Advanced Search
Volume 42 Issue 10
Oct.  2020
Turn off MathJax
Article Contents
Lincong LI, Yuanzhi YAO, Xiaoya ZHANG, Weiming ZHANG, Nenghai YU. Video Steganography Based on Modification Probability Transformation and Non-additive Embedding Distortion[J]. Journal of Electronics & Information Technology, 2020, 42(10): 2357-2364. doi: 10.11999/JEIT200001
Citation: Lincong LI, Yuanzhi YAO, Xiaoya ZHANG, Weiming ZHANG, Nenghai YU. Video Steganography Based on Modification Probability Transformation and Non-additive Embedding Distortion[J]. Journal of Electronics & Information Technology, 2020, 42(10): 2357-2364. doi: 10.11999/JEIT200001

Video Steganography Based on Modification Probability Transformation and Non-additive Embedding Distortion

doi: 10.11999/JEIT200001
Funds:  The National Natural Science Foundation of China (61802357, U1636201), The National Key Research and Development Program of China (2018YFB0804102), The Fundamental Research Funds for the Central Universities (WK3480000009)
  • Received Date: 2020-01-02
  • Rev Recd Date: 2020-08-04
  • Available Online: 2020-08-12
  • Publish Date: 2020-10-13
  • In recent years, research on motion vector-based video steganography has attracted considerable attention from researchers in the field of information hiding. Many video steganographic methods incorporating motion vector-based additive embedding distortion functions have achieved good performance. However, the mutual embedding impact between cover elements in video steganography is neglected in these additive embedding distortion functions. In this paper, joint distortion which reflects the mutual embedding impact for motion vectors is designed. By decomposing joint embedding distortion, modification probability transformation can be achieved and embedding payloads can be dynamically and reasonably allocated in horizontal components and vertical components of motion vectors. Therefore, the video steganography method using non-additive embedding distortion is proposed. Experimental results demonstrate that the proposed method can enhance the security performance significantly compared with the typical methods using additive embedding distortions and obtain the relatively better video coding quality as well.
  • loading
  • HUSSAIN M, WAHAB A W A, IDRIS Y I B, et al. Image steganography in spatial domain: A survey[J]. Signal Processing: Image Communication, 2018, 65: 46–66. doi: 10.1016/j.image.2018.03.012
    吴志军, 李常亮, 李荣. 基于随机位置选择和矩阵编码的语音信息隐藏方法[J]. 电子与信息学报, 2020, 42(2): 355–363. doi: 10.11999/JEIT181163

    WU Zhijun, LI Changliang, and LI Rong. Speech information hiding method based on random position selection and matrix coding[J]. Journal of Electronics &Information Technology, 2020, 42(2): 355–363. doi: 10.11999/JEIT181163
    LIU Yunxia, LIU Shuyang, WANG Yonghao, et al. Video steganography: A review[J]. Neurocomputing, 2019, 335: 238–250. doi: 10.1016/j.neucom.2018.09.091
    XU Changyong, PING Xijian, and ZHANG Tao. Steganography in compressed video stream[C]. The 1st International Conference on Innovative Computing, Information and Control-Volume I (ICICIC'06), Beijing, China, 2006: 269–272. doi: 10.1109/ICICIC.2006.158.
    ALY H A. Data hiding in motion vectors of compressed video based on their associated prediction error[J]. IEEE Transactions on Information Forensics and Security, 2011, 6(1): 14–18. doi: 10.1109/TIFS.2010.2090520
    CAO Yun, ZHAO Xianfeng, FENG Dengguo, et al. Video steganography with perturbed motion estimation[C]. The 13th International Conference on Information Hiding, Prague, Czech Republic, 2011: 193–207. doi: 10.1007/978-3-642-24178-9_14.
    FRIDRICH J, GOLJAN M, LISONEK P, et al. Writing on wet paper[J]. IEEE Transactions on Signal Processing, 2005, 53(10): 3923–3935. doi: 10.1109/TSP.2005.855393
    FILLER T, JUDAS J, and FRIDRICH J. Minimizing additive distortion in steganography using syndrome-trellis codes[J]. IEEE Transactions on Information Forensics and Security, 2011, 6(3): 920–935. doi: 10.1109/TIFS.2011.2134094
    YAO Yuanzhi, ZHANG Weiming, YU Nenghai, et al. Defining embedding distortion for motion vector-based video steganography[J]. Multimedia Tools and Applications, 2015, 74(24): 11163–11186. doi: 10.1007/s11042-014-2223-8
    ZHANG Hong, CAO Yun, and ZHAO Xianfeng. Motion vector-based video steganography with preserved local optimality[J]. Multimedia Tools and Applications, 2016, 75(21): 13503–13519. doi: 10.1007/s11042-015-2743-x
    ZHU Baolin and NI Jiangqun. Uniform embedding for efficient steganography of H. 264 video[C]. The 25th IEEE International Conference on Image Processing (ICIP), Athens, Greece, 2018: 1678–1682. doi: 10.1109/ICIP.2018.8451214.
    SU Yuting, ZHANG Chengqian, and ZHANG Chuntian. A video steganalytic algorithm against motion-vector-based steganography[J]. Signal Processing, 2011, 91(8): 1901–1909. doi: 10.1016/j.sigpro.2011.02.012
    CAO Yun, ZHAO Xianfeng, and FENG Dengguo. Video steganalysis exploiting motion vector reversion-based features[J]. IEEE Signal Processing Letters, 2012, 19(1): 35–38. doi: 10.1109/LSP.2011.2176116
    WANG Keren, ZHAO Hong, and WANG Hongxia. Video steganalysis against motion vector-based steganography by adding or subtracting one motion vector value[J]. IEEE Transactions on Information Forensics and Security, 2014, 9(5): 741–751. doi: 10.1109/TIFS.2014.2308633
    ZHANG Hong, CAO Yun, and ZHAO Xianfeng. A steganalytic approach to detect motion vector modification using near-perfect estimation for local optimality[J]. IEEE Transactions on Information Forensics and Security, 2017, 12(2): 465–478. doi: 10.1109/TIFS.2016.2623587
    LI Bin, WANG Ming, LI Xiaolong, et al. A strategy of clustering modification directions in spatial image steganography[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(9): 1905–1917. doi: 10.1109/TIFS.2015.2434600
    汤光明, 姜明明, 孙艺. 失真代价动态更新的自适应彩色图像隐写算法[J]. 电子与信息学报, 2019, 41(3): 656–665. doi: 10.11999/JEIT180388

    TANG Guangming, JIANG Mingming, and SUN Yi. Adaptive color image steganography based on dynamic distortion modification[J]. Journal of Electronics &Information Technology, 2019, 41(3): 656–665. doi: 10.11999/JEIT180388
    LI Weixiang, ZHANG Weiming, CHEN Kejiang, et al. Defining joint distortion for JPEG steganography[C]. The 6th ACM Workshop on Information Hiding and Multimedia Security, Innsbruck, Austria, 2018: 5–16. doi: 10.1145/3206004.3206008.
    ZHANG Weiming, ZHANG Zhuo, ZHANG Lili, et al. Decomposing joint distortion for adaptive steganography[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2017, 27(10): 2274–2280. doi: 10.1109/TCSVT.2016.2587388
    周洋, 吴佳忆, 陆宇, 等. 面向三维高效视频编码的深度图错误隐藏[J]. 电子与信息学报, 2019, 41(11): 2760–2767. doi: 10.11999/JEIT180926

    ZHOU Yang, WU Jiayi, LU Yu, et al. Depth map error concealment for 3D high efficiency video coding[J]. Journal of Electronics &Information Technology, 2019, 41(11): 2760–2767. doi: 10.11999/JEIT180926
    FILLER T and FRIDRICH J. Gibbs construction in steganography[J]. IEEE Transactions on Information Forensics and Security, 2010, 5(4): 705–720. doi: 10.1109/TIFS.2010.2077629
    KODOVSKY J, FRIDRICH J, and HOLUB V. Ensemble classifiers for steganalysis of digital media[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(2): 432–444. doi: 10.1109/TIFS.2011.2175919
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(3)  / Tables(4)

    Article Metrics

    Article views (1938) PDF downloads(111) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return