View Filters

Reset Filters to Default:

Reset All Filters

Detail Level:

Time Interval (Years):

From: To: Set Time Interval
Citations Report
 
 
Cited Paper
[Conf 1]Embedding Data in Video Stream Using Steganography
Author(s): Stanescu, Daniela; Stratulat, Mircea; Ciubotaru, Bogdan; Chiciudean, Dan; Cioarga, Razvan Dorel; Micea, Mihai Victor
In: Proceedings of the 32-nd IEEE International Symposium on Applied Computational Intelligence and Informatics, SACI 2007
Editor(s): Fodor, Janos; Prostean, Octavian
Publisher: Politehnica University of Timisoara and Budapest Tech
Timisoara, Romania, 17-18 May. 2007
Pages: 241 - 244, ISBN 978-1-4244-1234-X, DOI: 10.1109/SACI.2007.375518
Indexed: ISI Web of Science, Thomson Reuters (WOS: 000248622500042)
33
 [+] Keywords | [+] Abstract | Cover picture | Proceedings info | IEEE Index Record (Inspec) | DBLP Index Record
Cryptography; Data communication; Data encapsulation; Video coding; Video communication; Video streaming; Watermarking
The transmission of streaming data, because of its real-time nature, is subject to bandwidth constraints. We propose a MPEG-2 compliant decoder which uses data hiding to transmit additional data with no extra bandwidth while creating an almost imperceptible degradation of the picture. The additional data can be anything from subtitles to correction signals and watermarking.
28 Citations in total (with a cummulated IF: 27.708)
 
 
Citing papers
[Jrnl 28]M. Dalal, M. Juneja, "A survey on information hiding using video steganography", Artif. Intell. Rev., vol. 54 (8), Springer, The Netherlands, Dec. 2021, pp. (5831 - 5895), ISSN 0269-2821, DOI: 10.1007/s10462-021-09968-0. [Indexed: ISI Web of Science, Clarivate Analytics].
[Jrnl 27]M. Suresh, I. S. Sam, "Exponential fractional cat swarm optimization for video steganography", Multimed. Tools Appl., vol. 80 (9), Springer Science and Business Media, Boston, USA, Apr. 2021, pp. (13253 - 13270), ISSN 1380-7501, DOI: 10.1007/s11042-020-10395-6. [Indexed: ISI Web of Science, Clarivate Analytics].
[Conf 26]N. Kanwal, M. Asghar, M. Samar Ansari, B. Lee, M. Fleury, M. Herbst, Y. Qiao, "Chain-of-Evidence in Secured Surveillance Videos using Steganography and Hashing", in Proc. IEEE Int C Depend., Auton. Secur. Comput., DASC, vol. 18, IEEE, Online, 17-24 Aug., 2020, pp. (257 - 264), ISBN 978-1-7281-6609-4, DOI: 10.1109/DASC-PICom-CBDCom-CyberSciTech49142.2020.00053. [Indexed: Scopus, Elsevier].
[Jrnl 25]N. Kanwal, M. N. Asghar, M. S. Ansari, M. Fleury, . et al., "Preserving Chain-of-Evidence in Surveillance Videos for Authentication and Trust-Enabled Sharing", IEEE Access, vol. 8, IEEE, USA, 2020, pp. (153413 - 153424), ISSN 2169-3536, DOI: 10.1109/ACCESS.2020.3016211. [Indexed: ISI Web of Science, Clarivate Analytics].
[Jrnl 24]R. J. Mstafa, K. M. Elleithy, "Compressed and raw video steganography techniques: a comprehensive survey and analysis", Multimed. Tools Appl., vol. 76 (20), Springer, The Netherlands, Oct. 2017, pp. (21749 - 21786), ISSN 1380-7501, DOI: 10.1007/s11042-016-4055-1. [Indexed: ISI Web of Science, Thomson Reuters].
[Conf 23]P. Mathivanan, A. Balaji Ganesh, "Colour image steganography using XOR multi-bit embedding process", in Proc. Int. C Energ. Commun. Data Analyt. Soft Comput., ICECDS 2017, IEEE, Chennai, India, 01-02 Aug., 2017, pp. (1980 - 1988), ISBN 978-1-5386-1887-5, DOI: 10.1109/ICECDS.2017.8389797. [Indexed: Scopus, Elsevier].
[Jrnl 22]M. Ramalingam, N. A. M. Isa, "A data-hiding technique using scene-change detection for video steganography", Comput. Electr. Eng., vol. 54, Pergamon-Elsevier Science Ltd., Oxford, UK, Aug. 2016, pp. (423 - 434), ISSN 0045-7906, DOI: 10.1016/j.compeleceng.2015.10.005. [Indexed: ISI Web of Science, Thomson Reuters].
[Jrnl 21]M. Ramalingam, N. A. M. Isa, "Transform Domain based Video Steganography Techniques", Int. J Comput. Sci. Information Tech., vol. 7 (1), International Science Press, India, Jun. 2016, pp. (39 - 50), ISSN 0976-626X.
[Jrnl 20]G. Sardana, N. Sharma, "Introducing a New Technique for Making a Secure Steganosystem", Int. J Modern Comput. Sci., vol. 4 (3), RES Publication, India, Jun. 2016, pp. (175 - 178), ISSN 2320-7868.
[Jrnl 19]F. Baig, M. F. Khan, S. Beg, T. Shah, K. Saleem, "Onion steganography: a novel layering approach", Nonlinear Dyn., vol. 84 (3), Springer, The Netherlands, May. 2016, pp. (1431 - 1446), ISSN 0924-090X, DOI: 10.1007/s11071-015-2580-5. [Indexed: ISI Web of Science, Thomson Reuters].
[Jrnl 18]M. M. Sadek, A. S. Khalifa, M. G. M. Mostafa, "Video Steganography: A Comprehensive Review", Multimed. Tools Appl., vol. 74 (17), Springer Science and Business Media, Boston, USA, Sep. 2015, pp. (7063 - 7094), ISSN 1380-7501, DOI: 10.1007/s11042-014-1952-z. [Indexed: ISI Web of Science, Thomson Reuters].
[Conf 17]N. Lemos, K. Sonawane, B. Roy, "Secure Data Transmission using Video", in Proc. Int. C Contemporary Comput., IC3 2015, vol. 8, IEEE, India, 20-22 Aug., 2015, pp. (231 - 234), ISBN 978-1-4673-7948-9. [Indexed: ISI Web of Science, Thomson Reuters].
[Jrnl 16]O. Unlu, H. Karacan, "Lattice approach to video steganography", Turk. J Electr. Eng. Comput. Sci., vol. 23 (1), TUBITAK, Ankara, TR, 2015, pp. (2074 - 2088), ISSN 1300-0632, DOI: 10.3906/elk-1302-21. [Indexed: ISI Web of Science, Thomson Reuters].
[Jrnl 15]M. F. Khan, F. Baig, S. Beg, "Steganography Between Silence Intervals of Audio in Video Content Using Chaotic Maps", Circuits Syst. Signal Process., vol. 33 (12), Springer Science and Business Media, New York, USA, Dec. 2014, pp. (3901 - 3919), ISSN 0278-081X, DOI: 10.1007/s00034-014-9830-5. [Indexed: ISI Web of Science, Thomson Reuters].
[Conf 14]R. Shanthakumari, S. Malliga, "Video Steganography Using LSB Matching Revisited Algorithm", in Proc. IOSR J Comput. Eng., IOSR-JCE, vol. 16 (6), IOSR, India, Nov., 2014, pp. (1 - 6), ISSN 2278-8727.
[Conf 13]T. S. Ghouse Basha, S. H. Zabeen, "Design and Evolution of Performance of Spread Spectrum Techniques for Image Steganography Using MIGLS", in Proc. Int. J Innov. Research Electric., Electron., Instrum. Contr. Eng., IJIREEICE, vol. 2 (9), IJIREEICE, Chennai, India, Sep., 2014, pp. (2036 - 2040), ISSN 2321-5526.
[Jrnl 12]Y. Tew, K. Wong, "An Overview of Information Hiding in H.264/AVC Compressed Video", IEEE Trans. Circuits Syst. Video Technol., vol. 24 (2), IEEE, USA, Feb. 2014, pp. (305 - 319), ISSN 1051-8215, DOI: 10.1109/TCSVT.2013.2276710. [Indexed: ISI Web of Science, Thomson Reuters].
[Jrnl 11]Y. Lee, "Streaming Video Service Model using Secure Steganographic Method", Int. J Security Applic., vol. 7 (6), SERSC, Sandy Bay, Australia, Dec. 2013, pp. (79 - 88), ISSN 1738-9976, DOI: 10.14257/ijsia.2013.7.6.08.
[Jrnl 10]M. Jyotheeswari, V. Lokeswara Reddy, "A Novel Steganographic System for Data Hiding in Video or Audio", Int. J Comput. Applic., vol. 82 (11), Foundation of Computer Science (FCS), New York, USA, Nov. 2013, pp. (31 - 36), ISSN 0975-8887, DOI: 10.5120/14162-2253.
[Jrnl 9]S. Atawneh, P. Sumari, "Hybrid and Blind Steganographic Method for Digital Images Based on DWT and Chaotic Map", J of Commun., vol. 8 (11), Engineering and Technology Publishing, USA, Nov. 2013, pp. (690 - 699), ISSN 1796-2021, DOI: 10.12720/jcm.8.11.690-699. [Indexed: Scopus, Elsevier].
[Conf 8]X. Xu, J. Dong, W. Wang, T. Tan, "Video steganalysis based on the constraints of motion vectors", in Proc. IEEE Int. C Image Proc., ICIP 2013, vol. 20, IEEE, Melbourne, Australia, 15-18 Sep., 2013, pp. (4422 - 4426), ISBN 978-1-4799-2341-0, DOI: 10.1109/ICIP.2013.6738911. [Indexed: ISI Web of Science, Thomson Reuters].
[Jrnl 7]K. V. Vinodkumar, V. Lokeswara Reddy, "A Novel Data Embedding Technique for Hiding Text in Video File using Steganography ", Int. J Comput. Applic., vol. 77 (17), Foundation of Computer Science (FCS), New York, USA, Sep. 2013, pp. (13 - 18), ISSN 0975-8887, DOI: 10.5120/13614-1384.
[Jrnl 6]S. Atawneh, A. Almomani, P. Sumari, "Steganography in digital images: Common approaches and tools", IETE Tech. Rev., vol. 30 (4), Medknow Publications & Media PVT Ltd., Mumbai, India, Jul. 2013, pp. (344 - 358), ISSN 0256-4602, DOI: 10.4103/0256-4602.116724. [Indexed: ISI Web of Science, Thomson Reuters].
[Jrnl 5]S. Gudla, S. Reyya, A. Kotyada, A. Sangam, "Key Based Least Significant Bit (LSB) Insertion for Audio and Video Steganography", Int. J Comput. Sci. Eng. Research Development, vol. 3 (1), PRJ Publication, Chennai, India, Jan. 2013, pp. (60 - 69), ISSN 2248-9371.
[Jrnl 4]K. Dasgupta, J. K. Mandal, P. Dutta, "Hash Based Least Significant Bit Technique for Video Steganography (HLSB)", Int. J Security, Privacy Trust Manag., vol. 1 (2), AIRCC, India, Apr. 2012, pp. (1 - 11), ISSN 2319-4103, DOI: 10.5121/ijsptm.2012.2201.
[Jrnl 3]D. Agrawal, N. Khare, "Steganography and Steganalysis Using Service Oriented Architecture", Int. J Electron., Commun. Soft Coimput. Sci. Eng. (Special Issue) New Delhi, India, 2012, pp. (77 - 78), ISSN 2277-9477.
[Jrnl 2]J. Mansouri, M. Khademi, "An Adaptive Scheme for Compressed Video Steganography Using Temporal and Spatial Features of the Video Signal", Int. J Imaging Syst. Tech., vol. 19 (4), Wiley Periodicals, Dec. 2009, pp. (306 - 315), ISSN 1098-1098, DOI: 10.1002/ima.20207. [Indexed: ISI Web of Science, Thomson Reuters].
[Jrnl 1]K. Yuan, R. Zhang, X. Xu, X. Niu, Y. Yang, "Design of steganography algorithm based on MPEG-4 coding scheme", J on Commun., vol. 30 (5) May. 2009, pp. (48 - 53), ISSN 1000-436X. [Indexed: Scopus, Elsevier].