Compressed and raw video steganography techniques: a comprehensive survey and analysis

被引:35
|
作者
Mstafa, Ramadhan J. [1 ]
Elleithy, Khaled M. [1 ]
机构
[1] Univ Bridgeport, Dept Comp Sci & Engn, Bridgeport, CT 06604 USA
关键词
Video steganography; Compressed domain; Raw domain; Video processing; Smart video transmission; Smart video tracking; Imperceptibility; Hiding capacity; INTELLIGENT REVERSIBLE WATERMARKING; DATA HIDING ALGORITHM; COPYRIGHT PROTECTION; IMAGE STEGANOGRAPHY; EMBEDDING ALGORITHM; BPCS STEGANOGRAPHY; INFORMATION; VECTOR; SCHEME; SECURE;
D O I
10.1007/s11042-016-4055-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the last two decades, the science of covertly concealing and communicating data has acquired tremendous significance due to the technological advancement in communication and digital content. Steganography is the art of concealing secret data in a particular interactive media transporter, e.g., text, audio, image, and video data in order to build a covert communication between authorized parties. Nowadays, video steganography techniques have become important in many video-sharing and social networking applications such as Livestreaming, YouTube, Twitter, and Facebook because of the noteworthy development of advanced video over the Internet. The performance of any steganographic method ultimately relies on the imperceptibility, hiding capacity, and robustness. In the past decade, many video steganography methods have been proposed; however, the literature lacks of sufficient survey articles that discuss all techniques. This paper presents a comprehensive study and analysis of numerous cutting edge video steganography methods and their performance evaluations from literature. Both compressed and raw video steganography methods are surveyed. In the compressed domain, video steganography techniques are categorized according to the video compression stages as venues for data hiding such as intra frame prediction, inter frame prediction, motion vectors, transformed and quantized coefficients, and entropy coding. On the other hand, raw video steganography methods are classified into spatial and transform domains. This survey suggests current research directions and recommendations to improve on existing video steganography techniques.
引用
收藏
页码:21749 / 21786
页数:38
相关论文
共 50 条
  • [1] Compressed and raw video steganography techniques: a comprehensive survey and analysis
    Ramadhan J. Mstafa
    Khaled M. Elleithy
    [J]. Multimedia Tools and Applications, 2017, 76 : 21749 - 21786
  • [2] A survey on compressed domain video analysis techniques
    R. Venkatesh Babu
    Manu Tom
    Paras Wadekar
    [J]. Multimedia Tools and Applications, 2016, 75 : 1043 - 1078
  • [3] A survey on compressed domain video analysis techniques
    Babu, R. Venkatesh
    Tom, Manu
    Wadekar, Paras
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (02) : 1043 - 1078
  • [4] Steganography in compressed video stream
    Xu, Changyong
    Ping, Xijian
    Zhang, Tao
    [J]. ICICIC 2006: FIRST INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING, INFORMATION AND CONTROL, VOL 1, PROCEEDINGS, 2006, : 269 - +
  • [5] Survey of Compressed Domain Video Summarization Techniques
    Basavarajaiah, Madhushree
    Sharma, Priyanka
    [J]. ACM COMPUTING SURVEYS, 2020, 52 (06)
  • [6] Study and investigation of video steganography over uncompressed and compressed domain: a comprehensive review
    Patel, Rachna
    Lad, Kalpesh
    Patel, Mukesh
    [J]. MULTIMEDIA SYSTEMS, 2021, 27 (05) : 985 - 1024
  • [7] Study and investigation of video steganography over uncompressed and compressed domain: a comprehensive review
    Rachna Patel
    Kalpesh Lad
    Mukesh Patel
    [J]. Multimedia Systems, 2021, 27 : 985 - 1024
  • [8] Comprehensive survey of 3D image steganography techniques
    Girdhar, Ashish
    Kumar, Vijay
    [J]. IET IMAGE PROCESSING, 2018, 12 (01) : 1 - 10
  • [9] Secure steganography in compressed video bitstreams
    Liu, Bin
    Liu, Fenlin
    Yang, Chunfang
    Sun, Yifeng
    [J]. ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 1382 - 1387
  • [10] A Novel Approach for Compressed Video Steganography
    Sherly, A. P.
    Sasidharan, Sapna
    Raj, Ashji S.
    Amritha, P. P.
    [J]. RECENT TRENDS IN NETWORK SECURITY AND APPLICATIONS, 2010, 89 : 567 - 575