全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

基于运动估计的视频隐写检测算法

, PP. 759-771

Keywords: 隐写分析,视频,运动估计,支持向量机

Full-Text   Cite this paper   Add to My Lib

Abstract:

提出一种基于运动估计的的视频隐写检测算法。通过块均方误差的变化研究信息嵌入对运动估计的影响,发现运动矢量对隐写具有敏感性,且分块越小,对隐写越敏感。反映视频时变特性的运动矢量场被作为隐写检测中视频数据的表征,特征提取过程中,先取定分块大小,使用最小均方误差块匹配运动估计算法,得到运动矢量场。再提取运动矢量场3个方向相邻元素的共生矩阵,使用共生矩阵的主对角线及其相邻元素作为特征。使用支持向量机分类器实施检测,实验结果表明文中算法与Budhia的算法相比,具有更好的检测性能。

References

[1]  Farid H. Detecting Hidden Messages Using Higher-Order Statistical Models // Proc of the IEEE International Conference on Image Processing. Rochester, USA, 2002: 905-908
[2]  Goljan M, Fridrich J, Holotyak T. New Blind Steganalysis and Its Implications. Proc of SPIE, 2006, 6072: 1-13
[3]  Harmsen J, Pearlman W. Steganalysis of Additive Noise Modelable Information Hiding. Proc of SPIE, 2003, 5020: 131-142
[4]  Xuan Guorong, Shi Ya, Gao Jianjiong, et al. Steganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Function // Proc of the Information Hiding Workshop. Barcelona, Spain, 2005: 262-277
[5]  Wang Ying, Moulin P. Optimized Feature Extraction for Learning-Based Image Steganalysis. IEEE Trans on Information Forensics and Security, 2007, 2(1): 31-45
[6]  Sullivan K, Madhow U, Chandrasekaran S, et al. Steganalysis for Markov Cover Data with Applications to Images. IEEE Trans on Information Forensics and Security, 2006, 1(2): 275-287
[7]  Shi Y Q, Chen Chunhua, Chen Wen. A Markov Process Based Approach to Effective Attacking JPEG Steganography // Proc of the Information Hiding Workshop. Alexandria, USA, 2007: 249-264
[8]  Liu Qingzhong, Sung A H, Chen Zhongxue, et al. Feature Mining and Pattern Classification for Steganalysis of LSB Matching Steganography in Grayscale Images. Pattern Recognition, 2008, 41(1): 56-66
[9]  Pevn T, Bas P, Fridrich J. Steganalysis by Subtractive Pixel Adjacency Matrix // Proc of the 11th ACM Workshop on Multimedia and Security. Princeton, USA, 2009: 75-84
[10]  Budhia U, Kundur D, Zourntos T. Digital Video Steganalysis Exploiting Statistical Visibility in the Temporal Domain. IEEE Trans on Information Forensics and Security, 2006, 1(4): 502-516
[11]  Jainsky J S, Kundur D, Halverson D R. Towards Digital Video Steganalysis Using Asymptotic Memoryless Detection // Proc of the 9th ACM Workshop on Multimedia and Security. Dallas, USA, 2007: 161-167
[12]  Zhang C, Su Y. Video Steganalysis Based on Aliasing Detection. Electronics Letters, 2008, 44(13): 801-803
[13]  Pankajakshan V, Ho A T S. Improving Video Steganalysis Using Temporal Correlation // Proc of the 3rd IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing. Kaohsiung, USA, 2007: 287-290
[14]  Liu Bin, Liu Fenlin, Yang Chunfang. Video Steganalysis Scheme Based on Inter-Frame Collusion. Journal on Communications, 2009, 30(4): 41-49 (in Chinese)(刘 镔,刘粉林,杨春芳.基于帧间共谋的视频隐写分析.通信学报, 2009, 30(4): 41-49)
[15]  Su Yuting, Wang Lili, Zhang Chuntian. New Video Steganalysis Algorithm for MSU Stego Video. Journal of Southeast University: Natural Science Edition, 2007, 37(Z1): 164-167 (in Chinese)(苏育挺,王莉莉,张春田.一种新型视频信息隐藏分析算法.东南大学学报:自然科学版, 2007, 37(Z1): 164-167)
[16]  Su Yuting, Zhang Chengqian, Wang Lili, et al. A New Video Steganalysis Based on Mode Detection // Proc of the IEEE International Conference on Audio, Language and Image Processing. Shanghai, China, 2008: 1507-1510
[17]  Liu Qingzhong, Sung A H, Qiao Mengyu. Video Steganalysis Based on the Expanded Markov and Joint Distribution on the Transform Domains Detecting MSU StegoVideo// Proc of the 7th International Conference on Machine Learning and Application. San Diego, USA, 2008: 671-674
[18]  Kancherla K, Mukkamala S. Video Steganalysis Using Spatial and Temporal Redundancies // Proc of the IEEE International Conference on High Performance Computing Simulation. Leipzig, Germany, 2009: 200-207
[19]  Filler T, Ker A D, Fridrich J. The Square Root Law of Steganographic Capacity for Markov Covers. Proc of SPIE, 2009, 7254: 1-11
[20]  Tekalp A M. Digital Video Processing. Upper Saddle River, USA: Prentice Hall Press, 1995
[21]  Richard O D, Peter E H, David G S. Pattern Classification. 2nd Edition. Hoboken, USA: Wiley-Interscience, 2000
[22]  Cox I J, Kilian J, Leighton F T, et al. Secure Spread Spectrum Watermarking for Multimedia. IEEE Trans on Image Processing, 1997, 6(12): 1673-1687
[23]  Marvel L M, Boncelet C G, Retter C T. Spread Spectrum Image Steganography. IEEE Trans on Image Processing, 1999, 8(8): 1075-1083
[24]  Chen B, Wornell G W. Quantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding. IEEE Trans on Information Theory, 2001, 47(4):1423-1443

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133