AN ADAPTIVE DETECTING STRATEGY AGAINST MOTION VECTOR-BASED STEGANOGRAPHY

被引:0
作者
Wang, Peipei [1 ]
Cao, Yun [1 ]
Zhao, Xianfeng [1 ]
Yu, Haibo [1 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
来源
2015 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA & EXPO (ICME) | 2015年
关键词
Steganalysis; adaptive; motion vector; M-PEG; video; VIDEO;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The goal of this paper is to improve the performance of the current video steganalysis in detecting motion vector (MV)-based steganography. It is noticed that many MV-based approaches embed secret bits in content adaptive manners. Typically, the modifications are applied only to qualified MVs, which implies that the number of modified MVs varies among frames after embedding. On the other hand, nearly all the current steganalytic methods ignore such uneven distribution. They divide the video into frame groups equally and calculate every single feature vector using all MVs within one group. For better classification performances, we suggest performing steganalysis also in an adaptive way. First, divide the video into groups with variable lengths according to frame dynamics. Then within each group, calculate a single feature vector using all suspicious MVs (MVs that are likely to be modified). The experimental results have shown the effectiveness of our proposed strategy.
引用
收藏
页数:6
相关论文
共 19 条
[1]   Data Hiding in Motion Vectors of Compressed Video Based on Their Associated Prediction Error [J].
Aly, Hussein A. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (01) :14-18
[2]  
[Anonymous], 2014, P 2 ACM WORKSH INF H, DOI DOI 10.1145/2600918.2600935
[3]  
[Anonymous], 2013, FFMPEG CODEC 1 2
[4]  
Bouchama S, 2012, LECT NOTES ENG COMP, P655
[5]   Video Steganalysis Exploiting Motion Vector Reversion-Based Features [J].
Cao, Yun ;
Zhao, Xianfeng ;
Feng, Dengguo .
IEEE SIGNAL PROCESSING LETTERS, 2012, 19 (01) :35-38
[6]   LIBSVM: A Library for Support Vector Machines [J].
Chang, Chih-Chung ;
Lin, Chih-Jen .
ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY, 2011, 2 (03)
[7]  
Fang DY, 2006, IEEE INT SYMP CIRC S, P1422
[8]  
Fridrich Jessica, 2011, Information Hiding. 13th International Conference, IH 2011. Revised Selected Papers, P102, DOI 10.1007/978-3-642-24178-9_8
[9]  
Holub V, 2012, IEEE INT WORKS INFOR, P234, DOI 10.1109/WIFS.2012.6412655
[10]  
Kutter M., 1997, M2281 ISOIEC JTC1SC2