Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








6 Hits in 3.7 sec

Segmentation Based Video Steganalysis to Detect Motion Vector Modification

Peipei Wang, Yun Cao, Xianfeng Zhao
2017 Security and Communication Networks  
This paper presents a steganalytic approach against video steganography which modifies motion vector (MV) in content adaptive manner.  ...  The steganalytic features extracted from each category of subsequences with close motion intensity are used to build one classifier.  ...  And near-perfect estimation for local optimality is utilized to detect MV-based steganography.  ... 
doi:10.1155/2017/8051389 fatcat:7bxrons3ivegnnjq7tn2zmokni

Entropy-Based Video Steganalysis of Motion Vectors

Elaheh Sadat, Karim Faez, Mohsen Saffari Pour
2018 Entropy  
In this paper, a new method is proposed for motion vector steganalysis using the entropy value and its combination with the features of the optimized motion vector.  ...  These membership functions are used to weight the effective features that are extracted by reconstructing the motion estimation equations.  ...  Acknowledgments: The authors would like to express their special thanks and gratitude to Kasaei and Ghanbari who assisted us with their wonderful suggestions for this project.  ... 
doi:10.3390/e20040244 pmid:33265335 pmcid:PMC7512759 fatcat:7aogmttervhf3djhfvlvd5ctjy

Blind MV-based video steganalysis based on joint inter-frame and intra-frame statistics

Negin Ghamsarian, Klaus Schoeffmann, Morteza Khademi
2020 Multimedia tools and applications  
In this paper, we propose a 54-dimentional feature set exploiting spatio-temporal features of motion vectors to blindly detect MV-based stego videos.  ...  Motion vector alteration during information embedding can affect these statistics that can be utilized for steganalysis.  ...  [59] have proposed "Near-Perfect Estimation for Locally Optimality features" which exploits local optimality of motion vectors according to the Lagrangian multiplier applied during compression.  ... 
doi:10.1007/s11042-020-10001-9 fatcat:6kyj2244urabvibb5cww43jc6a

Comprehensive Survey of Multimedia Steganalysis: Techniques, Evaluations, and Trends in Future Research

Doaa A. Shehab, Mohmmed J. Alhaddad
2022 Symmetry  
Finally, the existing shortcomings and future recommendations in this field are discussed to present a useful resource for future research.  ...  In addition, it provides a deep review and summarizes recent steganalysis approaches and techniques for audio, images, and video.  ...  The authors, therefore, acknowledge with thanks DSR for technical and financial support. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/sym14010117 fatcat:s2oinfxtbjcdhjvdv7vqrs6jlm

Detecting the fingerprint of video data hiding tool OpenPuff

Yu Wang, Xianfeng Zhao, Yun Cao
2020 Forensic Science International: Reports  
A B S T R A C T This paper proposes an effective fingerprint detection method against the video steganography and watermarking of OpenPuff, one of the leading tools for its capability to securely hide  ...  By comparison of the binary streams between the original and the marked videos, the suspicious fields are located and used for screening video.  ...  Zhao, A steganalytic approach to detect motion vector 309 modification using near-perfect estimation for local optimality, IEEE Trans. Inform.  ... 
doi:10.1016/j.fsir.2020.100088 fatcat:3w6ltqlb5jazpdu4cr4jawihli

Special Issue: Multimedia Information System Security

Shiguo Lian, Dimitris Kanellopoulos, Giancarlo Ruffo, Anton Železnikar, Matjaž Gams, Jožef Stefan, Drago Torkar, Jožef Stefan, Editorial Board, Juan Carlos, Augusto, Argentina (+29 others)
2009 unpublished
Acknowledgement This work was supported by the Slovenian Research Agency (ARRS), development project M2-0210 (C) entitled "AvID: Audiovisual speaker identification and emotion detection for secure communications  ...  For an SV 0 sub-vector, no modification is needed.  ...  Both motion vector and texture encryption. To keep secure, it is necessary to encrypt both DCT/wavelet coefficient and motion vector.  ... 
fatcat:ekua3zeo5rfnvcycdaxfmhjihq