A comprehensive review of video steganalysis

被引:5
作者
Bouzegza, Mourad [1 ,2 ]
Belatreche, Ammar [2 ]
Bouridane, Ahmed [3 ]
Tounsi, Mohamed [1 ]
机构
[1] Prince Sultan Univ, Coll Comp & Informat Sci, POB 66833,Rafha St, Riyadh 11586, Saudi Arabia
[2] Northumbria Univ Newcastle, Dept Comp Sci & Digital Technol Engn & Environm, Newcastle, England
[3] Sharjah Univ, Coll Comp & Informat, Sharjah, U Arab Emirates
关键词
DIGITAL VIDEO; STATISTICAL INVISIBILITY; HIDING ALGORITHM; WATERMARKING; FEATURES; DCT;
D O I
10.1049/ipr2.12573
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Steganography is the art of secret communication and steganalysis is the art of detecting the hidden messages embedded in digital media covers. One of the covers that is gaining interest in the field is video. Presently, the global IP video traffic forms the major part of all consumer Internet traffic. It is also gaining attention in the field of digital forensics and homeland security in which threats of covert communications hold serious consequences. Thus, steganography technicians will prefer video to other types of covers like audio files, still images, or texts. Moreover, video steganography will be of more interest because it provides more concealing capacity. Contrariwise, investigation in video steganalysis methods does not seem to follow the momentum even if law enforcement agencies and governments around the world support and encourage investigation in this field. In this paper, the authors review the most important methods used so far in video steganalysis and sketch the future trends. To the best of the authors' knowledge this is the most comprehensive review of video steganalysis produced so far.
引用
收藏
页码:3407 / 3425
页数:19
相关论文
共 126 条
  • [1] Data Hiding in Motion Vectors of Compressed Video Based on Their Associated Prediction Error
    Aly, Hussein A.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (01) : 14 - 18
  • [2] Steganalysis using image quality metrics
    Avcibas, I
    Memon, N
    Sankur, B
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2003, 12 (02) : 221 - 229
  • [3] Balaji R., 2011, 2011 IEEE INT C ELEC
  • [4] Bayar B., 2016, P 4 ACM WORKSH INF H, P5
  • [5] Bouchama S, 2012, LECT NOTES ENG COMP, P655
  • [6] Digital video steganalysis exploiting collusion sensitivity
    Budhia, U
    Kundur, D
    [J]. SENSORS, AND COMMAND, CONTROL, COMMUNICATIONS, AND INTELLIGENCE(C31) TECHNOLOGIES FOR HOMELAND SECURITY AND HOMELAND DEFENSE III, PTS 1 AND 2, 2004, 5403 : 210 - 221
  • [7] Digital video steganalysis exploiting statistical visibility in the temporal domain
    Budhia, Udit
    Kundur, Deepa
    Zourntos, Takis
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2006, 1 (04) : 502 - 516
  • [8] Burgess C, 2014, 2014 5TH EUROPEAN WORKSHOP ON VISUAL INFORMATION PROCESSING (EUVIP 2014)
  • [9] Caccia G., 2001, EUROCON'2001. International Conference on Trends in Communications. Technical Program, Proceedings (Cat. No.01EX439), P363, DOI 10.1109/EURCON.2001.938138
  • [10] Cao Y., 2015, P 3 ACM WORKSHOP INF