View Filters

Reset Filters to Default:

Reset All Filters

Detail Level:

Time Interval (Years):

From: To: Set Time Interval
Citations Report
 
 
Cited Paper
[Conf 1]Embedding Data in Video Stream Using Steganography
Author(s): Stanescu, Daniela; Stratulat, Mircea; Ciubotaru, Bogdan; Chiciudean, Dan; Cioarga, Razvan Dorel; Micea, Mihai Victor
In: Proceedings of the 32-nd IEEE International Symposium on Applied Computational Intelligence and Informatics, SACI 2007
Editor(s): Fodor, Janos; Prostean, Octavian
Publisher: Politehnica University of Timisoara and Budapest Tech
Timisoara, Romania, 17-18 May. 2007
Pages: 241 - 244, ISBN 978-1-4244-1234-X, DOI: 10.1109/SACI.2007.375518
Indexed: ISI Web of Science, Thomson Reuters (WOS: 000248622500042)
33
 [+] Keywords | [+] Abstract | Cover picture | Proceedings info | IEEE Index Record (Inspec) | DBLP Index Record
Cryptography; Data communication; Data encapsulation; Video coding; Video communication; Video streaming; Watermarking
The transmission of streaming data, because of its real-time nature, is subject to bandwidth constraints. We propose a MPEG-2 compliant decoder which uses data hiding to transmit additional data with no extra bandwidth while creating an almost imperceptible degradation of the picture. The additional data can be anything from subtitles to correction signals and watermarking.
28 Citations in total (with a cummulated IF: 27.708)
 
 
Citing papers
[Jrnl 28]
Jrnl
Mukesh Dalal, Mamta Juneja, "A survey on information hiding using video steganography", Artificial Intelligence Review, volume 54, issue 8, Springer, The Netherlands, Dec., 2021, pp. (5831 - 5895), ISSN 0269-2821, DOI: 10.1007/s10462-021-09968-0. [Indexed: ISI Web of Science, Clarivate Analytics]. [IF: 9.588].
[Jrnl 27]
Jrnl
Meenu Suresh, I. S. Sam, "Exponential fractional cat swarm optimization for video steganography", Multimedia Tools and Applications, volume 80, issue 9, Springer Science and Business Media, Boston, USA, Apr., 2021, pp. (13253 - 13270), ISSN 1380-7501, DOI: 10.1007/s11042-020-10395-6. [Indexed: ISI Web of Science, Clarivate Analytics]. [IF: 2.577].
[Conf 26]
Conf
N. Kanwal, M.N. Asghar, M. Samar Ansari, B. Lee, M. Fleury, M. Herbst, Y. Qiao, "Chain-of-Evidence in Secured Surveillance Videos using Steganography and Hashing", in Proceedings of the IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC, volume 18, IEEE, Online, 17-24 Aug., 2020, pp. (257 - 264), ISBN 978-1-7281-6609-4, DOI: 10.1109/DASC-PICom-CBDCom-CyberSciTech49142.2020.00053. [Indexed: Scopus, Elsevier].
[Jrnl 25]
Jrnl
Nadia Kanwal, Mamoona N. Asghar, Mohammad S. Ansari, Martin Fleury, et al., "Preserving Chain-of-Evidence in Surveillance Videos for Authentication and Trust-Enabled Sharing", IEEE Access, volume 8, IEEE, USA, 2020, pp. (153413 - 153424), ISSN 2169-3536, DOI: 10.1109/ACCESS.2020.3016211. [Indexed: ISI Web of Science, Clarivate Analytics]. [IF: 3.367].
[Jrnl 24]
Jrnl
Ramadhan J. Mstafa, Khaled M. Elleithy, "Compressed and raw video steganography techniques: a comprehensive survey and analysis", Multimedia Tools and Applications, volume 76, issue 20, Springer, The Netherlands, Oct., 2017, pp. (21749 - 21786), ISSN 1380-7501, DOI: 10.1007/s11042-016-4055-1. [Indexed: ISI Web of Science, Thomson Reuters]. [IF: 1.530].
[Conf 23]
Conf
P. Mathivanan, A. Balaji Ganesh, "Colour image steganography using XOR multi-bit embedding process", in Proceedings of the International Conference on Energy, Communication, Data Analytics and Soft Computing, ICECDS 2017, IEEE, Chennai, India, 01-02 Aug., 2017, pp. (1980 - 1988), ISBN 978-1-5386-1887-5, DOI: 10.1109/ICECDS.2017.8389797. [Indexed: Scopus, Elsevier].
[Jrnl 22]
Jrnl
Mritha Ramalingam, Nor A. M. Isa, "A data-hiding technique using scene-change detection for video steganography", Computers & Electrical Engineering, volume 54, Pergamon-Elsevier Science Ltd., Oxford, UK, Aug., 2016, pp. (423 - 434), ISSN 0045-7906, DOI: 10.1016/j.compeleceng.2015.10.005. [Indexed: ISI Web of Science, Thomson Reuters]. [IF: 1.084].
[Jrnl 21]
Jrnl
Mritha Ramalingam, Nor A. M. Isa, "Transform Domain based Video Steganography Techniques", International Journal of Computer Science and Information Engineering, volume 7, issue 1, International Science Press, India, Jun., 2016, pp. (39 - 50), ISSN 0976-626X.
[Jrnl 20]
Jrnl
Gopesh Sardana, Nidhi Sharma, "Introducing a New Technique for Making a Secure Steganosystem", International Journal of Modern Computer Science, volume 4, issue 3, RES Publication, India, Jun., 2016, pp. (175 - 178), ISSN 2320-7868.
[Jrnl 19]
Jrnl
Faisal Baig, Muhammad F. Khan, Saira Beg, Tariq Shah, Khalid Saleem, "Onion steganography: a novel layering approach", Nonlinear Dynamics, volume 84, issue 3, Springer, The Netherlands, May., 2016, pp. (1431 - 1446), ISSN 0924-090X, DOI: 10.1007/s11071-015-2580-5. [Indexed: ISI Web of Science, Thomson Reuters]. [IF: 3.000].
[Jrnl 18]
Jrnl
Mennatallah M. Sadek, Amal S. Khalifa, Mostafa G. M. Mostafa, "Video Steganography: A Comprehensive Review", Multimedia Tools and Applications, volume 74, issue 17, Springer Science and Business Media, Boston, USA, Sep., 2015, pp. (7063 - 7094), ISSN 1380-7501, DOI: 10.1007/s11042-014-1952-z. [Indexed: ISI Web of Science, Thomson Reuters]. [IF: 1.058].
[Conf 17]
Conf
Nikita Lemos, Kavita Sonawane, Bidisha Roy, "Secure Data Transmission using Video", in Proceedings of the International Conference on Contemporary Computing, IC3 2015, volume 8, IEEE, India, 20-22 Aug., 2015, pp. (231 - 234), ISBN 978-1-4673-7948-9. [Indexed: ISI Web of Science, Thomson Reuters].
[Jrnl 16]
Jrnl
Onur Unlu, Hacer Karacan, "Lattice approach to video steganography", Turkish Journal of Electrical Engineering and Computer Sciences, volume 23, issue 1, TUBITAK, Ankara, TR, 2015, pp. (2074 - 2088), ISSN 1300-0632, DOI: 10.3906/elk-1302-21. [Indexed: ISI Web of Science, Thomson Reuters]. [IF: 0.518].
[Jrnl 15]
Jrnl
Muhammad F. Khan, Faisal Baig, Saira Beg, "Steganography Between Silence Intervals of Audio in Video Content Using Chaotic Maps", Circuits Systems and Signal Processing, volume 33, issue 12, Springer Science and Business Media, New York, USA, Dec., 2014, pp. (3901 - 3919), ISSN 0278-081X, DOI: 10.1007/s00034-014-9830-5. [Indexed: ISI Web of Science, Thomson Reuters]. [IF: 1.118].
[Conf 14]
Conf
R. Shanthakumari, S. Malliga, "Video Steganography Using LSB Matching Revisited Algorithm", in Proceedings of the IOSR Journal of Computer Engineering, IOSR-JCE, volume 16, issue 6, IOSR, India, Nov., 2014, pp. (1 - 6), ISSN 2278-8727.
[Conf 13]
Conf
T. S. Ghouse Basha, Syed H. Zabeen, "Design and Evolution of Performance of Spread Spectrum Techniques for Image Steganography Using MIGLS", in Proceedings of the International Journal of Innovative Research in Electrical, Electronics, Instrumentation and Control Engineering, IJIREEICE, volume 2, issue 9, IJIREEICE, Chennai, India, Sep., 2014, pp. (2036 - 2040), ISSN 2321-5526.
[Jrnl 12]
Jrnl
Yiqi Tew, KokSheik Wong, "An Overview of Information Hiding in H.264/AVC Compressed Video", IEEE Transactions on Circuits and Systems for Video Technology, volume 24, issue 2, IEEE, USA, Feb., 2014, pp. (305 - 319), ISSN 1051-8215, DOI: 10.1109/TCSVT.2013.2276710. [Indexed: ISI Web of Science, Thomson Reuters]. [IF: 2.259].
[Jrnl 11]
Jrnl
Yunjung Lee, "Streaming Video Service Model using Secure Steganographic Method", International Journal of Security and Its Applications, volume 7, issue 6, SERSC, Sandy Bay, Australia, Dec., 2013, pp. (79 - 88), ISSN 1738-9976, DOI: 10.14257/ijsia.2013.7.6.08.
[Jrnl 10]
Jrnl
M. Jyotheeswari, V. Lokeswara Reddy, "A Novel Steganographic System for Data Hiding in Video or Audio", International Journal of Computer Applications, volume 82, issue 11, Foundation of Computer Science (FCS), New York, USA, Nov., 2013, pp. (31 - 36), ISSN 0975-8887, DOI: 10.5120/14162-2253.
[Jrnl 9]
Jrnl
Samer Atawneh, Putra Sumari, "Hybrid and Blind Steganographic Method for Digital Images Based on DWT and Chaotic Map", Journal of Communications, volume 8, issue 11, Engineering and Technology Publishing, USA, Nov., 2013, pp. (690 - 699), ISSN 1796-2021, DOI: 10.12720/jcm.8.11.690-699. [Indexed: Scopus, Elsevier].
[Conf 8]
Conf
Xikai Xu, Jing Dong, Wei Wang, Tieniu Tan, "Video steganalysis based on the constraints of motion vectors", in Proceedings of the IEEE International Conference on Image Processing, ICIP 2013, volume 20, IEEE, Melbourne, Australia, 15-18 Sep., 2013, pp. (4422 - 4426), ISBN 978-1-4799-2341-0, DOI: 10.1109/ICIP.2013.6738911. [Indexed: ISI Web of Science, Thomson Reuters].
[Jrnl 7]
Jrnl
K. V. Vinodkumar, V. Lokeswara Reddy, "A Novel Data Embedding Technique for Hiding Text in Video File using Steganography ", International Journal of Computer Applications, volume 77, issue 17, Foundation of Computer Science (FCS), New York, USA, Sep., 2013, pp. (13 - 18), ISSN 0975-8887, DOI: 10.5120/13614-1384.
[Jrnl 6]
Jrnl
Samer Atawneh, Ammar Almomani, Putra Sumari, "Steganography in digital images: Common approaches and tools", IETE Technical Review, volume 30, issue 4, Medknow Publications & Media PVT Ltd., Mumbai, India, Jul., 2013, pp. (344 - 358), ISSN 0256-4602, DOI: 10.4103/0256-4602.116724. [Indexed: ISI Web of Science, Thomson Reuters]. [IF: 0.925].
[Jrnl 5]
Jrnl
Sateesh Gudla, Suchitra Reyya, Aswini Kotyada, Aditya Sangam, "Key Based Least Significant Bit (LSB) Insertion for Audio and Video Steganography", International Journal of Computer Science Engineering Research and Development, volume 3, issue 1, PRJ Publication, Chennai, India, Jan., 2013, pp. (60 - 69), ISSN 2248-9371.
[Jrnl 4]
Jrnl
Kousik Dasgupta, Jyotsna K. Mandal, Paramartha Dutta, "Hash Based Least Significant Bit Technique for Video Steganography (HLSB)", International Journal of Security, Privacy and Trust Management, volume 1, issue 2, AIRCC, India, Apr., 2012, pp. (1 - 11), ISSN 2319-4103, DOI: 10.5121/ijsptm.2012.2201.
[Jrnl 3]
Jrnl
Dipesh Agrawal, Nishant Khare, "Steganography and Steganalysis Using Service Oriented Architecture", International Journal of Electronics, Communication and Soft Computing Science and Engineering, issue Special Issue, New Delhi, India, 2012, pp. (77 - 78), ISSN 2277-9477.
[Jrnl 2]
Jrnl
Jafar Mansouri, Morteza Khademi, "An Adaptive Scheme for Compressed Video Steganography Using Temporal and Spatial Features of the Video Signal", International Journal of Imaging Systems and Technology, volume 19, issue 4, Wiley Periodicals, Dec., 2009, pp. (306 - 315), ISSN 1098-1098, DOI: 10.1002/ima.20207. [Indexed: ISI Web of Science, Thomson Reuters]. [IF: 0.684].
[Jrnl 1]
Jrnl
K.-G. Yuan, R. Zhang, X. Xu, X.-X. Niu, Y.-X. Yang, "Design of steganography algorithm based on MPEG-4 coding scheme", Journal on Communications, volume 30, issue 5, May., 2009, pp. (48 - 53), ISSN 1000-436X. [Indexed: Scopus, Elsevier].