Entropy-Based Video Steganalysis of Motion Vectors

被引:17
作者
Sadat, Elaheh Sadat [1 ]
Faez, Karim [1 ]
Pour, Mohsen Saffari [2 ,3 ]
机构
[1] Amirkabir Univ Technol, Elect Engn Dept, Tehran 158754413, Iran
[2] Sharif Univ Technol, Dept Mech Engn, Tehran 1458889694, Iran
[3] KTH Royal Inst Technol, S-11428 Stockholm, Sweden
关键词
motion vector; steganalysis; entropy; motion estimation; steganography; ALGORITHM; IMAGE;
D O I
10.3390/e20040244
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
In this paper, a new method is proposed for motion vector steganalysis using the entropy value and its combination with the features of the optimized motion vector. In this method, the entropy of blocks is calculated to determine their texture and the precision of their motion vectors. Then, by using a fuzzy duster, the blocks are clustered into the blocks with high and low texture, while the membership function of each block to a high texture class indicates the texture of that block. These membership functions are used to weight the effective features that are extracted by reconstructing the motion estimation equations. Characteristics of the results indicate that the use of entropy and the irregularity of each block increases the precision of the final video classification into cover and stego classes.
引用
收藏
页数:14
相关论文
共 38 条
[1]   Data Hiding in Motion Vectors of Compressed Video Based on Their Associated Prediction Error [J].
Aly, Hussein A. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (01) :14-18
[2]  
[Anonymous], 1981, PATTERN RECOGNITION
[3]  
[Anonymous], 2016, LIBSVM LIB SUPPORT V
[4]   Image Segmentation Based on Statistical Confidence Intervals [J].
Buenestado, Pablo ;
Acho, Leonardo .
ENTROPY, 2018, 20 (01)
[5]  
Cao Y., 2015, P 3 ACM WORKSH INF H, P25, DOI DOI 10.1145/2756601.2756609
[6]   Content Adaptive Lagrange Multiplier Selection for Rate-Distortion Optimization in 3-D Wavelet-Based Scalable Video Coding [J].
Chen, Ying ;
Liu, Guizhong .
ENTROPY, 2018, 20 (03)
[7]  
Ding-Yu Fang, 2006, 2006 IEEE International Symposium on Circuits and Systems (IEEE Cat. No. 06CH37717C)
[8]   An introduction to ROC analysis [J].
Fawcett, Tom .
PATTERN RECOGNITION LETTERS, 2006, 27 (08) :861-874
[9]  
Feng Pan, 2010, 2010 IEEE International Conference on Software Engineering and Service Sciences (ICSESS 2010), P592, DOI 10.1109/ICSESS.2010.5552283
[10]   Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes [J].
Filler, Tomas ;
Judas, Jan ;
Fridrich, Jessica .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) :920-935