A comprehensive review of video steganalysis

被引:5
作者
Bouzegza, Mourad [1 ,2 ]
Belatreche, Ammar [2 ]
Bouridane, Ahmed [3 ]
Tounsi, Mohamed [1 ]
机构
[1] Prince Sultan Univ, Coll Comp & Informat Sci, POB 66833,Rafha St, Riyadh 11586, Saudi Arabia
[2] Northumbria Univ Newcastle, Dept Comp Sci & Digital Technol Engn & Environm, Newcastle, England
[3] Sharjah Univ, Coll Comp & Informat, Sharjah, U Arab Emirates
关键词
DIGITAL VIDEO; STATISTICAL INVISIBILITY; HIDING ALGORITHM; WATERMARKING; FEATURES; DCT;
D O I
10.1049/ipr2.12573
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Steganography is the art of secret communication and steganalysis is the art of detecting the hidden messages embedded in digital media covers. One of the covers that is gaining interest in the field is video. Presently, the global IP video traffic forms the major part of all consumer Internet traffic. It is also gaining attention in the field of digital forensics and homeland security in which threats of covert communications hold serious consequences. Thus, steganography technicians will prefer video to other types of covers like audio files, still images, or texts. Moreover, video steganography will be of more interest because it provides more concealing capacity. Contrariwise, investigation in video steganalysis methods does not seem to follow the momentum even if law enforcement agencies and governments around the world support and encourage investigation in this field. In this paper, the authors review the most important methods used so far in video steganalysis and sketch the future trends. To the best of the authors' knowledge this is the most comprehensive review of video steganalysis produced so far.
引用
收藏
页码:3407 / 3425
页数:19
相关论文
共 126 条
  • [41] Kancherla K., 2009, 2009 International Conference on High Performance Computing & Simulation (HPCS), P200, DOI 10.1109/HPCSIM.2009.5194136
  • [42] A NEW DATA HIDING SCHEME FOR SCENE CHANGE DETECTION IN H.264 ENCODED VIDEO SEQUENCES
    Kapotas, Spyridon K.
    Skodras, Athanassios N.
    [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOLS 1-4, 2008, : 277 - 280
  • [43] Kessler G.C., 2004, STEGANOGRAPHY IMPLIC
  • [44] Kharrazi M., 2007, MATH COMPUTATION IMA, P177
  • [45] Ensemble Classifiers for Steganalysis of Digital Media
    Kodovsky, Jan
    Fridrich, Jessica
    Holub, Vojtech
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (02) : 432 - 444
  • [46] Kumar M., 2011, Steganography and Steganalysis of JPEG Images
  • [47] Li B, 2011, J Inf Hiding Multimed Signal Process, V2, P142
  • [48] Steganalysis of prediction mode modulated data-hiding algorithms in H.264/AVC video stream
    Li, Songbin
    Deng, Haojiang
    Tian, Hui
    Dai, Qiongxing
    [J]. ANNALS OF TELECOMMUNICATIONS, 2014, 69 (7-8) : 461 - 473
  • [49] Lin C.-C.C.a.C.-J., 2016, LIBSVM LIB SUPPORT V
  • [50] An improved DCT-based perturbation scheme for high capacity data hiding in H.264/AVC intra frames
    Lin, Tseng-Jung
    Chung, Kuo-Liang
    Chang, Po-Chun
    Huang, Yong-Huai
    Liao, Hong-Yuan Mark
    Fang, Chiung-Yao
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2013, 86 (03) : 604 - 614