Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/1704555.1704725guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Video steganalysis using motion estimation

Published: 14 June 2009 Publication History

Abstract

In this paper we present a novel video steganalysis method using neural networks and support vector machines to detect video steganograms with very limited a-prior knowledge about the steganogram embedding method.
We apply temporal and spacial redundancies by using the concept of motion estimation widely used in video compression to every frame to obtain an estimate of the frame and extract the merged Discrete Cosine Features (DCT) and markov features. MSU stegovideo tool by Moscow State University and the spread spectrum steganography tool are used for producing video steganograms.
Results show that the features we use give the best accuracy to detect video steganograms. Our results thus demonstrate the potential of using learning machines and motion estimation in detecting video steganograms.

References

[1]
U. Budhia, D. Kundur and T. Zourntos, "Digital Video Steganalysis Exploiting Statistical Visibility in the Temporal Domain," IEEE Transactions on Information Forensics and Security, vol. 1, no. 1, pp. 43-55, March 2006.
[2]
U. Budhia and D. Kundur, "Digital Video Steganalysis Exploiting Collusion Sensitivity," "Sensors, Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense," Edward M. Carapezza, ed., Proc. SPIE (vol. 5403), April 2004.
[3]
H. Zhao, M. Wu, Z. Wang, and KJ.R. Liu, "Forensic Analysis of Nonlinear Collusion Attacks for Multimedia Fingerprinting," IEEE Transactions on Image Processing, vol. 14, no. 5, pp. 646-661, May 2005.
[4]
MSU Stegovideo http://compression.ru/video/stego_video/index en.html
[5]
J. Cox, J. Kilian, T. Leighton, T. Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Transactions on Image Processing, vol. 6, no. 12, pp. 1673-1687, December 1997.
[6]
T. Pevny, J. Fridrich, "Merging Markov and DCT features for multi-class JPEG steganalysis," Proceedings of SPIE Electronic Imaging, Photonics West, pp. 03-04, January 2007.
[7]
V. Cherkassy, "Model complexity control and statistical learning theory," Journal of Natural Computing, Vol. 1, pp 109-133, 2002.
[8]
J. H. Lee, C. J. Lin, "Automatic model selection for support vector machines," Technical Report, Department of Computer Science and Information Engineering, National Taiwan University, 2000.
[9]
C. C. Chang, C. J. Lin, "LIBSYM: a library for support vector machines," Department of Computer Science and Information Engineering, National Taiwan University, 2001.
[10]
A. F. Moller, "A Scaled Conjugate Gradient Algorithm for Fast Supervised Learning," Neural Networks, Vol. 6, pp. 525-533, 1993.
[11]
Egan, J.P: Signal detection theory and ROC analysis. New York: Academic Press, (1975).

Cited By

View all
  • (2014)Digital video steganalysis by subtractive prediction error adjacency matrixMultimedia Tools and Applications10.1007/s11042-013-1373-472:1(313-330)Online publication date: 1-Sep-2014
  • (2013)Moving steganography and steganalysis from the laboratory into the real worldProceedings of the first ACM workshop on Information hiding and multimedia security10.1145/2482513.2482965(45-58)Online publication date: 17-Jun-2013
  • (2011)Undergraduate research in computer forensicsProceedings of the 2011 Information Security Curriculum Development Conference10.1145/2047456.2047466(61-68)Online publication date: 30-Sep-2011

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
IJCNN'09: Proceedings of the 2009 international joint conference on Neural Networks
June 2009
3570 pages
ISBN:9781424435494

Sponsors

  • Georgia Tech: Georgia Institute of Technology
  • ieee-cis: IEEE Computational Intelligence Society
  • INNS: International Neural Network Society

Publisher

IEEE Press

Publication History

Published: 14 June 2009

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 25 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2014)Digital video steganalysis by subtractive prediction error adjacency matrixMultimedia Tools and Applications10.1007/s11042-013-1373-472:1(313-330)Online publication date: 1-Sep-2014
  • (2013)Moving steganography and steganalysis from the laboratory into the real worldProceedings of the first ACM workshop on Information hiding and multimedia security10.1145/2482513.2482965(45-58)Online publication date: 17-Jun-2013
  • (2011)Undergraduate research in computer forensicsProceedings of the 2011 Information Security Curriculum Development Conference10.1145/2047456.2047466(61-68)Online publication date: 30-Sep-2011

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media