[1] |
KUTTER M, JORDAN F, EBRAHIMI T. Proposal of A Watermarking Technique for Hiding/Retrieving Data in Compressed And Decompressed Video:Technical Report M2281,JTC1/SC29/WG11[R]. Geneva:ISO/IEC, 1997.
|
[2] |
XU C Y, PING X J, ZHANG T. Steganography in Compressed Video Stream[C]// Proceedings of the 1st International Conference on Innovative Computing,Information and Control.Piscataway:IEEE, 2006:269-272.
|
[3] |
FANG D Y, CHANG L W. Data Hiding for Digital Video with Phase of Motion Vector[C]// Proceedings of IEEE International Symposium on Circuits and Systems.Piscataway:IEEE, 2006:1422-1425.
|
[4] |
ALY H. Data Hiding in Motion Vectors of Compressed Video Based on Their Associated Prediction Error[J]. IEEE Transactions on Information Forensics and Security, 2011, 6(1):14-18.
doi: 10.1109/TIFS.2010.2090520
|
[5] |
CAO Y, ZHAO X F, FENG D G, et al. Video Steganography with Perturbed Motion Estimation[C]// Proceedings of the 13th International Conference on Information Hiding.Heidelberg:Springer, 2011:193-207.
|
[6] |
CAO Y, ZHANG H, ZHAO X F, et al. Video Steganography Based on Optimized Motion Estimation Perturbation[C]// Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security. New York: ACM, 2015:25-31.
|
[7] |
FILLER T, JUDAS J, FRIDRICH J. Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes[J]. IEEE Transactions on Information Forensics and Security, 2011, 6(3):920-935.
doi: 10.1109/TIFS.2011.2134094
|
[8] |
钮可, 李军, 刘佳, 等. 博弈模型上的策略自适应隐写方法[J]. 西安电子科技大学学报, 2015, 42(4):165-170.
|
|
NIU Ke, LI Jun, LIU Jia, et al. Strategic Adaptive Steganography Based on the Game Theory Model[J]. Journal of Xidian University, 2015, 42(4):165-170..
|
[9] |
YAO Z Y, ZHANG W M, YU N H, et al. Defining Embedding Distortion for Motion Vector-Based Video Steganography[J]. Multimedia Tools and Applications, 2015, 74(24):11163-11186.
doi: 10.1007/s11042-014-2223-8
|
[10] |
WANG P P, ZHANG H, CAO Y, et al. A Novel Embedding Distortion for Motion Vector-Based Steganography Considering Motion Characteristic,Local Optimality and Statistical Distribution[C]// Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, New York: ACM, 2016:127-137.
|
[11] |
王丽娜, 徐一波, 翟黎明, 等. 基于宏块复杂度的自适应视频运动矢量隐写算法[J]. 计算机学报, 2017, 40(5):1044-1056.
|
|
WANG Lina, XU Yibo, ZHAI Liming, et al. An Adaptive Video Motion Vector Steganography Based on Macroblock Complexity[J]. Chinese Journal of Computers, 2017, 40(5):1044-1056.
|
[12] |
ZHAI L M, WANG L N, REN Y Z. Multi-Domain Embedding Strategies for Video Steganography by Combining Partition Modes and Motion Vectors[C]// 2019 IEEE International Conference on Multimedia and Expo,Piscataway:IEEE, 2019:1402-1407.
|
[13] |
王丽娜, 王旻杰, 翟黎明, 等. 基于相关性异常的H.264/AVC视频运动矢量隐写分析算法[J]. 电子学报, 2014, 42(8):1457-1464.
doi: 10.3969/j.issn.0372-2112.2014.08.001
|
|
WANG Lina, WANG Minjie, ZHAI Liming, et al. H.264/AVC Video Steganalysis Algorithm Based on Motion Vector Abnormal Correlation[J]. Acta Electronica Sinica, 2014, 42(8):1457-1464.
doi: 10.3969/j.issn.0372-2112.2014.08.001
|
[14] |
张弘, 尤玮珂, 赵险峰. 视频隐写分析技术研究综述[J]. 信息安全学报, 2018, 3(6):13-27.
|
|
ZHANG Hong, YOU Weike, ZHAO Xianfeng. A Survey of Video Steganalysis[J]. Journal of Cyber Security. 2018, 3(6):13-27.
|
[15] |
ZHAI L M, WANG L N, REN Y Z. Universal Detection of Video Steganography in Multiple Domains Based on the Consistency of Motion Vectors[J]. IEEE Transactions on Information Forensics and Security, 2020, 15:1762-1777.
doi: 10.1109/TIFS.2019.2949428
|
[16] |
WANG K R, ZHAO H, WANG H X. Video Steganalysis Against Motion Vector-Based Steganography by Adding or Subtracting One Motion Vector Value[J]. IEEE Transactions on Information Forensics and Security. 2014, 9(5):741-751.
doi: 10.1109/TIFS.2014.2308633
|
[17] |
ZHAI L M, WANG L N, REN Y Z. Combined and Calibrated Features for Steganalysis of Motion Vector-Based Steganography in H.264/AVC[C]// Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security. New York: ACM, 2017:135-146.
|
[18] |
CHANG C, LIN C. LIBSVM:A Library for Support Vector Machines[J]. ACM Transactions on Intelligent Systems and Technology, 2011, 3:1-27.
|