of any steganographic algorithm depends on …

A survey on information hiding using video steganography

M Dalal, M Juneja - Artificial Intelligence Review, 2021 - Springer
In the last few decades, information security has gained huge importance owing to the
massive growth in digital communication; hence, driving steganography to the forefront for …

A survey on robust video watermarking algorithms for copyright protection

X Yu, C Wang, X Zhou - Applied Sciences, 2018 - mdpi.com
With the development and popularization of the Internet and the rise of various live
broadcast platforms, digital videos have penetrated into all aspects of people's life. At the …

Universal detection of video steganography in multiple domains based on the consistency of motion vectors

L Zhai, L Wang, Y Ren - IEEE transactions on information …, 2019 - ieeexplore.ieee.org
Digital video provides various types of embedding domains, which lead to a great diversity
in video steganography. However, in the detection of video steganography, the existing …

A cover selection HEVC video steganography based on intra prediction mode

J Wang, X Jia, X Kang, YQ Shi - IEEE access, 2019 - ieeexplore.ieee.org
Existing video steganography puts much emphasis on the design of algorithms such as
map** rules or distortion functions, thereby ignoring the selection of cover to embed secret …

Compressed and raw video steganography techniques: a comprehensive survey and analysis

RJ Mstafa, KM Elleithy - Multimedia Tools and Applications, 2017 - Springer
In the last two decades, the science of covertly concealing and communicating data has
acquired tremendous significance due to the technological advancement in communication …