2014
DOI: 10.1109/tifs.2014.2308633
|View full text |Cite
|
Sign up to set email alerts
|

Video Steganalysis Against Motion Vector-Based Steganography by Adding or Subtracting One Motion Vector Value

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
65
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 77 publications
(69 citation statements)
references
References 18 publications
0
65
0
Order By: Relevance
“…Although phase modifying stego algorithms evidently cause more degradations in MV patterns than magnitude modifying stego algorithms, they are, however, surprisingly more secure against previous MV steganalysis methods. The reason is that the vast majority of the previous MV steganalysis algorithms design their features by assuming that the magnitudes of message carrier MV components are slightly modified [8], [9], [13], [17], [18], [29]. For example, the most recent MV steganalysis method, AoSO [17], investigates whether the current MV is shrunk or enlarged by 1.…”
Section: Previous Methodsmentioning
confidence: 99%
“…Although phase modifying stego algorithms evidently cause more degradations in MV patterns than magnitude modifying stego algorithms, they are, however, surprisingly more secure against previous MV steganalysis methods. The reason is that the vast majority of the previous MV steganalysis algorithms design their features by assuming that the magnitudes of message carrier MV components are slightly modified [8], [9], [13], [17], [18], [29]. For example, the most recent MV steganalysis method, AoSO [17], investigates whether the current MV is shrunk or enlarged by 1.…”
Section: Previous Methodsmentioning
confidence: 99%
“…In [10], researchers introduced method for video steganography based on motion vectors. This work model hides the secret information in the least significant bit of the motion vectors.…”
Section: Literature Reviewmentioning
confidence: 99%
“…And two-layered STCs [15] are used to minimize distortion for embedding process. In order to resist the steganalytic schemes based on MV's local optimality [16], several approaches were proposed. In [5], Cao et al exploited the opportunity to optimize the ME perturbation using the loss caused by video compression process.…”
Section: Introductionmentioning
confidence: 99%
“…In Wang et al 's work [17], the calibration-based steganalysis is further improved by matching the parameters between the first and second compression process. Wang et al [16] extracted features based on the difference between the actual the sum of absolute difference (SAD) and locally optimal SAD after the adding-or-subtracting-one operation on MVs. Recently Zhang et al [18] suggested checking the local optimality of MVs by considering both distortion and bit estimation associated with MVs.…”
Section: Introductionmentioning
confidence: 99%