Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2014
DOI: 10.1007/s11042-014-1952-z
|View full text |Cite
|
Sign up to set email alerts
|

Video steganography: a comprehensive review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
64
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 130 publications
(64 citation statements)
references
References 69 publications
0
64
0
Order By: Relevance
“…The word steganography is of Greek origin. It is derived from two Greek words "stegos" which means "cover" and "grafia" which means "writing" [87]. It is generally used for the secure communication to hide it from attackers that create difficulties for unintended user to extract the information.…”
Section: Steganographymentioning
confidence: 99%
See 2 more Smart Citations
“…The word steganography is of Greek origin. It is derived from two Greek words "stegos" which means "cover" and "grafia" which means "writing" [87]. It is generally used for the secure communication to hide it from attackers that create difficulties for unintended user to extract the information.…”
Section: Steganographymentioning
confidence: 99%
“…A detailed study of steganographic approaches and their classification based on different criteria are given in [17,87,92]. In this chapter steganographic schemes have been classified into spatial and frequency domain.…”
Section: Steganographymentioning
confidence: 99%
See 1 more Smart Citation
“…In order to increase the security of communication sometimes steganography is combined with cryptography where in an attacker may be able to extract the message from the cover work but the attacker has to break the encryption code to see the message hidden. Cryptography scramble the cover work or message in such a way that it is meaningless to the other party [2]. If any third party come in hand with the secret key for encryption, they can decrypt the digital content and shared it in the digital media, hence the problem remains the same.…”
Section: Introductionmentioning
confidence: 99%
“…Generally, the video is comprised of number of images (frames) with or without sound. Therefore, the video steganography can be regarded as an extension of image steganography [4]. Secure information embedded in a stenographic video has a lower probability of interpretation by unauthorized intruder as compared to image steganography.…”
Section: Introductionmentioning
confidence: 99%