H Zhang, Y Cao, X Zhao - Multimedia Tools and Applications, 2016 - Springer
Current motion vector based video steganography is unable to preserve the local optimality of modified motion vectors. Thus they are vulnerable to the attack of steganalysis. In this …
A Sur, SV Madhav Krishna, N Sahu, S Rana - Multimedia Tools and …, 2015 - Springer
In this paper, a new steganalysis technique is proposed to detect the motion vector based steganography for the compressed videos. The proposed scheme explores the flickering …
Y Deng, Y Wu, H Duan, L Zhou - Optik, 2013 - Elsevier
Unlike traditional video steganography, motion-vectors-based steganographic approaches embed messages by modifying the motion vectors of the cover video. The scheme may …
Y Liu, S Liu, Y Wang, H Zhao, S Liu - Neurocomputing, 2019 - Elsevier
Video steganography is becoming an important research area in various data hiding technologies, which has become a promising tool because not only the security requirement …
P Wang, Y Cao, X Zhao - Security and Communication …, 2017 - Wiley Online Library
This paper presents a steganalytic approach against video steganography which modifies motion vector (MV) in content adaptive manner. Current video steganalytic schemes extract …
P Wang, H Zhang, Y Cao, X Zhao - … of the 4th ACM Workshop on …, 2016 - dl.acm.org
This paper presents an effective motion vector (MV)-based steganography to cope with different steganalytic models. The main principle is to define a distortion scale expressing …
The basic requirement of a steganography approach is security against steganalysis attacks. In other words, a steganography method is reliable as long as it withstands all of the known …
L Zhang, X Zhao - Digital Forensics and Watermarking: 15th International …, 2017 - Springer
In this paper, we proposed an adaptive video steganography algorithm based on intra- prediction mode. Unlike traditional approaches locating the embedding position referring to …
Recently, many video steganography algorithms based on the intra-prediction mode (IPM) have been adaptive steganography algorithms. These algorithms usually focus on the …