期刊文献+

基于运动估计的视频隐写检测算法 被引量:3

Digital Video Steganalysis Algorithm Based on Motion Estimation
原文传递
导出
摘要 提出一种基于运动估计的的视频隐写检测算法.通过块均方误差的变化研究信息嵌入对运动估计的影响,发现运动矢量对隐写具有敏感性,且分块越小,对隐写越敏感.反映视频时变特性的运动矢量场被作为隐写检测中视频数据的表征,特征提取过程中,先取定分块大小,使用最小均方误差块匹配运动估计算法,得到运动矢量场.再提取运动矢量场3个方向相邻元素的共生矩阵,使用共生矩阵的主对角线及其相邻元素作为特征.使用支持向量机分类器实施检测,实验结果表明文中算法与Budhia的算法相比,具有更好的检测性能. A motion estimation based video steganalysis algorithm is proposed.The effect of information embedding on video motion estimation is investigated by the change of block mean square errors.The motion vectors are sensitive to information embedding,and the sensitivity increases with the decrease of the block size.The motion vector fields which reflect the time-variable characteristic of videos are used as the representation of video data in detecting stego-video.Firstly,a block size is given,and the motion vector fields are obtained by the minimum mean square error block matched motion estimation algorithm.Then the co-occurrence matrixes of three directional adjacent elements in the motions vector fields are calculated.The main diagonal elements and their neighbors of the co-occurrence matrixes are selected as the features.The support vector machine is adopted as the classifier.The experimental results show that the performance of the proposed algorithm is better compared with that of Budhia algorithm.
出处 《模式识别与人工智能》 EI CSCD 北大核心 2010年第6期759-765,共7页 Pattern Recognition and Artificial Intelligence
基金 国家自然科学基金资助项目(No.60970141 60902102)
关键词 隐写分析 视频 运动估计 支持向量机 Steganalysis Video Motion Estimation Support Vector Machine
  • 相关文献

参考文献24

  • 1Cox I J,Kilian J,Leighton F T,et al.Secure Spread Spectrum Watermarking for Multimedia.IEEE Trans on Image Processing,1997,6(12):1673-1687.
  • 2Marvel L M,Boncelet C G,Retter C T.Spread Spectrum Image Steganography.IEEE Trans on Image Processing,1999,8(8):1075-1083.
  • 3Chen B,Wornell G W.Quantization Index Modulation:A Class of Provably Good Methods for Digital Watermarking and Information Embedding.IEEE Trans on Information Theory,2001,47(4):1423-1443.
  • 4Farid H.Detecting Hidden Messages Using Higher-Order Statistical Models // Proc of the IEEE International Conference on Image Processing.Rochester,USA,2002:905-908.
  • 5Goljan M,Fridrich J,Holotyak T.New Blind Steganalysis and Its Implications.Proc of SPIE,2006,6072:1-13.
  • 6Harmsen J,Pearlman W.Steganalysis of Additive Noise Modelable Information Hiding.Proc of SPIE,2003,5020:131-142.
  • 7Xuan Guorong,Shi Ya,Gao Jianjiong,et al.Steganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Function // Proc of the Information Hiding Workshop.Barcelona,Spain,2005:262-277.
  • 8Wang Ying,Moulin P.Optimized Feature Extraction for Learning-Based Image Steganalysis.IEEE Trans on Information Forensics and Security,2007,2(1):31-45.
  • 9Sullivan K,Madhow U,Chandrasekaran S,et al.Steganalysis for Markov Cover Data with Applications to Images.IEEE Trans on Information Forensics and Security,2006,1(2):275-287.
  • 10Shi Y Q,Chen Chunhua,Chen Wen.A Markov Process Based Approach to Effective Attacking JPEG Steganography // Proc of the Information Hiding Workshop.Alexandria,USA,2007:249-264.

二级参考文献24

  • 1山拜.达拉拜,黄玉划.几类非高斯噪声模型的转换研究[J].电子学报,2004,32(7):1090-1093. 被引量:18
  • 2马华东,陶丹.多媒体传感器网络及其研究进展[J].软件学报,2006,17(9):2013-2028. 被引量:186
  • 3JAINSKY J, KUNDUR D, HALVERSON D. Towards digital video steganalysis using asymptotic memoryless detection[A]. Proc of 9th ACM Workshop on Multimedia & Security[C]. 2007.
  • 4HARTUNG E GIROD B. Watermarking of uncompressed and compressed video [J]. Signal Processing, Special Issue on Copyright Protection and Access Control for Multimedia Services, 1998, 66(3): 283-301.
  • 5LANGELAAR G, LAGENDIJK R. Optimal differential energy watermarking of DCT encoded images and video[J]. IEEE Transactions on Image Processing. 2001.10(1):148-158.
  • 6YE D, ZOU C. DAI Y, et al. New adaptive watermarking for real-time MPEG videos [J]. Applied Mathematics and Computation, 2007.185: 907-918.
  • 7SARKAR A, MADHOW U, CHANDRASEKARAN S, et al. Adaptive MPEG-2 video data hiding scheme[A]. Proc of SPIE Security, Steganography, and Watermarking of Multimedia Contents Ⅸ[C]. 2007.
  • 8LING H, LU Z, ZOU F. New real-time watermarking algorithm for compressed video in VLC domain[A]. Proc of International Conference on Image Processing 2004[C]. 2004. 2171-2174.
  • 9LU C, CHEN J, FAN K. Real-time frame-dependent video watermarking in VLC domain[J]. Signal Processing: Image Communication, 2005, 20: 624-642.
  • 10PROVOS N, HONEYMAN E Detecting steganographic content on the Internet[A]. Proc of Internet Society Network and Distributed System Security Symposium[C]. 2002. 209-221.

共引文献3

同被引文献14

  • 1Liu Qingzhong,Sung A H. Feature Mining and Nuero-fuzzy Inference System for Steganalysis of LSB Matching Steganography in Grayscale Images[A].Hyderabad,India:Morgan Kaufmann Publishers,2007.
  • 2Harmsen J J,Pearlman W A. Kernel Fisher Discriminant for Steganalysis of JPEG Hiding Methods[A].San Jose,USA:International Society for Optics and Photonics,2004.
  • 3Harmsen J J,Pearlman W A. Steganalysis of Additive-noise Modelable Information Hiding[A].Santa Clara,USA:International Society for Optics and Photonics,2003.
  • 4Marvel L M,Boncelet Jr C G,Retter C T. Spread Spectrum Image Steganography[J].{H}IEEE Transactions on Image Processing,1999,(08):1075-1083.
  • 5Shi Y Q,Chen Chunhua,Chen Wen. A Markov Process Based Approach to Effective Attacking JPEG Steganography[A].Saint Malo,France:Springer,2007.
  • 6Lyu S,Farid H. How Realistic is Photorealistic[J].{H}IEEE Transactions on Signal Processing,2005,(02):845-850.
  • 7Budhia U,Kundur D,Zourntos T. Digital Video Steganalysis Exploiting Statistical Visibility in the Temporal Domain[J].IEEE Transactions on Information Forensics and Security,2006,(04):502-516.
  • 8刘镔,刘粉林,杨春芳.基于帧间共谋的视频隐写分析[J].通信学报,2009,30(4):41-49. 被引量:4
  • 9郑鹏,刘敏忠.一种基于DCT域的视频水印算法[J].武汉理工大学学报,2009,31(18):9-11. 被引量:5
  • 10徐长勇,平西建.基于时空相关性的视频隐写分析[J].中国图象图形学报,2010,15(9):1331-1337. 被引量:4

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部