Digital video steganalysis by subtractive prediction error adjacency matrix

被引:18
作者
Wang, Keren [1 ,2 ]
Han, Jiesi [2 ]
Wang, Hongxia [3 ]
机构
[1] Natl Digital Switching Syst Engn & Technol Res Ct, Zhengzhou, Peoples R China
[2] Sci & Technol Blind Signal Proc Lab, Chengdu, Peoples R China
[3] Southwest Jiaotong Univ, Chengdu, Peoples R China
基金
中国国家自然科学基金;
关键词
Video steganalysis; Communication security; Steganography; SPAM; SPEAM;
D O I
10.1007/s11042-013-1373-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Video has become an important cover for steganography for its large volume. There are two main categories among existing methods for detecting steganography which embeds in the spatial domain of videos. One category focuses on the spatial redundancy and the other one mainly focuses on the temporal redundancy. This paper presents a novel method which considers both the spatial and the temporal redundancy for video steganalysis. Firstly, model of spread spectrum steganography is provided. PEF (Prediction Error Frame) is then chosen to suppress the temporal redundancy of the video content. Differential filtering between adjacent samples in PEFs is employed to further suppress the spatial redundancy. Finally, Dependencies between adjacent samples in a PEF are modeled by a first-order Markov chain, and subsets of the empirical matrices are then employed as features for a steganalyzer with classifier of SVM (Support Vector Machine). Experimental results demonstrate that for uncompressed videos, the novel features perform better than previous video steganalytic works, and similar to the well-known SPAM (Subtractive Pixel Adjacency Model) features which are originally designed for image steganalysis. For videos compressed with distortion, the novel features perform better than other features tested.
引用
收藏
页码:313 / 330
页数:18
相关论文
共 25 条
  • [1] Data Hiding in Motion Vectors of Compressed Video Based on Their Associated Prediction Error
    Aly, Hussein A.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (01) : 14 - 18
  • [2] [Anonymous], 2007, ELECT IMAGING SECURI
  • [3] BUDHIA U, 2006, IEEE T INF FOREN SEC, V1, P43
  • [4] BUDHIA U, 2004, P SPIE, V5403
  • [5] Video Steganalysis Exploiting Motion Vector Reversion-Based Features
    Cao, Yun
    Zhao, Xianfeng
    Feng, Dengguo
    [J]. IEEE SIGNAL PROCESSING LETTERS, 2012, 19 (01) : 35 - 38
  • [6] Chang C.-C., LIBSVM: a Library for Support Vector Machines
  • [7] Secure spread spectrum watermarking for multimedia
    Cox, IJ
    Kilian, J
    Leighton, FT
    Shamoon, T
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 1997, 6 (12) : 1673 - 1687
  • [8] Watermarking of uncompressed and compressed video
    Hartung, F
    Girod, B
    [J]. SIGNAL PROCESSING, 1998, 66 (03) : 283 - 301
  • [9] Jainsky JS, 2007, MM&SEC'07: PROCEEDINGS OF THE MULTIMEDIA & SECURITY WORKSHOP 2007, P161
  • [10] Kancherla K., 2009, 2009 International Conference on High Performance Computing & Simulation (HPCS), P200, DOI 10.1109/HPCSIM.2009.5194136