2019 Fifth International Conference on Science Technology Engineering and Mathematics (ICONSTEM) 2019
DOI: 10.1109/iconstem.2019.8918827
|View full text |Cite
|
Sign up to set email alerts
|

Probing Image and Video Steganography based On Discrete Wavelet and Discrete Cosine Transform

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 10 publications
0
0
0
Order By: Relevance
“…Data hiding embeds data into the cover video contents so that it looks identical to the original video [5]. Current video steganography algorithms can be divided into three categories according to the embedding position: the embedding position is in the original video domain [6]- [7], the embedding position is in the compressed domain [8]- [9], and the embedding position is in the bitstream domain [10]- [12]. In past research, many scholars have devoted themselves to embedding video attribute message into videos to ensure video security [13]- [14].…”
Section: Introductionmentioning
confidence: 99%
“…Data hiding embeds data into the cover video contents so that it looks identical to the original video [5]. Current video steganography algorithms can be divided into three categories according to the embedding position: the embedding position is in the original video domain [6]- [7], the embedding position is in the compressed domain [8]- [9], and the embedding position is in the bitstream domain [10]- [12]. In past research, many scholars have devoted themselves to embedding video attribute message into videos to ensure video security [13]- [14].…”
Section: Introductionmentioning
confidence: 99%