Abstract
Cybercriminals are increasingly using steganography to launch attacks on devices. The cyberattack is more threatening as steganography hides the embedded malware, if any, making it harder to detect by various anti-virus tools. Such malware is called stegomalware. Since video files are larger and have a complex structure, they also have a high capacity for hiding malware. Motion vector (MV)-based steganography techniques do not cause much distortion in video files. Therefore, it remains to be one of the leading video steganography techniques. This paper deals with a lightweight solution for MV-based stegomalware detection in video files. Our model is compatible with state-of-the-art video coding standards having variable macroblock sizes and different motion vector resolutions. The proposed method obtained an accuracy of 95.8% on testing H.264 videos with various embedding rates. The 81-D spatial and temporal features result in the high performance of the proposed model.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Aly, H.A.: Data hiding in motion vectors of compressed video based on their associated prediction error. IEEE Trans. Inf. Forensics Secur. 6(1), 14–18 (2010)
Caviglione, L., Choraś, M., Corona, I., Janicki A., Mazurczyk, W., Pawlicki, M., Wasielewska, K.: Tight arms race: overview of current malware threats and trends in their detection. IEEE Access 9, 5371–5396 (2021)
Cerber ransomware, https://www.f-secure.com/v-descs/trojan_w32_cerber.shtml
Chakraborty, S., Das, A.K., Sinha, C., Mitra, S.: Steganalysis of videos using energy associated with each pixel. In: Fourth International Conference on Image Information Processing (ICIIP) (2017)
Ghamsarian, N., Schoeffmann, K., Khademi, M.: Blind MV-based video steganalysis based on joint inter-frame and intra-frame statistics. Multimedia Tools Appl. 80(6), 9137–9159 (2020)
Huang, X., Hu, Y., Wang, Y., Liu, B., Liu, S.: Deep learning-based quantitative steganalysis to detect motion vector embedding of HEVC videos. In: IEEE Fifth International Conference on Data Science in Cyberspace (DSC), pp. 150–155 (2020)
Idbeaa, T.F., Samad, S.A., Husain, H.: An adaptive compressed video steganography based on pixel-value differencing schemes. In: International Conference on Advanced Technologies for Communications (ATC), pp. 50–55 (2015)
Jue, W., Min-Qing, Z., Juan-Li, S.: Video steganography using motion vector components. In: Communication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference, pp. 500–503 (2011)
Li, Y., Chen, H.X., Zhao, Y.: A new method of data hiding based on h.264 encoded video sequences. In: International Conference on Signal Processing Proceedings ICSP, pp. 1833–1836 (2010)
Li, Z., Meng, L., Xu, S., Li, Z., Shi, Y., Liang, Y.: A HEVC video steganalysis algorithm based on PU partition modes. Secur. Commun. Netw. 59, 563–574 (2019)
Liao, K., Lian, S., Guo, Z., Wang, J.: Efficient information hiding in h.264/avc video coding. Telecommun. Syst., 261–269 (2012)
Liu, P., Li, S.: Steganalysis of intra prediction mode and motion vector-based steganography by noise residual convolutional neural network. IOP Conf. Ser.: Mater. Sci. Eng. 719 (2020)
MeltingScreen worm, https://www.f-secure.com/v-descs/melting.shtml
Ren, Y., Zhai, L., Wang, L., Zhu, T.: Video steganalysis based on subtractive probability of optimal matching feature. Multimedia Tools Appl., 83–99 (2015)
Su, Y., Yu, F., Zhang, C.: Digital video steganalysis based on a spatial temporal detector. KSII Trans. Internet Inf. Syst. 11, 360–373 (2017)
Wang, K., Zhao, H., Wang, H.: Video steganalysis against motion vector-based steganography by adding or subtracting one motion vector value. In: IEEE Trans. Inf. Forensic Secur. 9(5) (2014)
Wu, H.-T., Liu, Y., Huang, J., Yang, X.-Y.: Improved steganalysis algorithm against motion vector based video steganography. In: IEEE International Conference on Image Processing (ICIP), pp. 5512–5516 (2014)
Xiph.org (1999). https://media.xiph.org/video/derf
XP Antivirus rogue, https://www.f-secure.com/v-descs/rogue_w32_xpantivirus.shtml
Xu, C., Ping, X., Zhang, T.: Steganography in compressed video stream. In: First International Conference on Innovative Computing, Information and Control-Volume I (ICICIC’06), vol. 1. IEEE, pp. 269–272 (2006)
Zhang, H., Cao, Y., Zhao, X.: A steganalytic approach to detect motion vector modification using near-perfect estimation for local optimality. IEEE Trans. Inf. Forensics Secur. 12(2), pp. 465–478 (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Nair, S.V.S., Arun Raj Kumar, P. (2023). Detection of Motion Vector-Based Stegomalware in Video Files. In: Tistarelli, M., Dubey, S.R., Singh, S.K., Jiang, X. (eds) Computer Vision and Machine Intelligence. Lecture Notes in Networks and Systems, vol 586. Springer, Singapore. https://doi.org/10.1007/978-981-19-7867-8_8
Download citation
DOI: https://doi.org/10.1007/978-981-19-7867-8_8
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-7866-1
Online ISBN: 978-981-19-7867-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)