IJMTES – CALIBRATION-BASED STEGANALYTIC SCHEME AGAINST MV-BASED STEGANOGRAPHY

Journal Title : International Journal of Modern Trends in Engineering and Science

Author’s Name : Dhivya Ramakrishnan,S.Sowmya,M.Punithalatha

Volume 01 Issue o7   Year 2014  

ISSN no:  2348-3121 

Page no: 14-19

Abstract— Video Steganography is a method toward hide some kind of files within any expansion keeps on carrying Video file. Video steganography in spatial / transformation area, motion vector (MV)-based method objective is to target the interior dynamics of video compression and embed messages whereas performing arts motion estimation. Several methods adopt non optimal collection of rules and adapt the changes in MVs arbitrary manners which break the encoding principles a lot. It aim son the fault of the video steganography. To conquer these difficulties we intend a calibration-based approach and proposition of MV reversion- based features used for steganalysis. MV-based steganography share a number of features into common, i.e., they primary choose a subset of MVs follow a predefined selection rule(SR).Motion-compensated prediction be an essential part of video compression and its necessary idea to predict the frame toward be coded using one or more earlier coded frames. We enhance our work by means of image fusion technique .Image Fusion produces a single image through by combining  information beginning a set of source images together using pixel, feature. In order to enhance the quality and compared proposed method with two other methods i.e. image fusion using wavelet transform and weighted average discrete wavelet transform based image fusion using genetic algorithm.

Keywords— Calibration,Steganalysis,Video, Image Fusion, Fuzzy logic, Wavelet transform.

Reference

[1] J. Fridrich, “Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes,” in Proc. IH’04, Lecture Notes in Computer Science, 2004, Vol. 3200/2005, pp. 67–81.
[2] H. Aly, “Data hiding in motion vectors of compressed video based on their associated prediction error,” IEEE Trans. Inf. Forensics Secur., Vol. 6, No.1, pp. 14–18, (2011).
[3] C. Xu, X. Ping, and T. Zhang, “Steganography in compressed video stream,” in Proc. ICICIC’06, 2006, pp. 269–272.
[4] D. Fang and L.Chang, “Data hiding for digital video with phase of motion vector,” in Proc. Int. Symposium on Circuit and Systems (ISCAS)[C], 2006, pp. 1422–1425.
[5] Y. Cao, X. Zhao, D. Feng, and R. Sheng, “Video steganography with perturbed motion estimation,” in Proc. IH’11, Lecture Notes in Computer Science, 2011, vol. 6958, pp. 193–207.
[6] U. Budhia, D. Kundur, and T. Zourntos, “Digital video steganalysis exploiting statistical visibility in the temporal domain,” IEEE Trans Inf. Forensics Secur., Vol. 1, pp. 43–55, (2006).
[7] J. S. Jainsky, D. Kundur, and D. R. Halverson, “Towards digital video steganalysis using asymptotic memory less detection,” in Proc. MM&Sec’07, (2007), pp. 161–168.
[8] C. Zhang, Y. Su, and C. Zhang, “Video steganalysis based on aliasing detection,” Electron. Lett., Vol. 44, No. 13, pp. 801–803, (2008).
[9] V. Pankajakshan, G. Doerr, and P. K. Bora, “Detection of motion-incoherent components in video streams,” IEEE Trans. Inf. Forensics Secur., Vol. 4, No. 1, pp. 49–58, (2009).
[10] F.Bellifemine, A.Capellino, A.Chimienti, R Picco, and R.Ponti, “Statistical analysis of the 2D-DCT coefficients of the differential signal for images,” Signal Process.: Image Commun., Vol. 4, No. 6,pp. 477–488, (1992).
[11] M. J. Gormish and J. T. Gill, “Computation-rate-distortion in transform coders for image compression,” SPIE Vis. Commun. Image Process.pp. 146–152, (1993).
[12] Laure J Chip man & Timothy M Orr, (1995) “Wavelets and Image Fusion”, Proceedings of SPIE, Vol. 2569, No. 208, pp. 248-251.
[13] Ligia Chiorean & Mircea Florin Vaida, (2009) “Medical Image Fusion Based on Discrete Wavelet Transform Using Java Technology”, Proceedings of the ITI, pp55-60.
[14] Prakash NK (2011)“Image Fusion Algorithm Based on Biorthogonal wavelet”, International Journal of Enterprise Computing and Business Systems, Vol. 1, No. 2, pp1-6.
[15] Krista Amolins & Yun Zhang, Peter Dare, (2007) “Wavelet based image fusion techniques – An introduction, review and comparision”, ISPRS Journal of Photogrammetric & Remote Sensing, Vol. 62, No. 4, pp249–263.
[16] Susmitha Vekkot, & Pancham Shukla, (2009) “A Novel Architecture for Wavelet based Image Fusion”, World Academy of Science, Engineering and Technology, Vol. 57, pp372-377.
[17] Yi Zheng & Ping Zheng, (2010) “Multisensor Image Fusion using Fuzzy Logic for Surveillance Systems”, Seventh International Conference on Fuzzy Systems and Knowledge Discovery, Vol. 2, pp588-592.
[18] The Online Resource for Research in Image Fusion, http://www.imagefusion.org.
[19] Maruthi R & Sankarasubramanian K, (2008) “Pixel Level Multifocal Image Fusion Based on Fuzzy Logic Approach”, Asian Journal of Information Technology, Vol 7, No.4,pp168-171.
[20] Thomas J. Meltzer, Davis Bednorz, Sohn E.J, Kimberly Lane & Darryl Bryk, (2002) “Fuzzy Logic Based Image Fusion”, pp1-9.

Full Pdf Paper-Click Here