Fig. 2From: Robust video steganography for social media sharing based on principal component analysisOne level of DWT decompositionBack to article page