Browse > Article
http://dx.doi.org/10.3837/tiis.2017.01.019

Digital Video Steganalysis Based on a Spatial Temporal Detector  

Su, Yuting (School of Electronic Information Engineering, Tianjin University)
Yu, Fan (School of Electronic Information Engineering, Tianjin University)
Zhang, Chengqian (School of Electronic Information Engineering, Tianjin University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.11, no.1, 2017 , pp. 360-373 More about this Journal
Abstract
This paper presents a novel digital video steganalysis scheme against the spatial domain video steganography technology based on a spatial temporal detector (ST_D) that considers both spatial and temporal redundancies of the video sequences simultaneously. Three descriptors are constructed on XY, XT and YT planes respectively to depict the spatial and temporal relationship between the current pixel and its adjacent pixels. Considering the impact of local motion intensity and texture complexity on the histogram distribution of three descriptors, each frame is segmented into non-overlapped blocks that are $8{\times}8$ in size for motion and texture analysis. Subsequently, texture and motion factors are introduced to provide reasonable weights for histograms of the three descriptors of each block. After further weighted modulation, the statistics of the histograms of the three descriptors are concatenated into a single value to build the global description of ST_D. The experimental results demonstrate the great advantage of our features relative to those of the rich model (RM), the subtractive pixel adjacency model (SPAM) and subtractive prediction error adjacency matrix (SPEAM), especially for compressed videos, which constitute most Internet videos.
Keywords
video steganalysis; spatial temporal detector; texture and motion factors;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Y.C. Liao, C.H. Chen, T.K. Shih, N.C. Tang, "Data hiding in video using adaptive LSB," in Proc. of Pervasive Computing (JCPC), 2009 Joint Conferences on, pp.185-190, 2009.
2 P. Yadav, N. Mishra, S. Sharma, "A secure video steganography with encryption based on LSB technique," in Proc. of IEEE International Conference on Computational Intelligence and Computing Research, pp.1-5, 2013.
3 R. Khare, R. Mishra, I. Arya, "Video Steganography Using LSB Technique by Neural Network," in Proc. of International Conference on Computational Intelligence and Communication Networks, pp. 898-902, 2015.
4 J. Singh, A. Dubey, "MPEG-2 video watermarking using quantization index modulation," in Proc. of IEEE International Conference on Internet Multimedia Services Architecture and Application, 41(2): 108-14, 2010.
5 Y. Guan, Y. Zhu, X. Liu, G. Luo, "A digital blind watermarking scheme based on quantization index modulation in depth map for 3D video," in Proc. of International Conference on Control Automation Robotics & Vision, pp.346-351, 2015.
6 S. Liu, F. Shi, J. Wang, S. Zhang, "An improved spatial spread-spectrum video watermarking," in Proc. of International Conference on Intelligent Computation Technology & Automation, 1: 587-590, 2010.
7 L. Wei, R.Q. Hu, D.A. Pados, G. Wu, "Optimal multiuser spread-spectrum data embedding in video streams," in Proc. of Global Communications Conference, 2015.
8 X. Nan, Z. Pei, Z.T. Li, "A Steganography Algorithm Based on ${\pm}1$ DCT Coefficients for H.264/AVC," in Proc. of International Conference on Frontier of Computer Science & Technology, pp.259-263, 2015.
9 R.J. Mstafa, K.M. Elleithy, "A high payload video steganography algorithm in DWT domain based on BCH codes (15, 11)," in Proc. of International IEEE Wireless Telecommunications Symposium, 2015.
10 G.R. Rajesh, A.S. Nargunam, "Steganography algorithm based on discrete cosine transform for data embedding into raw video streams," in Proc. of Iet Chennai Fourth International Conference on Sustainable Energy and Intelligent Systems, 2013.
11 U. Budhia, D. Kundur, T. Zourntos, "Digital Video Steganalysis Exploiting Statistical Visibility in the Temporal Domain," IEEE Transactions on Information Forensics & Security, 1(4): 502-516, 2007.   DOI
12 P. Paulpandi, D.T. Meyyappan, "Hiding Messages Using Motion Vector Technique In Video Steganography," in Proc. of International Journal of Engineering Trends & Technology, 3(3), 2012.
13 H. Zhang, Y. Cao, X. Zhao, "Motion vector-based video steganography with preserved local optimality," Multimedia Tools & Applications, pp. 1-17, 2015.
14 K. Tasdemir, F. Kurugollu, S. Sezer, "Spatio-temporal rich model for motion vector steganalysis," in Proc. of IEEE International Conference on Acoustics, Speech and Signal Processing, 2015.
15 V. Pankajakshan, A.T.S. Ho, "Improving Video Steganalysis Using Temporal Correlation," in Proc. of International Conference on International Information Hiding and Multimedia Signal Processing, 1:287-290, 2007.
16 X. Xu, J. Dong, T. Tan, "Universal spatial feature set for video steganalysis," pp. 245-248, 2012.
17 T. Pevny, P. Bas, J. Fridrich, "Steganalysis by subtractive pixel adjacency matrix," IEEE Transactions on Information Forensics & Security, 5(2): 215-224, 2010.   DOI
18 V. Rana, R. Mishra, P.K. Bora, S. Kashyap, "Novel scheme of video steganalysis for detecting antipodal watermarks," in Proc. of TENCON 2008 - 2008 IEEE Region 10 Conference, pp. 1-5, 2008.
19 K. Kancherla, S. Mukkamala, "Video steganalysis using spatial and temporal redundancies," in Proc. of International Conference on High PERFORMANCE Computing & Simulation, pp. 200-207, 2009.
20 K. Wang, J. Han, H. Wang, "Digital video steganalysis by subtractive prediction error adjacency matrix," Multimedia Tools & Applications, 72 (1): 313-330, 2014.   DOI
21 T. Ojala, M. Pietikainen, T. Maenpaa, "Gray Scale and Rotation Invariant Texture Classification with Local Binary Patterns," Lecture Notes in Computer Science, 1842(7):404-420, 2000.
22 Vcdemo, http://insy.ewi.tudelft.nl/content/image-and-video-compression-learning-tool-vcdemo/.
23 Ffmpeg library, http://ffmpeg.org/.
24 F.H. Hartung, B. Girod, "Digital Watermarking of Raw and Compressed Video," in Proc. of SPIE - The International Society for Optical Engineering, 2952: 205-213, 1997.
25 J. Fridrich, J. Kodovsky, "Rich Models for Steganalysis of Digital Images," IEEE Transactions on Information Forensics & Security, pp. 7(3):868-882, 2012.   DOI