Aaron T. Sharp, Qilin Qi, Yaoqing Yang, D. Peng, H. Sharif
{"title":"基于多维离散弹簧变换的视频隐写攻击","authors":"Aaron T. Sharp, Qilin Qi, Yaoqing Yang, D. Peng, H. Sharif","doi":"10.1109/ICSIPA.2013.6708000","DOIUrl":null,"url":null,"abstract":"Video steganography is fast emerging as a next-generation steganographic medium that offers many advantages over traditional steganographic cover media such as audio and images. Various schemes have recently emerged which take advantage of video specific properties for information hiding, most notably through the use of motion vectors. Although many steganographic schemes have been proposed which exploit several possible steganographic domains within video sequences, few attacks have been proposed to combat such schemes, and no current attacks have been shown to be capable of defeating multiple schemes at once. In this paper, we will further expand upon our proposed Discrete Spring Transform (DST) steganographic attack. We will explore further applications of the transform and how it may be used to defeat multiple steganographic schemes, specifically current video steganography schemes. The effectiveness of the proposed algorithm will be shown by attacking a multi-dimensional steganographic algorithm embedded in video sequences, where the scheme operates in two different dimensions of the video. The attack is successful in defeating multiple steganographic schemes verified by determining the BER after DST attack which always remains approximately 0.5. Furthermore, the attack preserves the integrity of the video sequence which is verified by determining the PSNR which always remains approximately above 30dB.","PeriodicalId":440373,"journal":{"name":"2013 IEEE International Conference on Signal and Image Processing Applications","volume":"143 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"19","resultStr":"{\"title\":\"A video steganography attack using multi-dimensional Discrete Spring Transform\",\"authors\":\"Aaron T. Sharp, Qilin Qi, Yaoqing Yang, D. Peng, H. Sharif\",\"doi\":\"10.1109/ICSIPA.2013.6708000\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Video steganography is fast emerging as a next-generation steganographic medium that offers many advantages over traditional steganographic cover media such as audio and images. Various schemes have recently emerged which take advantage of video specific properties for information hiding, most notably through the use of motion vectors. Although many steganographic schemes have been proposed which exploit several possible steganographic domains within video sequences, few attacks have been proposed to combat such schemes, and no current attacks have been shown to be capable of defeating multiple schemes at once. In this paper, we will further expand upon our proposed Discrete Spring Transform (DST) steganographic attack. We will explore further applications of the transform and how it may be used to defeat multiple steganographic schemes, specifically current video steganography schemes. The effectiveness of the proposed algorithm will be shown by attacking a multi-dimensional steganographic algorithm embedded in video sequences, where the scheme operates in two different dimensions of the video. The attack is successful in defeating multiple steganographic schemes verified by determining the BER after DST attack which always remains approximately 0.5. Furthermore, the attack preserves the integrity of the video sequence which is verified by determining the PSNR which always remains approximately above 30dB.\",\"PeriodicalId\":440373,\"journal\":{\"name\":\"2013 IEEE International Conference on Signal and Image Processing Applications\",\"volume\":\"143 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"19\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 IEEE International Conference on Signal and Image Processing Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSIPA.2013.6708000\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 IEEE International Conference on Signal and Image Processing Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSIPA.2013.6708000","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A video steganography attack using multi-dimensional Discrete Spring Transform
Video steganography is fast emerging as a next-generation steganographic medium that offers many advantages over traditional steganographic cover media such as audio and images. Various schemes have recently emerged which take advantage of video specific properties for information hiding, most notably through the use of motion vectors. Although many steganographic schemes have been proposed which exploit several possible steganographic domains within video sequences, few attacks have been proposed to combat such schemes, and no current attacks have been shown to be capable of defeating multiple schemes at once. In this paper, we will further expand upon our proposed Discrete Spring Transform (DST) steganographic attack. We will explore further applications of the transform and how it may be used to defeat multiple steganographic schemes, specifically current video steganography schemes. The effectiveness of the proposed algorithm will be shown by attacking a multi-dimensional steganographic algorithm embedded in video sequences, where the scheme operates in two different dimensions of the video. The attack is successful in defeating multiple steganographic schemes verified by determining the BER after DST attack which always remains approximately 0.5. Furthermore, the attack preserves the integrity of the video sequence which is verified by determining the PSNR which always remains approximately above 30dB.