2020
DOI: 10.1007/978-981-15-2329-8_16
|View full text |Cite
|
Sign up to set email alerts
|

Analysis and Implementation of IWT-SVD Scheme for Video Steganography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 8 publications
0
5
0
Order By: Relevance
“…The basic idea was to hide secret data inside the cover media to go unnoticed. Related works [4][5][6][7] based the design of their steganographic schemes on this idea.…”
Section: The Proposed Schemementioning
confidence: 99%
See 1 more Smart Citation
“…The basic idea was to hide secret data inside the cover media to go unnoticed. Related works [4][5][6][7] based the design of their steganographic schemes on this idea.…”
Section: The Proposed Schemementioning
confidence: 99%
“…Steganography is the art of writing secret data so that no one except the recipient is aware of the existence of the secret message [3]. Popular steganography techniques hide the secret in digital content such as text, image, video and audio files [4][5][6][7]. While other techniques insert the secret in the network protocols [8].…”
Section: Introductionmentioning
confidence: 99%
“…This approach involves fragmenting sensitive messages into discreet segments, which are then distributed across an array of covert communication channels. This strategy adds a layer of complexity, significantly enhancing the challenge of detecting and reconstructing the concealed message [27][28][29][30][31][32]. This technique finds utility in scenarios where multiple independent parties collaborate covertly.…”
Section: Introductionmentioning
confidence: 99%
“…This approach involves fragmenting sensitive messages into discreet segments, which are then distributed across an array of covert communication channels. This strategy adds a layer of complexity, significantly enhancing the challenge of detecting and reconstructing the concealed message [28][29][30][31][32][33]. This technique finds utility in scenarios where multiple independent parties collaborate covertly.…”
Section: Introductionmentioning
confidence: 99%