XU C Y,PING X J,ZHANG T.Steganography in Compressed Video Stream[DB/OL].[2016-08-09].http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=1691792.DOI:10.1109/ICICIC.2006.158.
[2]
ALY H A.Data hiding in motion vectors of compressed video based on their associated prediction error[J].IEEE Transactions on Information Forensics and Security,2011,6(1):14-18.DOI:10.1109/TIFS.2010.2090520.
[3]
CAO Y,ZHAO X F,FENG D G,et al.Video steganography with perturbed motion estimation[C]//Information Hiding.Berlin:Springer-Verlag,2011:193-207.DOI:10.1007/978-3-642-24178-9_14.
[4]
FILLER T,JUDAS J,FRIDRICH J.Minimizing additive distortion in steganography using syndrome-trellis codes[J].IEEE Transactions on Information Forensics and Security,2011,6(3):920-935.DOI:10.1109/TIFS.2011.2134094.
[5]
CAO Y,ZHANG H,ZHAO X F,et al.Video steganography based on optimized motion estimation perturbation[C]//Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security.New York:ACM,2015:25-31.DOI:10.1145/2756601.2756609.
[6]
YAO Y Z,ZHANG W M,YU N H,et al.Defining embedding distortion for motion vector-based video steganography[J].Multimedia Tools and Applications,2015,74(24):11163-11186.DOI:10.1007/s11042-014-2223-8.
[7]
SU Y T,ZHANG C Q,ZHANG C T.A video steganalytic algorithm against motion-vector-based steganography[J].Signal Processing,2011,91(8):1901-1909.DOI:10.1016/j.sigpro.2011.02.012.
[8]
CAO Y,ZHAO X F,FENG D G.Video steganalysis exploiting motion vector reversion-based features[J].Signal Processing Letters,2012,19(1):35-38.DOI:10.1109/LSP.2011.2176116.
[9]
TEW Y,WONG K S.An overview of information hiding in H.264/AVC compressed video[J].IEEETransactions on Circuits and Systems for Video Technology,2014,24(2):305-319.DOI:10.1109/TCS-VT.2013.2276710.
[10]
LI B,HE J H,HUANG J W,et al.A survey on image steganography and steganalysis[J].Journal of Information Hiding and Multimedia Signal Processing,2011,2(2):142-172.
[11]
ZHANG H,CAO Y,ZHAO X F.Motion vectorbased video steganography with preserved local optimality[J].Multimedia Tools and Applications,2016,75(21):13503-13519.DOI:10.1007/s11042-015-2743-x.
[12]
WANG K R,ZHAO H,WANG H X.Video steganalysis against motion vector-based steganography by adding or subtracting one motion vector value[J].IEEE Transactions on Information Forensics and Security,2014,9(5):741-751.DOI:10.1109/TIFS.2014.2308633.