Versatile Video Coding (VVC) is the latest video coding standard, but currently, most steganographic algorithms are based on High-Efficiency Video Coding (HEVC). The concept of symmetry is often adopted in deep neural networks. With the rapid rise of new multimedia, video steganography shows great research potential. This paper proposes a VVC steganographic algorithm based on Coding Units (CUs). Considering the novel techniques in VVC, the proposed steganography only uses chroma CUs to embed secret information. Based on modifying the partition modes of chroma CUs, we propose four different embedding levels to satisfy the different needs of visual quality, capacity and video bitrate. In order to reduce the bitrate of stego-videos and improve...
International audienceThe upcoming video coding standard, Versatile Video Coding (VVC), has shown gr...
High definition video application has drawn a lot of interest both from academy and industry. The re...
Steganography is the method employed to prevent unsolicited access and malicious use of sensitive in...
Steganography hides secret messages inside the covers while ensuring imperceptibility. Different fro...
Abstract--Information Hiding is a method of hiding secret messages into a cover-media such that an i...
This paper presents a method of high-capacity and transparent watermarking based on the usage of dee...
Digital image steganography is the process of embedding information within a cover image in a secure...
Steganography, embedding secret data into unsuspected objects, has emerged as a significant sub-disc...
Due to the recent advent of high-resolution mobile and camera devices, it is necessary to develop an...
This paper presents a method for the transparent, robust, and highly capacitive watermarking of vide...
Today, eavesdropping is becoming a common issue in the rapidly growing digital network and has fores...
This paper proposes a novel information hiding method designed for H.266/Versatile Video Coding (VVC...
Steganography is defined as the process of hiding information in a multimedia carrier. Ultimate obje...
Today, eavesdropping is becoming a common issue in the rapidly growing digital network and has fores...
Steganography is a technique of concealing the message in multimedia data. Multimedia data, such as ...
International audienceThe upcoming video coding standard, Versatile Video Coding (VVC), has shown gr...
High definition video application has drawn a lot of interest both from academy and industry. The re...
Steganography is the method employed to prevent unsolicited access and malicious use of sensitive in...
Steganography hides secret messages inside the covers while ensuring imperceptibility. Different fro...
Abstract--Information Hiding is a method of hiding secret messages into a cover-media such that an i...
This paper presents a method of high-capacity and transparent watermarking based on the usage of dee...
Digital image steganography is the process of embedding information within a cover image in a secure...
Steganography, embedding secret data into unsuspected objects, has emerged as a significant sub-disc...
Due to the recent advent of high-resolution mobile and camera devices, it is necessary to develop an...
This paper presents a method for the transparent, robust, and highly capacitive watermarking of vide...
Today, eavesdropping is becoming a common issue in the rapidly growing digital network and has fores...
This paper proposes a novel information hiding method designed for H.266/Versatile Video Coding (VVC...
Steganography is defined as the process of hiding information in a multimedia carrier. Ultimate obje...
Today, eavesdropping is becoming a common issue in the rapidly growing digital network and has fores...
Steganography is a technique of concealing the message in multimedia data. Multimedia data, such as ...
International audienceThe upcoming video coding standard, Versatile Video Coding (VVC), has shown gr...
High definition video application has drawn a lot of interest both from academy and industry. The re...
Steganography is the method employed to prevent unsolicited access and malicious use of sensitive in...