References
- Abu-El-Haija, S., Kothari, N., Lee, J., Natsev, P., Toderici, G., Varadarajan, B., & Vijayanarasimhan, S. (2016). Youtube-8m: A large-scale video classification benchmark. In ArXiv Preprint ArXiv:1609.08675, 1-10.
- Alanizy, N., Alanizy, A., Baghoza, N., AlGhamdi, M., & Gutub, A. (2018). 3-layer PC text security via combining compression, AES cryptography 2LSB image steganography. Journal of Research in Engineering and Applied Sciences (JREAS), 3(4), 118–124. https://doi.org/https://doi.org/10.46565/jreas.2018.v03i04.001
- Al-Juaid, N., & Gutub, A. (2019). Combining RSA and audio steganography on personal computers for enhancing security. SN Applied Sciences, 1(8), 830. https://doi.org/https://doi.org/10.1007/s42452-019-0875-8
- Al-Juaid, N. A., Gutub, A. A., & Khan, E., & others. (2018). Enhancing PC data security via combining RSA cryptography and video based steganography. Journal of Information Security and Cybercrimes Research (JISCR), 1(1), 8–18. https://doi.org/https://doi.org/10.26735/16587790.2018.006
- Almutairi, S., Gutub, A., & Al-Ghamdi, M. (2019). Image steganography to facilitate online students account system. Review of Business and Technology Research, 16(2), 43–49. https://www.researchgate.net/profile/Adnan-Gutub/publication/338177613_Image_Steganography_to_Facilitate_Online_Students_Account_System/links/5e04fc4b4585159aa49d3476/Image-Steganography-to-Facilitate-Online-Students-Account-System.pdf
- Alotaibi, M., Al-hendi, D., Alroithy, B., AlGhamdi, M., & Gutub, A. (2019). Secure mobile computing authentication utilizing hash, cryptography and steganography combination. Journal of Information Security and Cybercrimes Research (JISCR), 2(1), 9–20. https://doi.org/http://dx.doi.org/10.26735/16587790.2019.001
- AlZain, M. A., & Al-Amri, J. F. (2018). Application of data steganographic method in video sequences using histogram shifting in the Discrete Wavelet transform. International Journal of Applied Engineering Research, 13(8), 6380–6387. https://www.ripublication.com/ijaer18/ijaerv13n8_106.pdf
- Barron, J. L., Fleet, D. J., & Beauchemin, S. S. (1994). Performance of optical flow techniques. International Journal of Computer Vision, 12(1), 43–77. https://doi.org/https://doi.org/10.1007/BF01420984
- Chang, -C.-C., & Lin, C.-J. (2011). LIBSVM: A library for support vector machines. ACM Transactions on Intelligent Systems and Technology (TIST), 2(3), 27. https://doi.org/https://doi.org/10.1145/1961189.1961199
- Cheddad, A., Condell, J., Curran, K., & Mc Kevitt, P. (2010). Digital image steganography: Survey and analysis of current methods. Signal Processing, 90(3), 727–752. https://doi.org/https://doi.org/10.1016/j.sigpro.2009.08.010
- Da, T., Li, Z., & Feng, B. (2015). A video steganalysis algorithm for H. 264/AVC based on the Markov features. In Huang DS., Jo KH., Hussain A. (eds), Intelligent Computing Theories and Methodologies. ICIC 2015. Lecture Notes in Computer Science, vol 9226. Springer, Cham. https://doi.org/https://doi.org/10.1007/978-3-319-22186-1_5.
- Dalal, M., & Juneja, M. (2018a). Video steganalysis to obstruct criminal activities for digital forensics: A survey. International Journal of Electronic Security and Digital Forensics, 10(4), 338–355. https://doi.org/https://doi.org/10.1504/IJESDF.2018.095122
- Dalal, M., & Juneja, M. (2018). Video steganography techniques in spatial domain-A survey. In Mandal J., Saha G., Kandar D., Maji A. (eds), Proceedings of the International Conference on Computing and Communication Systems. Lecture Notes in Networks and Systems, vol 24. Springer, Singapore. https://doi.org/https://doi.org/10.1007/978-981-10-6890-4_67
- Dalal, M., & Juneja, M. (2019). A robust and imperceptible steganography technique for SD and HD videos. Multimedia Tools and Applications, 78(5), 5769–5789. https://doi.org/https://doi.org/10.1007/s11042-018-6093-3
- Dalal, M., & Juneja, M. (2020). Evaluation of orthogonal and biorthogonal wavelets for video steganography. Information Security Journal: A Global Perspective, 29(1), 1–11. https://doi.org/https://doi.org/10.1080/19393555.2020.1714822
- Ding, W., Yan, W., & Qi, D. (2002). Digital image watermarking based on discrete wavelet transform. Journal of Computer Science and Technology, 17(2), 129–139. https://doi.org/https://doi.org/10.1007/BF02962205
- Goyette, N., Jodoin, P.-M., Porikli, F., Konrad, J., & Ishwar, P. (2012). Changedetection. net: A new change detection benchmark dataset. In Computer Vision and Pattern Recognition Workshops (CVPRW), 2012 IEEE Computer Society Conference on (pp. 1–8). Providence, RI, USA.
- Gutub, A., & Al-Ghamdi, M. (2020). Hiding shares by multimedia image steganography for optimized counting-based secret sharing. In Multimedia Tools and Applications, 79,7951–7985 https://doi.org/http://doi.org/10.1007/s11042-019-08427-x
- Gutub, A., & Al-Juaid, N. (2018). Multi-bits stego-system for hiding text in multimedia images based on user security priority. Journal of Computer Hardware Engineering, 1(2), 1–9. https://doi.org/http://doi.org/10.63019/jche.v1i2.513
- Gutub, A., & Al-Shaarani, F. (2020). Efficient implementation of multi-image secret hiding based on LSB and DWT steganography comparisons. Arabian Journal for Science and Engineering, 45(4), 2631–2644. https://doi.org/https://doi.org/10.1007/s13369-020-04413-w
- Hassan, F. S., & Gutub, A. (2020a). Efficient reversible data hiding multimedia technique based on smart image interpolation. Multimedia Tools and Applications, 79(39), 30087–30109. https://doi.org/https://doi.org/10.1007/s11042-020-09513-1
- Hassan, F. S., & Gutub, A. (2020b). Novel embedding secrecy within images utilizing an improved interpolation-based reversible data hiding scheme. Journal of King Saud University - Computer and Information Sciences. https://doi.org/https://doi.org/10.1016/j.jksuci.2020.07.008
- Hureib, E. S., & Gutub, A. A. (2020). Enhancing medical data security via combining elliptic curve cryptography and image steganography. International Journal of Computer Science and Network Security (IJCSNS), 20(8), 1–8. https://doi.org/http://dx.doi.org/10.26735/16587790.2018.006
- Johnson, N. F., Duric, Z., & Jajodia, S. (2001). Information hiding: Steganography and watermarking-attacks and countermeasures: Steganography and watermarking: Attacks and countermeasures (Vol. 1). Springer Science & Business Media.
- KaewTraKulPong, P., & Bowden, R. (2002). An improved adaptive background mixture model for real-time tracking with shadow detection. In Video-based surveillance systems (pp. 135–144). Springer, Boston, MA.
- Kolakalur, A., Kagalidis, I., Vuksanovic, B., & Iacsit, M. (2016). Wavelet based color video steganography. International Journal of Engineering and Technology, 8(3), 165. https://doi.org/https://doi.org/10.7763/IJET.2016.V8.878
- Kumar, G. N., Bhavanam, S. N., & Midasala, V. (2014). Image Hiding in a Video-based on DWT & LSB Algorithm. In First International Conference on Photonics, VLSI and Signal Processing (ICPVS) (pp. 7–12).
- Kumar, P., & Singh, K. (2018). An improved data-hiding approach using skin-tone detection for video steganography. Multimedia Tools and Applications, 77(18), 24247–24268. https://doi.org/https://doi.org/10.1007/s11042-018-5709-y
- Li, G., Ito, Y., Yu, X., Nitta, N., & Babaguchi, N. (2009). Recoverable privacy protection for video content distribution. EURASIP Journal on Information Security, 2009(1), 293031. https://doi.org/https://doi.org/10.1186/1687-417X-2009-293031
- Mahalingam, T., & Subramoniam, M. (2020). A robust single and multiple moving object detection, tracking and classification. Applied Computing and Informatics .https://doi.org/https://doi.org/10.1016/j.aci.2018.01.001
- Mohan, A. S., & Resmi, R. (2014). Video image processing for moving object detection and segmentation using background subtraction. In 2014 First International Conference on Computational Systems and Communications (ICCSC) (pp. 288–292). Trivandrum, India.
- Mstafa, R. J., & Elleithy, K. M. (2015a). A high payload video steganography algorithm in DWT domain based on BCH codes (15, 11). In 2015 Wireless Telecommunications Symposium (WTS) (pp. 1–8). New York, NY, USA.
- Mstafa, R. J., & Elleithy, K. M. (2015b). A novel video steganography algorithm in the wavelet domain based on the KLT tracking algorithm and BCH codes. In Systems, Applications and Technology Conference (LISAT), 2015 IEEE Long Island (pp. 1–7). Farmingdale, NY, USA.
- Mstafa, R. J., & Elleithy, K. M. (2017). Compressed and raw video steganography techniques: A comprehensive survey and analysis. Multimedia Tools and Applications, 76(20), 21749–21786. https://doi.org/https://doi.org/10.1007/s11042-016-4055-1
- Mstafa, R. J., Elleithy, K. M., & Abdelfattah, E. (2017a). A robust and secure video steganography method in DWT-DCT domains based on multiple object tracking and ECC. IEEE Access, 5, 5354–5365. https://doi.org/https://doi.org/10.1109/ACCESS.2017.2691581
- Mstafa, R. J., Elleithy, K. M., & Abdelfattah, E. (2017b). Video steganography techniques: Taxonomy, challenges, and future directions. In Systems, Applications and Technology Conference (LISAT), 2017 IEEE Long Island (pp. 1–6). Farmingdale, NY, USA.
- Nyo, H. L., & Oo, A. W. (2019). Secure data transmission of video steganography using Arnold scrambling and DWT. International Journal of Computer Network and Information Security, 11(6), 45. https://doi.org/https://doi.org/10.5815/ijcnis.2019.06.06
- Petitcolas, F. A. P., Anderson, R. J., & Kuhn, M. G. (1999). Information hiding - a survey. Proceedings of the IEEE, 87(7), 1062–1078. https://doi.org/https://doi.org/10.1109/5.771065
- Rabie, T., & Baziyad, M. (2019). The pixogram: Addressing high payload demands for video steganography. IEEE Access, 7, 21948–21962. https://doi.org/https://doi.org/10.1109/ACCESS.2019.2898838
- Rabie, T., Baziyad, M., & Kamel, I. (2018). Enhanced high capacity image steganography using discrete wavelet transform and the Laplacian pyramid. Multimed Tools Applications 77, 23673–23698. https://doi.org/https://doi.org/10.1007/s11042-018-5713-2
- Ramalingam, M., & Isa, N. A. M. (2014). Video steganography based on integer Haar wavelet transforms for secured data transfer. Indian Journal of Science and Technology, 7(7), 897–904. https://doi.org/https://doi.org/10.17485/ijst/2014/v7i7.4
- Saha, B., & Sharma, S. (2012). Steganographic techniques of data hiding using digital images. Defence Science Journal, 62(1), 11–18. https://doi.org/https://doi.org/10.14429/dsj.62.1436
- Samkari, H., & Gutub, A. (2019). Protecting medical records against cybercrimes within Hajj period by 3-layer security. Recent Trends in Information Technology and Its Appl, 2(3), 1–21. https://doi.org/http://doi.org/10.5281/zenodo.3543455
- Shukur, W. A., Abdullah, W. N., & Qurban, L. K. (2018). Information hiding in digital video using DCT, DWT and CvT. In Journal of Physics: Conference Series, 1003, 12035. https://iopscience.iop.org/article/10.1088/1742-6596/1003/1/012035/meta
- Stauffer, C., & Grimson, W. E. L. (1999). Adaptive background mixture models for real-time tracking. In Computer Vision and Pattern Recognition, 1999. IEEE Computer Society Conference on. (Vol.2, pp. 246–252). Fort Collins, CO, USA.
- Thahab, A. (2020). A novel secure video steganography technique using temporal lifted wavelet transform and human vision properties. The International Arab Journal of Information Technology, 17(2), 147–153. https://doi.org/https://doi.org/10.34028/iajit/17/2/1
- Tomasi, C., & Detection, T. K. (1991). Tracking of point features.International Journal of Computer Vision, 137-154.
- Van Den Boomgaard, R., & Van Balen, R. (1992). Methods for fast morphological image transforms using bitmapped binary images. CVGIP: Graphical Models and Image Processing, 54(3), 252–258. https://doi.org/https://doi.org/10.1016/1049-9652(92)90055-3
- Wang, K., Han, J., & Wang, H. (2014). Digital video steganalysis by subtractive prediction error adjacency matrix. Multimedia Tools and Applications, 72(1), 313–330. https://doi.org/https://doi.org/10.1007/s11042-013-1373-4
- Wang, Z., Bovik, A. C., Sheikh, H. R., & Simoncelli, E. P. (2004). Image quality assessment: From error visibility to structural similarity. IEEE Transactions on Image Processing, 13(4), 600–612. https://doi.org/https://doi.org/10.1109/TIP.2003.819861