Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3082031.3083245acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
research-article

A Steganalytic Algorithm to Detect DCT-based Data Hiding Methods for H.264/AVC Videos

Published: 20 June 2017 Publication History

Abstract

This paper presents an effective steganalytic algorithm to detect Discrete Cosine Transform (DCT) based data hiding methods for H.264/AVC videos. These methods hide covert information into compressed video streams by manipulating quantized DCT coefficients, and usually achieve high payload and low computational complexity, which is suitable for applications with hard real-time requirements. In contrast to considerable literature grown up in JPEG domain steganalysis, so far there is few work found against DCT-based methods for compressed videos. In this paper, the embedding impacts on both spatial and temporal correlations are carefully analyzed, based on which two feature sets are designed for steganalysis. The first feature set is engineered as the histograms of noise residuals from the decompressed frames using 16 DCT kernels, in which a quantity measuring residual distortion is accumulated. The second feature set is designed as the residual histograms from the similar blocks linked by motion vectors between inter-frames. The experimental results have demonstrated that our method can effectively distinguish stego videos undergone DCT manipulations from clean ones, especially for those of high qualities.

References

[1]
2003. Draft ITU-T Recommendation and Final Draft International Standard of Joint Video Specification, document ITU-T Rec. H.264/ISO/IEC 14496--10 AVC, Joint Video Team (JVT) of ISO/IEC MPEG and ITU-T VCEG,JVTG050. (May 2003).
[2]
2014. VideoLAN. x264. (2014). Available: http://www.videolan. org/developers/x264.html.
[3]
Y. Cao, H. Zhang, X. Zhao, and H. Yu. 2015. Video Steganography Based on Optimized Motion Estimation Perturbation. In Proceedings of the 3rd ACM Work- shop on Information Hiding and Multimedia Security (IH&MMSec '15). ACM, New York, NY, USA, 25--31.
[4]
C.Chang and C.Lin. 2001 {online}. LIBSVM: A Library for Support Vector Machines. (2001 {online}). Available: http://www.csie.ntu.edu.tw/cjlin/libsvm.
[5]
Ting Da, ZhiTang Li, and Bing Feng. 2015. A Video Steganalysis Algorithm for H.264/AVC Based on the Markov Features. Springer International Publishing, Cham, 47--59.
[6]
V. Holub and J. Fridrich. 2015. Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT. IEEE Transactions on Information Forensics and Security 10, 2 (Feb 2015), 219--228.
[7]
V. Holub and J. Fridrich. 2015. Phase-aware projection model for steganalysis of JPEG images. (2015).
[8]
S. Kapotas and A. Skodras. 2008. A new data hiding scheme for scene change detection in H.264 encoded video sequences. In 2008 IEEE International Conference on Multimedia and Expo. 277--280.
[9]
S. Kim, S. Kim, Y. Hong, and C. Won. 2007. Data Hiding on H.264/AVC Compressed Video. Springer Berlin Heidelberg, Berlin, Heidelberg, 698--707.
[10]
K. Liao, S. Lian, Z. Guo, and J. Wang. 2012. Efficient Information Hiding in H.264/AVC Video Coding. Telecommun. Syst. 49, 2 (Feb. 2012), 261--269.
[11]
T. Lin, K. Chung, P. Chang, Y. Huang, H. Liao, and C. Fang. 2013. An improved DCT-based perturbation scheme for high capacity data hiding in H.264/AVC intra frames. Jour- nal of Systems and Software 86, 3 (2013), 604--614.
[12]
X. Ma, Z. Li, J. Lv, and W. Wang. 2009. Data Hiding in H.264/AVC Streams with Limited Intra-Frame Distortion Drift. In 2009 International Symposium on Computer Network and Multimedia Technology. 1--5.
[13]
X. Ma, Z. Li, H. Tu, and B. Zhang. 2010. A Data Hiding Algorithm for H.264/AVC Video Streams Without Intra-Frame Distortion Drift. IEEE Transactions on Circuits and Systems for Video Technology 20, 10 (Oct 2010), 1320--1330.
[14]
K. Nakajima, K. Tanaka, T. Matsuoka, and Y. Nakajima. 2005. Rewritable Data Embedding on MPEG Coded Data Domain. In 2005 IEEE International Conference on Multimedia and Expo. 682--685.
[15]
V. Pankajakshan and A. Ho. 2007. Improving Video Steganalysis Using Temporal Correlation. In Proceedings of the Third International Conference on International Information Hiding and Multimedia Signal Processing (IIH-MSP 2007) - Volume 01 (IIH-MSP '07). IEEE Computer Society, Washington, DC, USA, 287--290. http://dl.acm.org/citation.cfm?id=1336956.1337487
[16]
Athanasios Papoulis and A. A. Maradudin. 1962. The Fourier Integral and Its Applications. 51, 1 (1962), 159--161.
[17]
P. Wang, Hong Zhang, Yun Cao, and Xianfeng Zhao. 2016. A Novel Embedding Distortion for Motion Vector-Based Steganography Considering Motion Characteristic, Local Optimality and Statistical Distribution. In Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec '16). ACM, New York, NY, USA, 127--137.
[18]
K. Wong, K. Tanaka, K. Takagi, and Y. Nakajima. 2009. Complete Video Quality-Preserving Data Hiding. IEEE Transactions on Circuits and Systems for Video Technology 19, 10 (Oct 2009), 1499--1512.
[19]
N. Zarmehi and M. Akhaee. 2016. Digital video steganalysis toward spread spectrum data hiding. IET Image Processing 10, 1 (2016), 1--8.
[20]
H. Zhang, Y. Cao, and X. Zhao. 2017. A Steganalytic Approach to Detect Motion Vector Modi cation Using Near-Perfect Estimation for Local Optimality. IEEE Transactions on Information Forensics and Security 12, 2 (Feb 2017), 465--478.
[21]
H. Zhang, Y. Cao, X. Zhao, W. Zhang, and N. Yu. 2014. Video Steganography with Perturbed Macroblock Partition. In Proceedings of the 2Nd ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec '14). ACM, New York, NY, USA, 115--122.

Cited By

View all
  • (2024)Centralized Error Distribution-Preserving Adaptive Steganography for HEVCIEEE Transactions on Multimedia10.1109/TMM.2023.332149626(4255-4270)Online publication date: 1-Jan-2024
  • (2023)Exploring Frame Difference to Enhance Robustness for Video Steganography on Social NetworksSecurity and Communication Networks10.1155/2023/62954862023(1-11)Online publication date: 16-Aug-2023
  • (2022)Robust video steganography for social media sharing based on principal component analysisEURASIP Journal on Information Security10.1186/s13635-022-00130-z2022:1Online publication date: 20-Jun-2022
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
IH&MMSec '17: Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security
June 2017
180 pages
ISBN:9781450350617
DOI:10.1145/3082031
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 20 June 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. data hiding
  2. dct
  3. h.264/avc
  4. steganalysis
  5. video

Qualifiers

  • Research-article

Funding Sources

  • National Key Technology R&D Program
  • NSFC

Conference

IH&MMSec '17
Sponsor:
IH&MMSec '17: ACM Information Hiding and Multimedia Security Workshop
June 20 - 22, 2017
Pennsylvania, Philadelphia, USA

Acceptance Rates

IH&MMSec '17 Paper Acceptance Rate 18 of 34 submissions, 53%;
Overall Acceptance Rate 128 of 318 submissions, 40%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)13
  • Downloads (Last 6 weeks)4
Reflects downloads up to 21 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Centralized Error Distribution-Preserving Adaptive Steganography for HEVCIEEE Transactions on Multimedia10.1109/TMM.2023.332149626(4255-4270)Online publication date: 1-Jan-2024
  • (2023)Exploring Frame Difference to Enhance Robustness for Video Steganography on Social NetworksSecurity and Communication Networks10.1155/2023/62954862023(1-11)Online publication date: 16-Aug-2023
  • (2022)Robust video steganography for social media sharing based on principal component analysisEURASIP Journal on Information Security10.1186/s13635-022-00130-z2022:1Online publication date: 20-Jun-2022
  • (2022)Adaptive QIM With Minimum Embedding Cost for Robust Video Steganography on Social NetworksIEEE Transactions on Information Forensics and Security10.1109/TIFS.2022.321590117(3801-3815)Online publication date: 2022
  • (2022)NACA: A Joint Distortion-Based Non-Additive Cost Assignment Method for Video SteganographyIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.3182148(1-16)Online publication date: 2022
  • (2022)DDCA: A Distortion Drift-Based Cost Assignment Method for Adaptive Video Steganography in the Transform DomainIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2021.305813419:4(2405-2420)Online publication date: 1-Jul-2022
  • (2022)Steganalysis of DWT Based Steganography Technique for SD and HD VideosWireless Personal Communications10.1007/s11277-022-10050-3128:4(2441-2452)Online publication date: 3-Oct-2022
  • (2021)Steganalysis of H.264/AVC Videos Exploiting Subtractive Prediction Error BlocksIEEE Transactions on Information Forensics and Security10.1109/TIFS.2021.307882216(3326-3338)Online publication date: 2021
  • (2021)Minimizing Embedding Impact for H.264 Steganography by Progressive Trellis CodingIEEE Transactions on Information Forensics and Security10.1109/TIFS.2020.301352316(333-345)Online publication date: 2021
  • (2021)Non-Degraded Adaptive HEVC Steganography by Advanced Motion Vector PredictionIEEE Signal Processing Letters10.1109/LSP.2021.311156528(1843-1847)Online publication date: 2021
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media