A comprehensive review of video steganalysis

被引:5
作者
Bouzegza, Mourad [1 ,2 ]
Belatreche, Ammar [2 ]
Bouridane, Ahmed [3 ]
Tounsi, Mohamed [1 ]
机构
[1] Prince Sultan Univ, Coll Comp & Informat Sci, POB 66833,Rafha St, Riyadh 11586, Saudi Arabia
[2] Northumbria Univ Newcastle, Dept Comp Sci & Digital Technol Engn & Environm, Newcastle, England
[3] Sharjah Univ, Coll Comp & Informat, Sharjah, U Arab Emirates
关键词
DIGITAL VIDEO; STATISTICAL INVISIBILITY; HIDING ALGORITHM; WATERMARKING; FEATURES; DCT;
D O I
10.1049/ipr2.12573
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Steganography is the art of secret communication and steganalysis is the art of detecting the hidden messages embedded in digital media covers. One of the covers that is gaining interest in the field is video. Presently, the global IP video traffic forms the major part of all consumer Internet traffic. It is also gaining attention in the field of digital forensics and homeland security in which threats of covert communications hold serious consequences. Thus, steganography technicians will prefer video to other types of covers like audio files, still images, or texts. Moreover, video steganography will be of more interest because it provides more concealing capacity. Contrariwise, investigation in video steganalysis methods does not seem to follow the momentum even if law enforcement agencies and governments around the world support and encourage investigation in this field. In this paper, the authors review the most important methods used so far in video steganalysis and sketch the future trends. To the best of the authors' knowledge this is the most comprehensive review of video steganalysis produced so far.
引用
收藏
页码:3407 / 3425
页数:19
相关论文
共 126 条
  • [71] Entropy-Based Video Steganalysis of Motion Vectors
    Sadat, Elaheh Sadat
    Faez, Karim
    Pour, Mohsen Saffari
    [J]. ENTROPY, 2018, 20 (04)
  • [72] Sharp, 2013, 2013 9 INT WIRELESS
  • [73] Sharp AT, 2010, 2010 4TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ICSPCS)
  • [74] Shen T, 2018, DEEP FAKES USING GEN
  • [75] ShengDun Hu, 2011, Proceedings of the 2011 IEEE 14th International Conference on Computational Science and Engineering (CSE 2011). 11th International Symposium on Pervasive Systems, Algorithms, Networks (I-SPAN 2011). 10th IEEE International Conference on Ubiquitous Computing and Communications (IUCC 2011), P57, DOI 10.1109/CSE.2011.24
  • [76] A HEVC Video Steganalysis Against DCT/DST-Based Steganography
    Shi, Henan
    Sun, Tanfeng
    Jiang, Xinghao
    Dong, Yi
    Xu, Ke
    [J]. INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2021, 13 (03) : 19 - 33
  • [77] Spatially localized image-dependent watermarking for statistical invisibility and collusion resistance
    Su, K
    Kundur, D
    Hatzinakos, D
    [J]. IEEE TRANSACTIONS ON MULTIMEDIA, 2005, 7 (01) : 52 - 66
  • [78] Statistical invisibility for collusion-resistant digital video watermarking
    Su, K
    Kundur, D
    Hatzinakos, D
    [J]. IEEE TRANSACTIONS ON MULTIMEDIA, 2005, 7 (01) : 43 - 51
  • [79] Su Y., 2008, 2008 INT C AUDIO LAN
  • [80] Digital Video Steganalysis Based on a Spatial Temporal Detector
    Su, Yuting
    Yu, Fan
    Zhang, Chengqian
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (01): : 360 - 373