Towards digital video steganalysis using asymptotic memoryless detection

This paper studies the potential for passive steganalysis in correlated image frames using non-classical detection theory. In particular, an algorithm for digital video steganalysis, named MoViSteg for Motion-based Video Steganalysis, is developed that exploits the temporal correlation among individual image frames in video signals to enhance steganalysis performance. The method differs from prior art in the use of motion interpolation and non-classical asymptotic memoryless detection that we believe is well-suited for video steganalysis. Results and discussion are provide in order to demonstrate the potential of our ideas for intrusion detection in a broad class of emerging multimedia applications.

[1]  Andreas Pfitzmann,et al.  Attacks on Steganographic Systems , 1999, Information Hiding.

[2]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[3]  Miroslav Goljan,et al.  Steganalysis based on JPEG compatibility , 2001, SPIE ITCom.

[4]  Siwei Lyu,et al.  Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines , 2002, Information Hiding.

[5]  Gary L. Wise,et al.  Asymptotic memoryless detection of random signals in dependent noise , 1981 .

[6]  Jessica J. Fridrich,et al.  Reliable detection of LSB steganography in color and grayscale images , 2001, MM&Sec '01.

[7]  B. S. Manjunath,et al.  Steganalysis of spread spectrum data hiding exploiting cover memory , 2005, IS&T/SPIE Electronic Imaging.

[8]  Nasir D. Memon,et al.  Steganalysis based on image quality metrics , 2001, 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564).

[9]  Andrew G. Tescher,et al.  Multimedia Systems and Applications IV , 2001 .

[10]  Deepa Kundur,et al.  Digital Video Steganalysis Exploiting Statistical Visibility in the Temporal Domain , 2006, IEEE Transactions on Information Forensics and Security.

[11]  Joseph P. Romano,et al.  Testing Statistical Hypotheses, Third Edition , 2008, Springer texts in statistics.

[12]  Steven J. Murdoch,et al.  Embedding Covert Channels into TCP/IP , 2005, Information Hiding.

[13]  Yunfei Zheng,et al.  Video error concealment based on implicit motion models , 2005, SPIE Optics East.

[14]  Jean-Yves Le Boudec,et al.  Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks , 2002, Proceedings 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing.

[15]  B. S. Manjunath,et al.  Steganalysis for Markov cover data with applications to images , 2006, IEEE Transactions on Information Forensics and Security.

[16]  Deepa Kundur,et al.  Practical Data Hiding in TCP/IP , 2002 .

[17]  G. L. Wise,et al.  A Detection Scheme for Dependent Noise Processes , 1980 .