Aach T, Kaup A, Mester R (1993) Statistical model-based change detection in moving video. Signal Process 31(2):165–180
MATH
Google Scholar
M Abdolmohammadi, RM Toroghi, and A Bastanfard (2019). “Video Steganography Using 3D Convolutional Neural Networks,” in Mediterranean Conference on Pattern Recognition and Artificial Intelligence, pp. 149–161
S Abu-El-Haija, N Kothari, J Lee, P Natsev, G Toderici, B Varadarajan, and S Vijayanarasimhan (2016). “Youtube-8m: A large-scale video classification benchmark,” arXiv Prepr. arXiv1609.08675
S Alam, T Ahmad, and MN Doja (2017). “A Novel Edge Based Chaotic Steganography Method Using Neural Network,” in Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications, pp. 467–475
Al-Dmour H, Al-Ani A (2016) A steganography embedding method based on edge identification and XOR coding. Expert Syst Appl 46:293–306
Google Scholar
Aly HA (2011) Data hiding in motion vectors of compressed video based on their associated prediction error. IEEE Trans Inf Forensics Secur 6(1):14–18
Google Scholar
Asikuzzaman M, Pickering MR (2018) An overview of digital video watermarking. IEEE Trans Circuits Syst Video Technol 28(9):2131–2153
Google Scholar
Atawneh S, Almomani A, Al Bazar H, Sumari P, Gupta B (2017) Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain. Multimed Tools Appl 76(18):18451–18472
Google Scholar
Attaby AA, Ahmed MFMM, Alsammak AK (2018) Data hiding inside JPEG images with high resistance to steganalysis using a novel technique: DCT-M3. Ain Shams Eng J 9(4):1965–1974
Google Scholar
Babaguchi N, Cavallaro A, Chellappa R, Dufaux F, Wang L (2013) Guest editorial: special issue on intelligent video surveillance for public security and personal privacy. IEEE Trans Inf Forensics Secur 8(10):1559–1561
Google Scholar
RJ Bagnall (2002). “Reversing the steganography myth in terrorist operations: The asymmetrical threat of simple intelligence dissemination techniques using common tools,” SANS Inf. Secur. Read. Room, vol. 19
Balasubramanian C, Selvakumar S, Geetha S (2014) High payload image steganography with reduced distortion using octonary pixel pairing scheme. Multimed Tools Appl 73(3):2223–2245
Google Scholar
Balu S, Babu CNK, Amudha K (2018) Secure and efficient data transmission by video steganography in medical imaging system. Clust Comput:1–7
FC Bancroft and C Clelland (2001). “DNA-based steganography.” Google Patents
BG Banik and SK Bandyopadhyay (2017). “Image Steganography using BitPlane complexity segmentation and hessenberg QR method,” in Proceedings of the First International Conference on Intelligent Computing and Communication, pp. 623–633
M Barni, G Cancelli, and A Esposito (2010). “Forensics aided steganalysis of heterogeneous images,” in 2010 IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 1690–1693
N Beebe (2009). “Digital forensic research: The good, the bad and the unaddressed,” in IFIP International Conference on Digital Forensics, pp. 17–36
Cao Y, Zhang H, Zhao X, Yu H (2015) Covert communication by compressed videos exploiting the uncertainty of motion estimation. IEEE Commun Lett 19(2):203–206
Google Scholar
Y Cao, X Zhao, D Feng, and R Sheng (2011). “Video steganography with perturbed motion estimation,” in International Workshop on Information Hiding, pp. 193–207
G Cao, Y Zhao, and R Ni (2008). “Image composition detection using object-based color consistency,” in 2008 9Th international conference on signal processing, pp. 1186–1189
Chaeikar SS, Zamani M, Manaf ABA, Zeki AM (2018) PSW statistical LSB image steganalysis. Multimed Tools Appl 77(1):805–835
Google Scholar
Chakraborty S, Jalal AS (2020) A novel local binary pattern based blind feature image steganography. Multimed Tools Appl:1–14
Chakraborty S, Jalal AS, Bhatnagar C (2017) LSB based non blind predictive edge adaptive image steganography. Multimed Tools Appl 76(6):7973–7987
Google Scholar
Chan C-K, Cheng L-M (2004) Hiding data in images by simple LSB substitution. Pattern Recogn 37(3):469–474
MATH
Google Scholar
Cheddad A, Condell J, Curran K, Mc Kevitt P (2010) Digital image steganography: survey and analysis of current methods. Signal Process 90(3):727–752
MATH
Google Scholar
Chen M, Boroumand M, Fridrich J (2018) Deep learning regressors for quantitative steganalysis. Electron Imaging 2018(7):160–161
Google Scholar
Chen S, Qu Z (2018) Novel quantum video steganography and authentication protocol with large payload. Int J Theor Phys 57(12):3689–3701
MATH
Google Scholar
Chutani S, Goyal A (2018) Improved universal quantitative steganalysis in spatial domain using ELM ensemble. Multimed Tools Appl 77(6):7447–7468
Google Scholar
Chutani S, Goyal A (2019) A review of forensic approaches to digital image Steganalysis. Multimed Tools Appl 78(13):18169–18204
Google Scholar
Dadgostar H, Afsari F (2016) Image steganography based on interval-valued intuitionistic fuzzy edge detection and modified LSB. J Inf Secur Appl 30:94–104
Google Scholar
Dalal M, Juneja M (2018) Video steganalysis to obstruct criminal activities for digital forensics: a survey. Int J Electron Secur Digit Forensics 10(4):338–355
Google Scholar
M Dalal and M Juneja (2018). “Video Steganography Techniques in Spatial Domain-A Survey,” in Proceedings of the International Conference on Computing and Communication Systems, Springer, Singapore, pp. 705–711
Dalal M, Juneja M (2018) H. 264/AVC video steganography techniques: an overview. Int J Comput Sci Eng 6(5):297–303
Google Scholar
Dalal M, Juneja M (2019) A robust and imperceptible steganography technique for SD and HD videos. Multimed Tools Appl 78(5):5769–5789
Google Scholar
Dalal M, Juneja M (2020) Evaluation of orthogonal and biorthogonal wavelets for video steganography. Inf Secur J A Glob Perspect 29(1):1–11
Google Scholar
Desai MB, Patel SV, Prajapati B (2016) ANOVA and fisher criterion based feature selection for lower dimensional universal image Steganalysis. Int J Image Process 10(3):145–160
Google Scholar
V Divya and N Sasirekha (2016). “High capacity steganography technique based on wavelet transform,” in 2016 Online International Conference on Green Engineering and Technologies (IC-GET), pp. 1–5
Dogan S (2016) A new data hiding method based on chaos embedded genetic algorithm for color image. Artif Intell Rev 46(1):129–143
Google Scholar
Duan X, Guo D, Liu N, Li B, Gou M, Qin C (2020) A new high capacity image steganography method combined with image elliptic curve cryptography and deep neural network. IEEE Access 8:25777–25788
Google Scholar
Duan X, Jia K, Li B, Guo D, Zhang E, Qin C (2019) Reversible image steganography scheme based on a U-net structure. IEEE Access 7:9314–9323
Google Scholar
Fan M, Liu P, Wang H, Sun X (2016) Cross correlation feature mining for steganalysis of hash based least significant bit substitution video steganography. Telecommun Syst:1–7
Fan L, Sun W, Feng G (2019) Image steganalysis via random subspace fisher linear discriminant vector functional link network and feature mapping. Mob Networks Appl 24(4):1269–1278
Google Scholar
T Filler and J Fridrich (2011). “Design of adaptive steganographic schemes for digital images,” in Media Watermarking, Security, and Forensics III, vol. 7880, p. 78800F
Fridrich J, Kodovsky J (2012) Rich models for steganalysis of digital images. IEEE Trans Inf Forensics Secur 7(3):868–882
Google Scholar
Galiano DR, Del Barrio AA, Botella G, Cuesta D (2020) Efficient embedding and retrieval of information for high-resolution videos coded with HEVC. Comput Electr Eng 81:106541
Google Scholar
S Gallagher (2012). “Steganography: how al-Qaeda hid secret documents in a porn video,”. [Online]. Available: https://arstechnica.com/business/2012/05/steganography-how-al-qaeda-hid-secret-documents-in-a-porn-video/. [Accessed: 01-Jul-2016]
Gibouloto Q, Cogranneo R, Bas P (2018) Steganalysis into the wild: how to define a source? Electron Imaging 2018(7):311–318
Google Scholar
M Goljan and J Fridrich (2015). “CFA-aware features for steganalysis of color images,” in Media Watermarking, Security, and Forensics 2015, vol. 9409, p. 94090V
I. R. Grajeda-Marin, H. A. Montes-Venegas, J. R. Marcial-Romero, J. A. Hernández-Servin, and G. De Ita (2016). “An optimization approach to the TWPVD method for digital image steganography,” in Mexican Conference on Pattern Recognition, pp. 125–134
Guo L, Ni J, Shi YQ (2014) Uniform embedding for efficient JPEG steganography. IEEE Trans Inf Forensics Secur 9(5):814–825
Google Scholar
He Y, Yang G, Zhu N (2012) A real-time dual watermarking algorithm of H. 264/AVC video stream for video-on-demand service. AEU-International J Electron Commun 66(4):305–312
Google Scholar
He K, Zhang X, Ren S, Sun J (2015) Spatial pyramid pooling in deep convolutional networks for visual recognition. IEEE Trans Pattern Anal Mach Intell 37(9):1904–1916
Google Scholar
V Holub and J Fridrich (2012). “Designing steganographic distortion using directional filters,” in 2012 IEEE International workshop on information forensics and security (WIFS), pp. 234–239
V Holub and J Fridrich (2013). “Digital image steganography using universal distortion,” in Proceedings of the first ACM workshop on Information hiding and multimedia security, pp. 59–68
Hosam O, Ben Halima N (2016) Adaptive block-based pixel value differencing steganography. Secur Commun Networks 9(18):5036–5050
Google Scholar
Hussain M, Abdul Wahab AW, Javed N, Jung K-H (2016) Hybrid data hiding scheme using right-most digit replacement and adaptive least significant bit for digital images. Symmetry (Basel) 8(6):41
MathSciNet
Google Scholar
M Hussain, AWA Wahab, YI Bin Idris, ATS Ho, and K-H Jung (2018). “Image steganography in spatial domain: a survey,” Signal Process. Image Commun
QP Huu, TH Dinh, NN Tran, TP Van, and TT Minh (2019). “Deep Neural Networks Based Invisible Steganography for Audio-into-Image Algorithm,” in The 8th Global Conference on Consumer Electronics (GCCE 2019), pp. 1–5
T Idbeaa, SA Samad, and H Husain (2016). “A secure and robust compressed domain video steganography for intra-and inter-frames using embedding-based byte differencing (EBBD) scheme,” PLoS One, vol. 11, no. 3
AK Jain and U Uludag (2002). “Hiding fingerprint minutiae in images,” in Proceedings of 3rd Workshop on Automatic Identification Advanced Technologies, pp. 97–102
Jamil T (1999) Steganography: the art of hiding information in plain sight. IEEE potentials 18(1):10–12
Google Scholar
Jan B, Farman H, Khan M, Imran M, Islam IU, Ahmad A, Ali S, Jeon G (2019) Deep learning in big data analytics: a comparative study. Comput Electr Eng 75:275–287
Google Scholar
NF Johnson, Z Duric, and S Jajodia (2001). Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking: Attacks and Countermeasures, vol. 1. Springer Science & Business Media
Kadhim IJ, Premaratne P, Vial PJ (2020) Improved image steganography based on super-pixel and coefficient-plane-selection. Signal Process 171:107481
Google Scholar
Kadhim IJ, Premaratne P, Vial PJ (2020) High capacity adaptive image steganography with cover region selection using dual-tree complex wavelet transform. Cogn Syst Res 60:20–32
Google Scholar
I J Kadhim, P Premaratne, PJ Vial, and B Halloran (2017). “A comparative analysis among dual tree complex wavelet and other wavelet transforms based on image compression,” in International Conference on Intelligent Computing, pp. 569–580
Kadhim IJ, Premaratne P, Vial PJ, Halloran B (2019) Comprehensive survey of image steganography: techniques, evaluations, and trends in future research. Neurocomputing 335:299–326
Google Scholar
M Kalita and T Tuithung (2016). “A novel steganographic method using 8-neighboring PVD (8nPVD) and LSB substitution,” in 2016 International Conference on Systems, Signals and Image Processing (IWSSIP), pp. 1–5
Kang Y, Liu F, Yang C, Xiang L, Luo X, Wang P (2019) Color image steganalysis based on channel gradient correlation. Int. J. Distrib. Sens. Networks 15(5):1550147719852031
Google Scholar
Katzenbeisser S, Petitcolas FAP (2000) Digital Watermarking. Artech House, London
Google Scholar
M Kaur and M Juneja (2017). “Adaptive Block Based Steganographic Model with Dynamic Block Estimation with Fuzzy Rules,” in Innovations in Computer Science and Engineering, Springer, pp. 167–176
Khan S, Bianchi T (2018) Ant colony optimization (aco) based data hiding in image complex region. Int J Electr Comput Eng 8(1):379–389
Google Scholar
Khan H, Javed M, Khayam SA, Mirza F (2011) Designing a cluster-based covert channel to evade disk investigation and forensics. Comput Secur 30(1):35–49
Google Scholar
Khodaei M, Sadeghi Bigham B, Faez K (2016) Adaptive data hiding, using pixel-value-differencing and LSB substitution. Cybern Syst 47(8):617–628
Google Scholar
Kim J, Park H, Park J-I (2020) CNN-based image steganalysis using additional data embedding. Multimed Tools Appl 79(1–2):1355–1372
Google Scholar
Kolakalur A, Kagalidis I, Vuksanovic B, Iacsit M (2016) Wavelet Based Color Video Steganography. Int. J. Eng. Technol 8(3):165
Google Scholar
MZ Konyar, O Akbulut, and S Öztürk (2020). “Matrix encoding-based high-capacity and high-fidelity reversible data hiding in HEVC,” Signal, Image Video Process., pp. 1–9
Koptyra K, Ogiela MR (2019) Multiply information coding and hiding using fuzzy vault. Soft Comput 23(12):4357–4366
Google Scholar
Kumar V, Kumar D (2018) A modified DWT-based image steganography technique. Multimed Tools Appl 77(11):13279–13308
Google Scholar
Kumar P, Singh K (2018) An improved data-hiding approach using skin-tone detection for video steganography. Multimed Tools Appl 77(18):24247–24268
Google Scholar
Kuo W-C, Wang C-C, Hou H-C (2016) Signed digit data hiding scheme. Inf Process Lett 116(2):183–191
MathSciNet
MATH
Google Scholar
Li Z, Meng L, Xu S, Li Z, Shi Y, Liang Y (2019) A HEVC video steganalysis algorithm based on pu partition modes. Comput Mater Contin 59(2):607–624
Google Scholar
Li B, Wei W, Ferreira A, Tan S (2018) ReST-net: diverse activation modules and parallel subnets-based CNN for spatial image steganalysis. IEEE Signal Process Lett 25(5):650–654
Google Scholar
Liao X, Guo S, Yin J, Wang H, Li X, Sangaiah AK (2018) New cubic reference table based image steganography. Multimed Tools Appl 77(8):10033–10050
Google Scholar
Liu Y, Ju L, Hu M, Zhao H, Jia S, Jia Z (2016) A new data hiding method for H.264 based on secret sharing. Neurocomputing 188:113–119
Google Scholar
Liu H-H, Lee C-M (2019) High-capacity reversible image steganography based on pixel value ordering. EURASIP J. Image Video Process 2019(1):54
Google Scholar
Liu P, Li S (2020) Steganalysis of Intra Prediction Mode and Motion Vector-based Steganography by Noise Residual Convolutional Neural Network. IOP Conference Series: Materials Science and Engineering 719(1):12068
Google Scholar
Liu Y, Liu S, Zhao H, Liu S (2018) A new data hiding method for H. 265/HEVC video streams without intra-frame distortion drift. Multimed Tools Appl:1–28
Liu Y, Qu X, Xin G (2016) A ROI-based reversible data hiding scheme in encrypted medical images. J Vis Commun Image Represent 39:51–57
Google Scholar
W Lu, R Li, L Zeng, J Chen, J Huang, and Y-Q Shi (2019). “Binary image steganalysis based on histogram of structuring elements,” IEEE Trans. Circuits Syst. Video Technol
Lubacz J, Mazurczyk W, Szczypiorski K (2014) Principles and overview of network steganography. IEEE Commun Mag 52(5):225–229
Google Scholar
Luo T, Jiang G, Yu M, Xu H, Gao W (2018) Sparse recovery based reversible data hiding method using the human visual system. Multimed Tools Appl 77(15):19027–19050
Google Scholar
G Manikandan, R Bala Krishnan, N Rajesh Kumar, N Sairam, and NR Raajan (2017). “A steganographic approach for realizing medical data privacy in a distributed environment,” Biomed. Res., vol. 28, no. 3
Manisha S, Sharmila TS (2019) A two-level secure data hiding algorithm for video steganography. Multidim Syst Sign Process 30(2):529–542
MATH
Google Scholar
W Mazurczyk, M Karas, and K Szczypiorski (2013). “SkyDe: a Skype-based steganographic method,” arXiv Prepr. arXiv1301.3632
Mazurczyk W, Wendzel S (2017) Information hiding: challenges for forensic experts. Commun ACM 61(1):86–94
Google Scholar
Mercuri RT (2004) The many colors of multimedia security. Commun ACM 47(12):25–29
Google Scholar
Miri A, Faez K (2017) Adaptive image steganography based on transform domain via genetic algorithm. Optik (Stuttg) 145:158–168
Google Scholar
Miri A, Faez K (2018) An image steganography method based on integer wavelet transform. Multimed Tools Appl 77(11):13133–13144
Google Scholar
Mousavi SM, Naghsh A, Abu-Bakar SAR (2014) Watermarking techniques used in medical images: a survey. J Digit Imaging 27(6):714–729
Google Scholar
Mstafa RJ, Elleithy KM (2016) A video steganography algorithm based on Kanade-Lucas-Tomasi tracking algorithm and error correcting codes. Multimed Tools Appl 75(17):10311–10333
Google Scholar
RJ Mstafa and KM Elleithy (2016). “A DCT-based robust video steganographic method using BCH error correcting codes,” in 2016 IEEE Long Island Systems, Applications and Technology Conference (LISAT), pp. 1–6
Mstafa RJ, Elleithy KM, Abdelfattah E (2017) A robust and secure video steganography method in DWT-DCT domains based on multiple object tracking and ECC. IEEE Access 5:5354–5365
Google Scholar
RJ Mstafa and KM Ellleithy (2016). “An Efficient Video Steganography Algorithm Based on BCH Codes,” ASEE, no. May 2015
Muhammad K, Ahmad J, Rehman NU, Jan Z, Sajjad M (2017) CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method. Multimed Tools Appl 76(6):8597–8626
Google Scholar
Muhammad K, Ahmad J, Rho S, Baik SW (2017) Image steganography for authenticity of visual contents in social networks. Multimed Tools Appl 76(18):18985–19004
Google Scholar
Muhammad K, Sajjad M, Baik SW (2016) Dual-level security based cyclic18 steganographic method and its application for secure transmission of keyframes during wireless capsule endoscopy. J. Med. Syst. 40(5):114
Google Scholar
Muhammad K, Sajjad M, Mehmood I, Rho S, Baik SW (2016) A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image. Multimed Tools Appl 75(22):14867–14893
Google Scholar
Mungmode S, Sedamkar RR, Kulkarni N (2016) A modified high frequency adaptive security approach using steganography for region selection based on threshold value. Procedia Comput Sci 79:912–921
Google Scholar
Neuner S, Voyiatzis AG, Schmiedecker M, Brunthaler S, Katzenbeisser S, Weippl ER (2016) Time is on my side: steganography in filesystem metadata. Digit Investig 18:S76–S86
Google Scholar
Nie Q, Weng J, Xu X, Feng B (2018) Defining embedding distortion for intra prediction mode-based video steganography. Comput Mater Contin 55:59–70
Google Scholar
H Nyeem (2017). “Reversible data hiding with image bit-plane slicing,” in 2017 20th International Conference of Computer and Information Technology (ICCIT), pp. 1–6
F Pan, L Xiang, X Yang, and Y Guo (2010). “Video steganography using motion vector and linear block codes,” 2010 IEEE Int. Conf. Softw. Eng. Serv. Sci., no. 60842006, pp. 592–595
HN Patel, DR Khant, and D Prajapati (2017). “Design of a color palette based image steganography algorithm for fractal images,” in 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), pp. 2584–2589
Patel A, Shah M, Chandramouli R, Subbalakshmi KP (2007) Covert channel forensics on the internet: issues, approaches, and experiences. IJ Netw Secur 5(1):41–50
Google Scholar
Perumal K, Muthusamy S, Gengavel G (2018) Sparse data encoder and decoder to improve security in video steganography. Concurr Comput Pract Exp:1–7
Pevny T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Trans Inf Forensics Secur 5(2):215–224
Google Scholar
T Pevny, T Filler, and P Bas (2010). “Using high-dimensional image models to perform highly undetectable steganography,” in International Workshop on Information Hiding, pp. 161–177
B Pfitzmann (1996). “Information hiding terminology-results of an informal plenary meeting and additional proposals,” in Proceedings of the First International Workshop on Information Hiding, pp. 347–350
Pinson MH, Wolf S (2004) A new standardized method for objectively measuring video quality. IEEE Trans Broadcast 50(3):312–322
Google Scholar
V Pomponiu, D Cavagnino, and M Botta (2018). “Data Hiding in the Wild: Where Computational Intelligence Meets Digital Forensics,” in Surveillance in Action, Springer, pp. 301–331
Y Qian, J Dong, W Wang, and T Tan (2016). “Learning and transferring representations for image steganalysis using convolutional neural network,” in 2016 IEEE international conference on image processing (ICIP), pp. 2752–2756
Qu Z, Cheng Z, Wang X (2019) Matrix coding-based quantum image steganography algorithm. IEEE Access 7:35684–35698
Google Scholar
Rabie T, Baziyad M (2019) The Pixogram: addressing high payload demands for video steganography. IEEE Access 7:21948–21962
Google Scholar
Rabie T, Kamel I (2017) High-capacity steganography: a global-adaptive-region discrete cosine transform approach. Multimed Tools Appl 76(5):6473–6493
Google Scholar
R Rahim, S Nadeem, and others (2018). “End-to-End Trained CNN Encoder-Decoder Networks for Image Steganography,” in Proceedings of the European Conference on Computer Vision (ECCV), p. 0
Rajalakshmi K, Mahesh K (2018) ZLBM: zero level binary mapping technique for video security. Multimed Tools Appl 77(11):13225–13247
Google Scholar
Rajendran S, Doraipandian M (2017) Chaotic map based random image steganography using LSB technique. IJ Netw Secur 19(4):593–598
Google Scholar
Ramalingam M, Ashidi N, Isa M (2015) Fast retrieval of hidden data using enhanced hidden Markov model in video steganography. Appl Soft Comput J 34:744–757
Google Scholar
Ramalingam M, Isa NAM (2016) A data-hiding technique using scene-change detection for video steganography. Comput Electr Eng 54:423–434
Google Scholar
Y Ren, L Zhai, L Wang, and T Zhu (2014). “Video steganalysis based on subtractive probability of optimal matching feature,” in Proceedings of the 2nd ACM workshop on Information hiding and multimedia security, pp. 83–90
K Rezagholipour and M Eshghi (2016). “Video Steganography Algorithm based on motion vector of moving object,” in Information and Knowledge Technology (IKT), 2016 Eighth International Conference on, pp. 183–187
IE Richardson (2004). H. 264 and MPEG-4 video compression: video coding for next-generation multimedia. Wiley
Rocha A, Scheirer W, Boult T, Goldenstein S (2011) Vision of the unseen: Current trends and challenges in digital image and video forensics. ACM Comput. Surv 43(4):26
Google Scholar
Sadat ES, Faez K, Saffari Pour M (2018) Entropy-based video Steganalysis of motion vectors. Entropy 20(4):244–257
Google Scholar
Sadek MM, Khalifa AS, Mostafa MGM (2017) Robust video steganography algorithm using adaptive skin-tone detection. Multimed Tools Appl 76(2):3065–3085
Google Scholar
Sahu AK, Swain G (2020) Reversible image steganography using dual-layer LSB matching. Sens. Imaging 21(1):1
Google Scholar
Saidi M, Hermassi H, Rhouma R, Belghith S (2017) A new adaptive image steganography scheme based on DCT and chaotic map. Multimed Tools Appl 76(11):13493–13510
Google Scholar
S Sajasi and AME Moghadam (2013). “A high quality image steganography scheme based on fuzzy inference system,” in 2013 13th Iranian Conference on Fuzzy Systems (IFSC), pp. 1–6
N Sathisha, R Priya, KS Babu, KB Raja, KR Venugopal, and LM Patnaik (2013). “DTCWT based high capacity steganography using coefficient replacement and adaptive scaling,” in Sixth International Conference on Machine Vision (ICMV 2013), vol. 9067, p. 90671O
G Savithri, S Mane, JS Banu, and others (2017). “Parallel Implementation of RSA 2D-DCT Steganography and Chaotic 2D-DCT Steganography,” in Proceedings of International Conference on Computer Vision and Image Processing, pp. 593–605
Shafi I, Noman M, Gohar M, Ahmad A, Khan M, Din S, Ahmad SH, Ahmad J (2018) An adaptive hybrid fuzzy-wavelet approach for image steganography using bit reduction and pixel adjustment. Soft Comput 22(5):1555–1567
Google Scholar
PD Shah and RS Bichkar (2018). “A secure spatial domain image steganography using genetic algorithm and linear congruential generator,” in International Conference on Intelligent Computing and Applications, pp. 119–129
Sheng Q, Wang RD, Huang ML, Li Q, Xu DW (2017) A prediction mode steganalysis detection algorithm for hevc. J Opt 28(4):433–440
Google Scholar
D Singla and M Juneja (2014). “An analysis of edge based image steganography techniques in spatial domain,” in 2014 Recent Advances in Engineering and Computational Sciences (RAECS), pp. 1–5
Singla D, Juneja M (2014) New information hiding technique using features of image. J Emerg Technol Web Intell 6(2):237–242
Google Scholar
X Song, Z Li, L Chen, and J Liu (2016). “Entropy feature based on 2D Gabor wavelets for JPEG steganalysis,” in International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, pp. 59–72
X Song, F Liu, C Yang, X Luo, and Y Zhang (2015). “Steganalysis of adaptive JPEG steganography using 2D Gabor filters,” in Proceedings of the 3rd ACM workshop on information hiding and multimedia security, pp. 15–23
C Stier (2010). “Russian spy ring hid secret messages on the web,”. [Online]. Available: https://www.newscientist.com/article/dn19126-russian-spy-ring-hid-secret-messages-on-the-web/. [Accessed: 11-Jan-2017]
T Stütz, F Autrusseau, and A Uhl (2013). “Inter-frame H. 264/CAVLC structure-preserving substitution watermarking
Su Y, Yu F, Zhang C (2017) Digital video Steganalysis based on a spatial temporal detector. TIIS 11(1):360–373
Google Scholar
Subhedar MS, Mankar VH (2014) Current status and key issues in image steganography: a survey. Comput Sci Rev 13:95–113
MATH
Google Scholar
Subhedar MS, Mankar VH (2016) Image steganography using redundant discrete wavelet transform and QR factorization. Comput Electr Eng 54:406–422
Google Scholar
Subhedar MS, Mankar VH (2018) Curvelet transform and cover selection for secure steganography. Multimed Tools Appl 77(7):8115–8138
Google Scholar
Sudeepa KB, Raju K, HS RK, Aithal G (2016) A new approach for video steganography based on randomization and parallelization. Procedia Comput Sci 78:483–490
Google Scholar
Suttichaiya A, Sombatkiripaiboon Y, Imtongkhua P, Poonriboon C, So-In C, Horkaew P (2017) Video steganography with LSB color detection. J Telecommun Electron Comput Eng 9(2–2):23–28
Google Scholar
Swain G (2016) A steganographic method combining LSB substitution and PVD in a block. Procedia Comput Sci 85:39–44
Google Scholar
Tang M, Hu J, Song W (2014) A high capacity image steganography using multi-layer embedding. Optik (Stuttg) 125(15):3972–3976
Google Scholar
Tang W, Li B, Tan S, Barni M, Huang J (2019) CNN-based adversarial embedding for image steganography. IEEE Trans Inf Forensics Secur 14(8):2074–2087
Google Scholar
Tang W, Tan S, Li B, Huang J (2017) Automatic steganographic distortion learning using a generative adversarial network. IEEE Signal Process Lett 24(10):1547–1551
Google Scholar
Tanwar R, Malhotrab S (2017) Scope of Support Vector Machine in Steganography. IOP Conf. Series: Materials and Engineering 225:12077
Google Scholar
Tasdemir K, Kurugollu F, Sezer S (2016) Spatio-temporal rich model-based video Steganalysis on cross sections of motion vector Planes. IEEE Trans Image Process 25(7):3316–3328
MathSciNet
MATH
Google Scholar
Tavares R, Madeiro F (2016) Word-hunt: a LSB steganography method with low expected number of modifications per pixel. IEEE Lat Am Trans 14(2):1058–1064
Google Scholar
Thomee B, Shamma DA, Friedland G, Elizalde B, Ni K, Poland D, Borth D, Li L-J (2016) YFCC100M: the new data in multimedia research. Commun ACM 59(2):64–73
Google Scholar
MRN Torkaman, P Nikfard, NS Kazazi, MR Abbasy, and SF Tabatabaiee (2011). “Improving hybrid cryptosystems with DNA steganography,” in International Conference on Digital Enterprise and Information Systems, pp. 42–52
Tsang CF, Fridrich J (2018) Steganalyzing images of arbitrary size with CNNs. Electron. Imaging 2018(7):121
Google Scholar
R Umadevi (2016). “Joint approach for secure communication using video steganography: Achieving better communication based on video steganography,” in 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), pp. 3104–3106
Veena ST, Arivazhagan S (2018) Quantitative steganalysis of spatial LSB based stego images using reduced instances and features. Pattern Recogn Lett 105:39–49
Google Scholar
D Volkhonskiy, I Nazarov, and E Burnaev (2020). “Steganographic generative adversarial networks,” in Twelfth International Conference on Machine Vision (ICMV 2019), vol. 11433, p. 114333M
Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612
Google Scholar
Wang P, Cao Y, Zhao X (2017) Segmentation based video Steganalysis to detect motion vector modification. Secur Commun Networks 2017:1–12
Google Scholar
Y Wang, Y Cao, X Zhao, Z Xu, and M Zhu (2018). “Maintaining Rate-Distortion Optimization for IPM-Based Video Steganography by Constructing Isolated Channels in HEVC,” in Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, pp. 97–107
Z Wang, X Zhao, H Wang, and G Cui (2013). “Information hiding based on DNA steganography,” in 2013 IEEE 4th International Conference on Software Engineering and Service Science, pp. 946–949
Warkentin M, Bekkering E, Schmidt MB (2008) Steganography: Forensic, Security, and Legal Issues. J. Digit. Forensics, Secur. Law JDFSL 3(2):17
Google Scholar
C-Y Weng, C-T Huang, and H-W Kao (2017). “DCT-based compressed image with reversibility using modified quantization,” in International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 214–221
E Wengrowski and K Dana (2019). “Light Field Messaging With Deep Photographic Steganography,” in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1515–1524
C Whitelam, N Osia, and T Bourlai (2013). “Securing multimodal biometric data through watermarking and steganography,” in 2013 IEEE International Conference on Technologies for Homeland Security (HST), pp. 61–66
Wiegand T, Sullivan GJ, Bjontegaard G, Luthra A (2003) Overview of the H. 264/AVC video coding standard. IEEE Trans circuits Syst video Technol 13(7):560–576
Google Scholar
C. Xu, X. Ping, and T. Zhang, “Steganography in compressed video stream,” in Innovative Computing, Information and Control, 2006. ICICIC’06. First international conference on, 2006, vol. 1, pp. 269–272.
Xu D, Wang R, Shi YQ (2016) An improved scheme for data hiding in encrypted H.264/AVC videos. J Vis Commun Image Represent 36:229–242
Google Scholar
Xu G, Wu H-Z, Shi Y-Q (2016) Structural design of convolutional neural networks for steganalysis. IEEE Signal Process Lett 23(5):708–712
Google Scholar
G Xu, H-Z Wu, and YQ Shi (2016). “Ensemble of CNNs for steganalysis: An empirical study,” in Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, pp. 103–107
Xue Y, Liu W, Lu W, Yeung Y, Liu X, Liu H (2019) Efficient halftone image steganography based on dispersion degree optimization. J Real-Time Image Process 16(3):601–609
Google Scholar
Xue Y, Zhou J, Zeng H, Zhong P, Wen J (2019) An adaptive steganographic scheme for H. 264/AVC video with distortion optimization. Signal Process Image Commun 76:22–30
Google Scholar
Yang C-N, Chen T-S, Yu KH, Wang C-C (2007) Improvements of image sharing with steganography and authentication. J Syst Softw 80(7):1070–1076
Google Scholar
Yang C, Kang Y, Liu F, Song X, Wang J, Luo X (2020) Color image steganalysis based on embedding change probabilities in differential channels. Int. J. Distrib. Sens. Networks 16(5):1550147720917826
Google Scholar
Yang C, Luo X, Lu J, Liu F (2018) Extracting hidden messages of MLSB steganography based on optimal stego subset. Sci. China Inf. Sci 61(11):119103
Google Scholar
Yao Y, Zhang W, Yu N (2016) Inter-frame distortion drift analysis for reversible data hiding in encrypted H.264/AVC video bitstreams. Signal Process 128:531–545
Google Scholar
Yao Y, Zhang W, Yu N, Zhao X (2015) Defining embedding distortion for motion vector-based video steganography. Multimed Tools Appl 74(24):11163–11186
Google Scholar
Ye J, Ni J, Yi Y (2017) Deep learning hierarchical representations for image steganalysis. IEEE Trans Inf Forensics Secur 12(11):2545–2557
Google Scholar
M Yedroudj, F Comby, and M Chaumont (2018). “Yedroudj-net: An efficient CNN for spatial steganalysis,” in 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2092–2096
Zarmehi N, Akhaee MA (2016) Digital video steganalysis toward spread spectrum data hiding. IET Image Process 10(1):1–8
Google Scholar
Zeng J, Tan S, Li B, Huang J (2017) Large-scale JPEG image steganalysis using hybrid deep-learning framework. IEEE Trans Inf Forensics Secur 13(5):1200–1214
Google Scholar
L Zhai, L Wang, and Y Ren (2019). “Universal detection of video steganography in multiple domains based on the consistency of motion vectors,” IEEE Trans. Inf. Forensics Secur
Zhang X (2011) Reversible data hiding in encrypted image. IEEE Signal Process Lett 18(4):255–258
Google Scholar
Zhang R, Dong S, Liu J (2019) Invisible steganography via generative adversarial networks. Multimed Tools Appl 78(7):8559–8575
Google Scholar
Zhang X, Peng F, Long M (2018) Robust coverless image steganography based on DCT and LDA topic classification. IEEE Trans Multimed 20(12):3223–3238
Google Scholar
Zhang T, Ping X (2003) A new approach to reliable detection of LSB steganography in natural images. Signal Process 83(10):2085–2093
MATH
Google Scholar
Zhang T, Zhang H, Wang R, Wu Y (2019) A new JPEG image steganalysis technique combining rich model features and convolutional neural networks. Math Biosci Eng 16(5):4069–4081
Google Scholar
R Zhang, F Zhu, J Liu, and G Liu (2018). “Efficient feature learning and multi-size image steganalysis based on CNN,” arXiv Prepr. arXiv1807.11428
Y Zhao, H Zhang, Y Cao, P Wang, and X Zhao (2015). “Video Steganalysis Based on Intra Prediction Mode Calibration,” in International Workshop on Digital Watermarking, pp. 119–133