skip to main content
10.1145/2600918.2600938acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
research-article

Video steganalysis based on subtractive probability of optimal matching feature

Published:11 June 2014Publication History

ABSTRACT

This paper presents a novel motion vector (MV) steganalysis method. MV-based steganographic methods exploite the variability of MV to embed messages by modifying MV slightly. However, we have noticed that the modified MVs after steganography cannot follow the optimal matching rule which is the target of motion estimation. It means that steganographic methods conflict with the basic principle of video compression. Aiming at this difference, we proposed a steganalysis feature based on Subtractive Probability of Optimal Matching(SPOM), which statistics the MV's Probability of the Optimal matching (POM) around its neighbors, and extract the classification feature by subtracting the POM of the test video and its recompressed video. Experiment results show that the proposed feature is sensitive to MV-based steganography methods, and outperforms the other methods, especially for high temporal activity video.

References

  1. C. Xu, X. Ping, and T. Zhang. Steganography in compressed video stream. IEEE First International Conference on Innovative Computing, Information and Control (2006), 269--272. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. D. Fang, and L. Chang. Data hiding for digital video with phase of motion vector. Proc. Int. Symposium on Circuit and Systems (ISCAS) (2006), 1422--1425.Google ScholarGoogle Scholar
  3. FFmpeg. FFmpeg 264 decoder. http://ffmpeg.org/. @Online.Google ScholarGoogle Scholar
  4. H.A. Aly. Data hiding in motion vectors of compressed video based on their associated prediction error. IEEE Transactions on Information Forensics and Security 1 (6 2011), 14--18. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. H. Jing, X. He, Q. Han, and X.M. Niu. Motion vector based information hiding algorithm for h.264/avc against motion vector steganalysis. 4th Asian Conference on Intelligent Information and Database Systems (2012), 78--83. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. H.Y.C. Tourapis, and A.M. Tourapis. Fast motion estimation within the h.264 codec. International Conference on Multimedia and Expo 3 (2003), 517--520. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. J. Fridrich. Feature-based steganalysis for jpeg images and its implications for future design of steganographic schemes. Proc.IH'04, Lecture Notes in Computer Science 3200/2005 (2004), 67--81. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. M. Kutter, F. Jordan, and T. Ebrahimi. Proposal of a watermarking technique for hiding/retrieving data in compressed and decompressed video. Technical Report M2281, ISO/IEC document, JTCI/ SC29/ WG11 (1997).Google ScholarGoogle Scholar
  9. Stego, M. MSU :: MSU Graphics Media Lab. http://compression.ru/video/stego-video/index-en.html. @Online.Google ScholarGoogle Scholar
  10. Suehring, K. H.264/AVC JM Reference Software Download. http://iphome.hhi.de/suehring/tml/download/. @Online.Google ScholarGoogle Scholar
  11. TNT. Tnt.uni Video Test Media. ftp://ftp.tnt.uni-hannover.de/pub/svc/testsequences/. @Online.Google ScholarGoogle Scholar
  12. T. Wiegand, G.J. Sullivan, G. Bjontegaard, and A. Luthra. Overview of the h.264/avc video coding standard. IEEE Trans. Circuits Syst. Video Technol 13 (2003), 560--576. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. VideoLAN. VideoLAN x264, the best H.264/AVC encoder. http://www.videolan.org/developers/x264.html. @Online.Google ScholarGoogle Scholar
  14. Xiaozhong, X., and Yun, H. Improvements on fast motion estimation strategy for h.264/avc. IEEE Transactions on Circuits and Systems for Video Technology 18, 3 (2008), 285--293. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Xiph. Xiph.org :: Derf's Test Media Collection. http://media.xiph.org/video/derf/. @Online.Google ScholarGoogle Scholar
  16. Y. Cao, X.F. Zhao, and D.G. Feng. Video steganography with perturbed motion estimation. 13th International Conference on Information Hiding (May 2011). Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Y. Cao, X.F. Zhao, and D.G. Feng. Video steganalysis exploiting motion vector reversion-based features. IEEE Signal Process Lett.19 (2012), 35--38.Google ScholarGoogle ScholarCross RefCross Ref
  18. Y. Deng, Y. Wu, and L. Zhou. Digital video steganalys is using motion vector recovery-based features. Applied Optics 51, Issue 20 (2012), 4667--4677.Google ScholarGoogle ScholarCross RefCross Ref
  19. Y.T. Su, C.Q. Zhang, and C.T. Zhang. A video steganalytic algorithm against motion-vector-based steganography. Signal Processing (2011), 1901--1909. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Video steganalysis based on subtractive probability of optimal matching feature

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      IH&MMSec '14: Proceedings of the 2nd ACM workshop on Information hiding and multimedia security
      June 2014
      212 pages
      ISBN:9781450326476
      DOI:10.1145/2600918

      Copyright © 2014 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 11 June 2014

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      IH&MMSec '14 Paper Acceptance Rate24of64submissions,38%Overall Acceptance Rate128of318submissions,40%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader