2018 2nd International Conference on Trends in Electronics and Informatics (ICOEI) 2018
DOI: 10.1109/icoei.2018.8553847
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Different Video Steganography Techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 16 publications
0
4
0
Order By: Relevance
“…Access to video processing software is a major factor in the rise of videos as a means of online communication. Using video steganography, data may be hidden in a video while leaving the video's visual quality intact 4 . The statistical analysis of visual characteristics and the temporal analysis of motion information have been proposed as robust methodologies.…”
Section: Figure 1 Different Kinds Of Cover Mediums For Steganographymentioning
confidence: 99%
“…Access to video processing software is a major factor in the rise of videos as a means of online communication. Using video steganography, data may be hidden in a video while leaving the video's visual quality intact 4 . The statistical analysis of visual characteristics and the temporal analysis of motion information have been proposed as robust methodologies.…”
Section: Figure 1 Different Kinds Of Cover Mediums For Steganographymentioning
confidence: 99%
“…To measure the robustness of the proposed approach, two measures were used, namely the Normalized Correlation (NC) and the Bit Error Rate (BER). NC is used to measure the similarity between original and extracted secret image [28,29]. NC is calculated as follows: (11) Whereas BER is used to measure the error rate between original and extracted secret image.…”
Section:  Evaluationmentioning
confidence: 99%
“…Maximizing the embedding rate for a given undetectability is fundamental to any steganographic algorithm. Multimedia objects are excellent choices for steganography due to their rich structural features and their ubiquity in business and daily life [5], [6].…”
Section: Introductionmentioning
confidence: 99%