{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T04:26:50Z","timestamp":1761712010360,"version":"build-2065373602"},"reference-count":46,"publisher":"Institution of Engineering and Technology (IET)","issue":"5","license":[{"start":{"date-parts":[[2023,12,15]],"date-time":"2023-12-15T00:00:00Z","timestamp":1702598400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272478","62202496","62102450"],"award-info":[{"award-number":["62272478","62202496","62102450"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["ietresearch.onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["IET Image Processing"],"published-print":{"date-parts":[[2024,4]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>Video steganography has the potential to be used to convey illegal information, and video steganalysis is a vital tool to detect the presence of this illicit act. Currently, all the motion vector (MV)\u2010based video steganalysis algorithms extract feature sets directly from the MVs, but ignoring the embedding operation may perturb the statistical distribution of other video encoding elements, such as the skipped macroblocks (no direct MVs). This paper proposes a novel 11\u2010dimensional feature set to detect MV\u2010based video steganography based on the above observation. The proposed feature is extracted based on the skipped macroblocks by recompression calibration. Specifically, the feature consists of two components. The first is the probability distribution of motion vector prediction (MVP) difference, and the second is the probability distribution of partition state transfer. Extensive experiments on different conditions demonstrate that the proposed feature set achieves good detection accuracy, especially in lower embedding capacities. In addition, the loss of detection performance caused by recompression calibration using mismatched quantization parameters (QP) is within the acceptable range, so the proposed method can be used in practical\u00a0scenarios.<\/jats:p>","DOI":"10.1049\/ipr2.13014","type":"journal-article","created":{"date-parts":[[2023,12,16]],"date-time":"2023-12-16T02:48:21Z","timestamp":1702694901000},"page":"1132-1144","update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Motion vector\u2010domain video steganalysis exploiting skipped macroblocks"],"prefix":"10.1049","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4002-4619","authenticated-orcid":false,"given":"Jun","family":"Li","sequence":"first","affiliation":[{"name":"College of Cryptography Engineering Engineering University of the Chinese People's Armed Police Force Xi'an China"}]},{"given":"Minqing","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Cryptography Engineering Engineering University of the Chinese People's Armed Police Force Xi'an China"}]},{"given":"Ke","family":"Niu","sequence":"additional","affiliation":[{"name":"College of Cryptography Engineering Engineering University of the Chinese People's Armed Police Force Xi'an China"}]},{"given":"Yingnan","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Cryptography Engineering Engineering University of the Chinese People's Armed Police Force Xi'an China"}]},{"given":"Xiaoyuan","family":"Yang","sequence":"additional","affiliation":[{"name":"College of Cryptography Engineering Engineering University of the Chinese People's Armed Police Force Xi'an China"}]}],"member":"265","published-online":{"date-parts":[[2023,12,15]]},"reference":[{"key":"e_1_2_10_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2022.108711"},{"key":"e_1_2_10_3_1","doi-asserted-by":"publisher","DOI":"10.1049\/ipr2.12573"},{"key":"e_1_2_10_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-021-09968-0"},{"key":"e_1_2_10_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2018.09.091"},{"key":"e_1_2_10_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2022.3150180"},{"key":"e_1_2_10_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3144139"},{"key":"e_1_2_10_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2023.3269663"},{"key":"e_1_2_10_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3140899"},{"key":"e_1_2_10_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2090520"},{"key":"e_1_2_10_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2023.103442"},{"key":"e_1_2_10_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3058134"},{"key":"e_1_2_10_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2177087"},{"key":"e_1_2_10_14_1","unstructured":"Fang D. Chang L.:Data hiding for digital video with phase of motion vector. In:Proceedings of the 2006 IEEE International Symposium on Circuits and Systems (ISCAS) p.4.IEEE Piscataway NJ(2006)"},{"key":"e_1_2_10_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2006.879281"},{"key":"e_1_2_10_16_1","doi-asserted-by":"crossref","unstructured":"Cao Y. Zhao X. Feng D. Sheng R.:Video steganography with perturbed motion estimation. In:Proceedings of International Workshop on Information Hiding pp.193\u2013207.Springer Heidelberg(2011)","DOI":"10.1007\/978-3-642-24178-9_14"},{"key":"e_1_2_10_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2134094"},{"key":"e_1_2_10_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-014-2223-8"},{"key":"e_1_2_10_19_1","doi-asserted-by":"crossref","unstructured":"Cao Y. Zhang H. Zhao X. Yu H.:Video steganography based on optimized motion estimation perturbation. In:Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security pp.25\u201331.Association for Computing Machinery New York NY(2015)","DOI":"10.1145\/2756601.2756609"},{"key":"e_1_2_10_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2014.2387160"},{"key":"e_1_2_10_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-2743-x"},{"key":"e_1_2_10_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-08617-y"},{"key":"e_1_2_10_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2023.103439"},{"key":"e_1_2_10_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2021.3135384"},{"key":"e_1_2_10_25_1","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/2946812"},{"key":"e_1_2_10_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2011.02.012"},{"key":"e_1_2_10_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2016.2567073"},{"key":"e_1_2_10_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2011.2176116"},{"key":"e_1_2_10_29_1","doi-asserted-by":"crossref","unstructured":"Zhai L. Wang L. Ren Y.:Combined and calibrated features for steganalysis of motion vector\u2010based steganography in H.264\/AVC. In:Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security pp.135\u2013146.Association for Computing Machinery New York NY(2017)","DOI":"10.1145\/3082031.3083237"},{"key":"e_1_2_10_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2308633"},{"key":"e_1_2_10_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2623587"},{"key":"e_1_2_10_32_1","unstructured":"Zhai L. Wang L. Ren Y. Liu Y.:Generalized local optimality for video steganalysis in motion vector domain. arXiv:2112.11729 (2021). doi:https:\/\/doi.org\/10.48550\/arXiv.2112.11729"},{"key":"e_1_2_10_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2949428"},{"key":"e_1_2_10_34_1","doi-asserted-by":"crossref","unstructured":"Huang X. Hu Y. Wang Y. Liu B. Liu S.:Deep learning\u2010based quantitative steganalysis to detect motion vector embedding of HEVC videos In:2020 IEEE Fifth International Conference on Data Science in Cyberspace (DSC) pp.150\u2013155.IEEE Piscataway NJ(2020)","DOI":"10.1109\/DSC50466.2020.00030"},{"key":"e_1_2_10_35_1","unstructured":"Wiegand T.:Joint Video Team: Draft ITU\u2010T Recommendation and Final draft international standard of joint video specification. ITU\u2010T Recommendation H. 264 and ISO\/IEC 14496\u201010 AVC(2003)"},{"key":"e_1_2_10_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.815165"},{"key":"e_1_2_10_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2012.2221191"},{"key":"e_1_2_10_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2021.3101953"},{"key":"e_1_2_10_39_1","unstructured":"Lee J. Jeon B.:Fast mode decision for H.264. In:2004 IEEE International Conference on Multimedia and Expo (ICME) pp.1131\u20131134.IEEE Piscataway NJ(2014)"},{"key":"e_1_2_10_40_1","unstructured":"VideoLAN\u2010x264. The Best H.264\/AVC Encoder.http:\/\/www.videolan.org\/developers\/x264.html. Accessed 13 Feb 2022"},{"key":"e_1_2_10_41_1","unstructured":"YUV Video Sequences.http:\/\/trace.eas.asu.edu\/yuv\/index.html. Accessed 20 April 2022"},{"key":"e_1_2_10_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30114-1_6"},{"key":"e_1_2_10_43_1","doi-asserted-by":"publisher","DOI":"10.1364\/AO.51.004667"},{"key":"e_1_2_10_44_1","doi-asserted-by":"crossref","unstructured":"Wang P. Cao Y. Zhao X. Wu B.:Motion vector reversion\u2010based steganalysis revisited. In:2015 IEEE China Summit Int. Conf. Signal Infor. Process pp.463\u2013467.IEEE Piscataway NJ(2015)","DOI":"10.1109\/ChinaSIP.2015.7230445"},{"key":"e_1_2_10_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2002.1003474"},{"key":"e_1_2_10_46_1","unstructured":"The FFmpeg Developers FFMPEG.http:\/\/www.ffmpeg.org. Accessed 25 April 2022"},{"key":"e_1_2_10_47_1","unstructured":"Chang C.\u2010C. Lin C.\u2010J.:LIBSVM: A library for support vector machines.https:\/\/www.csie.ntu.edu.tw\/~cjlin\/libsvm. Accessed 20 May 2022"}],"container-title":["IET Image Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/ipr2.13014","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T23:10:17Z","timestamp":1761693017000},"score":1,"resource":{"primary":{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/10.1049\/ipr2.13014"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,15]]},"references-count":46,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2024,4]]}},"alternative-id":["10.1049\/ipr2.13014"],"URL":"https:\/\/doi.org\/10.1049\/ipr2.13014","archive":["Portico"],"relation":{},"ISSN":["1751-9659","1751-9667"],"issn-type":[{"type":"print","value":"1751-9659"},{"type":"electronic","value":"1751-9667"}],"subject":[],"published":{"date-parts":[[2023,12,15]]},"assertion":[{"value":"2023-02-08","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-12-07","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-12-15","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}