Skip to main content

Detection of Motion Vector-Based Stegomalware in Video Files

  • Conference paper
  • First Online:
Computer Vision and Machine Intelligence

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 586))

  • 811 Accesses

Abstract

Cybercriminals are increasingly using steganography to launch attacks on devices. The cyberattack is more threatening as steganography hides the embedded malware, if any, making it harder to detect by various anti-virus tools. Such malware is called stegomalware. Since video files are larger and have a complex structure, they also have a high capacity for hiding malware. Motion vector (MV)-based steganography techniques do not cause much distortion in video files. Therefore, it remains to be one of the leading video steganography techniques. This paper deals with a lightweight solution for MV-based stegomalware detection in video files. Our model is compatible with state-of-the-art video coding standards having variable macroblock sizes and different motion vector resolutions. The proposed method obtained an accuracy of 95.8% on testing H.264 videos with various embedding rates. The 81-D spatial and temporal features result in the high performance of the proposed model.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Aly, H.A.: Data hiding in motion vectors of compressed video based on their associated prediction error. IEEE Trans. Inf. Forensics Secur. 6(1), 14–18 (2010)

    Google Scholar 

  2. Caviglione, L., Choraś, M., Corona, I., Janicki A., Mazurczyk, W., Pawlicki, M., Wasielewska, K.: Tight arms race: overview of current malware threats and trends in their detection. IEEE Access 9, 5371–5396 (2021)

    Google Scholar 

  3. Cerber ransomware, https://www.f-secure.com/v-descs/trojan_w32_cerber.shtml

  4. Chakraborty, S., Das, A.K., Sinha, C., Mitra, S.: Steganalysis of videos using energy associated with each pixel. In: Fourth International Conference on Image Information Processing (ICIIP) (2017)

    Google Scholar 

  5. Ghamsarian, N., Schoeffmann, K., Khademi, M.: Blind MV-based video steganalysis based on joint inter-frame and intra-frame statistics. Multimedia Tools Appl. 80(6), 9137–9159 (2020)

    Article  Google Scholar 

  6. Huang, X., Hu, Y., Wang, Y., Liu, B., Liu, S.: Deep learning-based quantitative steganalysis to detect motion vector embedding of HEVC videos. In: IEEE Fifth International Conference on Data Science in Cyberspace (DSC), pp. 150–155 (2020)

    Google Scholar 

  7. Idbeaa, T.F., Samad, S.A., Husain, H.: An adaptive compressed video steganography based on pixel-value differencing schemes. In: International Conference on Advanced Technologies for Communications (ATC), pp. 50–55 (2015)

    Google Scholar 

  8. Jue, W., Min-Qing, Z., Juan-Li, S.: Video steganography using motion vector components. In: Communication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference, pp. 500–503 (2011)

    Google Scholar 

  9. Li, Y., Chen, H.X., Zhao, Y.: A new method of data hiding based on h.264 encoded video sequences. In: International Conference on Signal Processing Proceedings ICSP, pp. 1833–1836 (2010)

    Google Scholar 

  10. Li, Z., Meng, L., Xu, S., Li, Z., Shi, Y., Liang, Y.: A HEVC video steganalysis algorithm based on PU partition modes. Secur. Commun. Netw. 59, 563–574 (2019)

    Google Scholar 

  11. Liao, K., Lian, S., Guo, Z., Wang, J.: Efficient information hiding in h.264/avc video coding. Telecommun. Syst., 261–269 (2012)

    Google Scholar 

  12. Liu, P., Li, S.: Steganalysis of intra prediction mode and motion vector-based steganography by noise residual convolutional neural network. IOP Conf. Ser.: Mater. Sci. Eng. 719 (2020)

    Google Scholar 

  13. MeltingScreen worm, https://www.f-secure.com/v-descs/melting.shtml

  14. NotPetya, https://en.wikipedia.org/wiki/Petya_and_NotPetya

  15. Ren, Y., Zhai, L., Wang, L., Zhu, T.: Video steganalysis based on subtractive probability of optimal matching feature. Multimedia Tools Appl., 83–99 (2015)

    Google Scholar 

  16. Su, Y., Yu, F., Zhang, C.: Digital video steganalysis based on a spatial temporal detector. KSII Trans. Internet Inf. Syst. 11, 360–373 (2017)

    Google Scholar 

  17. Wang, K., Zhao, H., Wang, H.: Video steganalysis against motion vector-based steganography by adding or subtracting one motion vector value. In: IEEE Trans. Inf. Forensic Secur. 9(5) (2014)

    Google Scholar 

  18. Wu, H.-T., Liu, Y., Huang, J., Yang, X.-Y.: Improved steganalysis algorithm against motion vector based video steganography. In: IEEE International Conference on Image Processing (ICIP), pp. 5512–5516 (2014)

    Google Scholar 

  19. Xiph.org (1999). https://media.xiph.org/video/derf

  20. XP Antivirus rogue, https://www.f-secure.com/v-descs/rogue_w32_xpantivirus.shtml

  21. Xu, C., Ping, X., Zhang, T.: Steganography in compressed video stream. In: First International Conference on Innovative Computing, Information and Control-Volume I (ICICIC’06), vol. 1. IEEE, pp. 269–272 (2006)

    Google Scholar 

  22. Zhang, H., Cao, Y., Zhao, X.: A steganalytic approach to detect motion vector modification using near-perfect estimation for local optimality. IEEE Trans. Inf. Forensics Secur. 12(2), pp. 465–478 (2017)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sandra V. S. Nair .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Nair, S.V.S., Arun Raj Kumar, P. (2023). Detection of Motion Vector-Based Stegomalware in Video Files. In: Tistarelli, M., Dubey, S.R., Singh, S.K., Jiang, X. (eds) Computer Vision and Machine Intelligence. Lecture Notes in Networks and Systems, vol 586. Springer, Singapore. https://doi.org/10.1007/978-981-19-7867-8_8

Download citation

Publish with us

Policies and ethics