Digital Video Steganalysis Exploiting Statistical Visibility in the Temporal Domain

In this paper, we present effective steganalysis techniques for digital video sequences based on interframe collusion that exploits the temporal statistical visibility of a hidden message. Steganalysis is the process of detecting, with high probability, the presence of covert data in multimedia. Present image steganalysis algorithms when applied directly to video sequences on a frame-by-frame basis are suboptimal; we present methods that overcome this limitation by using redundant information present in the temporal domain to detect covert messages embedded via spread-spectrum steganography. Our performance gains are achieved by exploiting the collusion attack that has recently been studied in the field of digital video watermarking and pattern recognition tools. Through analysis and simulations, we evaluate the effectiveness of the video steganalysis based on linear collusion approaches. The proposed steganalysis methods are successful in detecting hidden watermarks bearing low energy with high accuracy. The simulation results also show the improved performance of the proposed temporal-based methods over purely spatial methods

[1]  Deepa Kundur,et al.  Digital video steganalysis exploiting collusion sensitivity , 2004, SPIE Defense + Commercial Sensing.

[2]  Siwei Lyu,et al.  Higher-order Wavelet Statistics and their Application to Digital Forensics , 2003, 2003 Conference on Computer Vision and Pattern Recognition Workshop.

[3]  I. Miller Probability, Random Variables, and Stochastic Processes , 1966 .

[4]  Shaohui Liu,et al.  Steganalysis based on wavelet texture analysis and neural network , 2004, Fifth World Congress on Intelligent Control and Automation (IEEE Cat. No.04EX788).

[5]  Min Wu,et al.  Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation , 2005, IEEE Transactions on Image Processing.

[6]  Miroslav Goljan,et al.  Steganalysis based on JPEG compatibility , 2001, SPIE ITCom.

[7]  John G. Proakis,et al.  Probability, random variables and stochastic processes , 1985, IEEE Trans. Acoust. Speech Signal Process..

[8]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..

[9]  Udit Budhia,et al.  Steganalysis of video sequences using collusion sensitivity , 2006 .

[10]  Siwei Lyu,et al.  Steganalysis using color wavelet statistics and one-class support vector machines , 2004, IS&T/SPIE Electronic Imaging.

[11]  K. J. Ray Liu,et al.  Collusion resistance of multimedia fingerprinting using orthogonal modulation , 2005 .

[12]  Bülent Sankur,et al.  Statistical evaluation of image quality measures , 2002, J. Electronic Imaging.

[13]  Jiri Fridrich,et al.  Steganalysis of LSB encoding in color images , 2000, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532).

[14]  Rajarathnam Chandramouli,et al.  A mathematical framework for active steganalysis , 2003, Multimedia Systems.

[15]  Siwei Lyu,et al.  Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines , 2002, Information Hiding.

[16]  Niels Provos,et al.  Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.

[17]  George M. Mohay,et al.  Computer and Intrusion Forensics , 2003 .

[18]  Gary C. Kessler Steganography: Implications for the Prosecutor and Computer Forensics Examiner , 2004 .

[19]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[20]  Nasir D. Memon,et al.  Steganalysis based on image quality metrics , 2001, 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564).

[21]  William A. Pearlman,et al.  Steganalysis of additive-noise modelable information hiding , 2003, IS&T/SPIE Electronic Imaging.

[22]  Andreas Pfitzmann,et al.  Attacks on Steganographic Systems , 1999, Information Hiding.

[23]  Hany Farid,et al.  Detecting hidden messages using higher-order statistical models , 2002, Proceedings. International Conference on Image Processing.

[24]  Richard O. Duda,et al.  Pattern classification and scene analysis , 1974, A Wiley-Interscience publication.

[25]  Robert E. Tarjan,et al.  Resistance of digital watermarks to collusive attacks , 1998, Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252).

[26]  Lisa M. Marvel,et al.  Spread spectrum image steganography , 1999, IEEE Trans. Image Process..

[27]  Deepa Kundur,et al.  Statistical invisibility for collusion-resistant digital video watermarking , 2005, IEEE Transactions on Multimedia.

[28]  Nasir D. Memon,et al.  A distributed detection framework for Steganalysis , 2000, MULTIMEDIA '00.

[29]  Nasir D. Memon,et al.  Image Steganalysis with Binary Similarity Measures , 2005, EURASIP J. Adv. Signal Process..

[30]  Jerry D. Gibson,et al.  Handbook of Image and Video Processing , 2000 .

[31]  Deepa Kundur,et al.  Spatially localized image-dependent watermarking for statistical invisibility and collusion resistance , 2005, IEEE Transactions on Multimedia.

[32]  Wen Gao,et al.  Steganalysis of data hiding techniques in wavelet domain , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[33]  Min Wu,et al.  Anti-collusion fingerprinting for multimedia , 2003, IEEE Trans. Signal Process..