OSA's Digital Library

Applied Optics

Applied Optics

APPLICATIONS-CENTERED RESEARCH IN OPTICS

  • Editor: Joseph N. Mait
  • Vol. 51, Iss. 20 — Jul. 10, 2012
  • pp: 4667–4677

Digital video steganalysis using motion vector recovery-based features

Yu Deng, Yunjie Wu, and Linna Zhou  »View Author Affiliations


Applied Optics, Vol. 51, Issue 20, pp. 4667-4677 (2012)
http://dx.doi.org/10.1364/AO.51.004667


View Full Text Article

Enhanced HTML    Acrobat PDF (1056 KB)





Browse Journals / Lookup Meetings

Browse by Journal and Year


   


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools

Share
Citations

Abstract

As a novel digital video steganography, the motion vector (MV)-based steganographic algorithm leverages the MVs as the information carriers to hide the secret messages. The existing steganalyzers based on the statistical characteristics of the spatial/frequency coefficients of the video frames cannot attack the MV-based steganography. In order to detect the presence of information hidden in the MVs of video streams, we design a novel MV recovery algorithm and propose the calibration distance histogram-based statistical features for steganalysis. The support vector machine (SVM) is trained with the proposed features and used as the steganalyzer. Experimental results demonstrate that the proposed steganalyzer can effectively detect the presence of hidden messages and outperform others by the significant improvements in detection accuracy even with low embedding rates.

© 2012 Optical Society of America

OCIS Codes
(100.5010) Image processing : Pattern recognition
(150.1135) Machine vision : Algorithms
(110.4155) Imaging systems : Multiframe image processing
(100.4992) Image processing : Pattern, nonlinear correlators

ToC Category:
Image Processing

History
Original Manuscript: January 24, 2012
Revised Manuscript: April 12, 2012
Manuscript Accepted: May 14, 2012
Published: July 3, 2012

Citation
Yu Deng, Yunjie Wu, and Linna Zhou, "Digital video steganalysis using motion vector recovery-based features," Appl. Opt. 51, 4667-4677 (2012)
http://www.opticsinfobase.org/ao/abstract.cfm?URI=ao-51-20-4667


Sort:  Author  |  Year  |  Journal  |  Reset  

References

  1. H. A. Aly, “Data hiding in motion vectors of compressed video based on their associated prediction error,” IEEE Trans.Inform. Forensics Security 6, 14–18 (2011). [CrossRef]
  2. Y. Cao, X. F. Zhao, and D. G. Feng, “Video steganalysis exploiting motion vector reversion-based features,” IEEE Signal Process. Lett. 19, 35–38 (2012). [CrossRef]
  3. C. Xu, X. Ping, and T. Zhang, “Steganography in compressed video stream,” in Proceedings of IEEE First International Conference on Innovative Computing, Information and Control (IEEE, 2006), pp. 269–272.
  4. X. He and Z. Luo, “A novel steganographic algorithm based on the motion vector phase,” in Proceedings of IEEE International Conference on Computer Science and Software Engineering (IEEE, 2008), pp. 822–825. [CrossRef]
  5. Y. Cao, X. Zhao, D. Feng, and R. Sheng, “Video steganography with perturbed motion estimation,” Lect. Notes Comput. Sci. 6958, 193–207 (2011). [CrossRef]
  6. Y. T. Su, C. Q. Zhang, and C. T. Zhang, “A video steganalytic algorithm against motion-vector-based steganography,” Signal Processing 91, 1901–1909 (2011). [CrossRef]
  7. J. Zheng and L. P. Chau, “A motion vector recovery algorithm for digital video using Lagrange interpolation,” IEEE Trans. Broadcasting 49, 383–389 (2003). [CrossRef]
  8. T. Wiegand, G. J. Sullivan, G. Bjontegaard, and A. Luthra, “Overview of the H.264/AVC video coding standard,” IEEE Trans. Circuits Syst. Video Technol. 13, 560–576(2003). [CrossRef]
  9. J. Harmsen and W. Pearlman, “Steganalysis of additive noise modelable information hiding,” Proc. SPIE 5020, 134–142 (2003). [CrossRef]
  10. H. Zheng and L. P. Chau, “Efficient motion vector recovery algorithm for H.264 based on a polynomial model,” IEEE Trans. Multimedia 7, 507–513 (2005). [CrossRef]
  11. H. Takeda, S. Farsiu, and P. Milanfar, “Kernel regression for image processing and reconstruction,” IEEE Trans. Image Process. 16, 349–366 (2007). [CrossRef]
  12. M. D. Buhmann, Radial Basis Functions: Theory and Implementations (Cambridge University, 2003).
  13. Y. K. Wang and M. M. Hannuksela, “The error concealment feature in the H.26L test model,” in Proceedings of IEEE International Conference on Image Processing (IEEE, 2002), pp. 729–732. [CrossRef]
  14. C. Lampert, M. Militzer, and P. Ross, “XviD MPEG4 core library,” http://www.xvid.org .
  15. Y. Wang and P. Moulin, “Optimized feature extraction for learning-based image steganalysis,” IEEE Trans. Inform. Forensics Security 2, 31–45 (2007). [CrossRef]
  16. C. J. C. Burges, “A tutorial on support vector machines for pattern recognition,” Data Mining and Knowledge Discovery 2, 121–167 (1998). [CrossRef]
  17. C. C. Chang and C. J. Lin, “LIBSVM: a library for support vector machines,” http://www.csie.ntu.edu.tw/~cjlin/libsvm .
  18. Y. Deng, Y. J. Wu, and L. N. Zhou, “Video steganalysis exploiting motion vector calibration-based features,” Adv. Mater. Res. (N.Y.) 482, 168–172 (2012). [CrossRef]

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.


« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited