Skip to main content
Log in

Cross correlation feature mining for steganalysis of hash based least significant bit substitution video steganography

  • Published:
Telecommunication Systems Aims and scope Submit manuscript

Abstract

Recently, video steganography has attracted researchers’ attentions for its relative higher capacity than steganographic technique using image or audio as cover. Various image steganographic techniques have been proposed, such as least significant bit (LSB) substitution, LSB matching, etc. In (Dasgupta et al. in Int J Secur Priv Trust Manag 4:1–11, 2012), the authors proposed a hash based least significant bit substitution video steganography in spatial domain, and eight bits of secret message were divided into 3, 3, 2 segments and embedded into the RGB pixel values of cover frame. Besides, a hash function was used to determine the embedding locations. However, the hash function is fragile to attack and the observer can easily figure out the exact embedded positions. Moreover, the embedding of secret message significantly changes the cross correlation feature of consecutive video frames. Based on cross correlation analysis, a video steganalysis technique is proposed in this paper. Theoretical analysis and experimental results all show the effectiveness of the proposed cross correlation based video steganalysis technique.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Betancourt, S. R. (2004). Global information assurance certification paper. Washington, DC: SANS Institute.

    Google Scholar 

  2. Budhia, U., & Kundur, D. (2004). Digital video steganalysis exploiting collusion sensitivity. Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense, 3(5403), 210–211.

    Article  Google Scholar 

  3. Jainsky, J. S., Kundur, D., & Halverson, D.R. (2007). Towards digital video steganalysis using asymptotic memoryless detection. In Proceedings of 9th Workshop on Multimedia and Security (pp. 161–165).

  4. Bryan, K. (2013). Video steganalysis for digital forensics investigation. PhD. Dissertation, University of Rhode Island.

  5. Budhia, U., Kundur, D., & Zourntos, T. (2006). Digital video steganalysis exploiting statistical visibility in the temporal domain. IEEE Transaction on Information Forensics and Security, 1(4), 502–516.

    Article  Google Scholar 

  6. Deng, Y., Wu, Y. J., & Duan, H. B. (2013). Digital video steganalysis based on motion vector statistical characteristics. International Journal for Light and Electron Optics, 124(14), 1705–1710.

    Article  Google Scholar 

  7. Su, Y. T., Zhang, C. Q., & Zhang, C. T. (2011). A video steganalytic algorithm against motion-vector-based steganography. Signal Processing, 91(8), 1901–1909.

    Article  Google Scholar 

  8. Dasgupta, K., Mandal, J. K., & Dutta, P. (2012). Hash based least signification bit technique for video steganography (HLSB). International Journal of Security, Privacy and Trust Management, 4, 1–11.

    Google Scholar 

Download references

Acknowledgments

This work was supported by the National Natural Science Foundation of China (NSFC) under Grant No. 61170175.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to PeiPei Liu.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Fan, M., Liu, P., Wang, H. et al. Cross correlation feature mining for steganalysis of hash based least significant bit substitution video steganography. Telecommun Syst 63, 523–529 (2016). https://doi.org/10.1007/s11235-016-0139-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11235-016-0139-5

Keywords

Navigation