Citation: | Lincong LI, Yuanzhi YAO, Xiaoya ZHANG, Weiming ZHANG, Nenghai YU. Video Steganography Based on Modification Probability Transformation and Non-additive Embedding Distortion[J]. Journal of Electronics & Information Technology, 2020, 42(10): 2357-2364. doi: 10.11999/JEIT200001 |
HUSSAIN M, WAHAB A W A, IDRIS Y I B, et al. Image steganography in spatial domain: A survey[J]. Signal Processing: Image Communication, 2018, 65: 46–66. doi: 10.1016/j.image.2018.03.012
|
吴志军, 李常亮, 李荣. 基于随机位置选择和矩阵编码的语音信息隐藏方法[J]. 电子与信息学报, 2020, 42(2): 355–363. doi: 10.11999/JEIT181163
WU Zhijun, LI Changliang, and LI Rong. Speech information hiding method based on random position selection and matrix coding[J]. Journal of Electronics &Information Technology, 2020, 42(2): 355–363. doi: 10.11999/JEIT181163
|
LIU Yunxia, LIU Shuyang, WANG Yonghao, et al. Video steganography: A review[J]. Neurocomputing, 2019, 335: 238–250. doi: 10.1016/j.neucom.2018.09.091
|
XU Changyong, PING Xijian, and ZHANG Tao. Steganography in compressed video stream[C]. The 1st International Conference on Innovative Computing, Information and Control-Volume I (ICICIC'06), Beijing, China, 2006: 269–272. doi: 10.1109/ICICIC.2006.158.
|
ALY H A. Data hiding in motion vectors of compressed video based on their associated prediction error[J]. IEEE Transactions on Information Forensics and Security, 2011, 6(1): 14–18. doi: 10.1109/TIFS.2010.2090520
|
CAO Yun, ZHAO Xianfeng, FENG Dengguo, et al. Video steganography with perturbed motion estimation[C]. The 13th International Conference on Information Hiding, Prague, Czech Republic, 2011: 193–207. doi: 10.1007/978-3-642-24178-9_14.
|
FRIDRICH J, GOLJAN M, LISONEK P, et al. Writing on wet paper[J]. IEEE Transactions on Signal Processing, 2005, 53(10): 3923–3935. doi: 10.1109/TSP.2005.855393
|
FILLER T, JUDAS J, and FRIDRICH J. Minimizing additive distortion in steganography using syndrome-trellis codes[J]. IEEE Transactions on Information Forensics and Security, 2011, 6(3): 920–935. doi: 10.1109/TIFS.2011.2134094
|
YAO Yuanzhi, ZHANG Weiming, YU Nenghai, et al. Defining embedding distortion for motion vector-based video steganography[J]. Multimedia Tools and Applications, 2015, 74(24): 11163–11186. doi: 10.1007/s11042-014-2223-8
|
ZHANG Hong, CAO Yun, and ZHAO Xianfeng. Motion vector-based video steganography with preserved local optimality[J]. Multimedia Tools and Applications, 2016, 75(21): 13503–13519. doi: 10.1007/s11042-015-2743-x
|
ZHU Baolin and NI Jiangqun. Uniform embedding for efficient steganography of H. 264 video[C]. The 25th IEEE International Conference on Image Processing (ICIP), Athens, Greece, 2018: 1678–1682. doi: 10.1109/ICIP.2018.8451214.
|
SU Yuting, ZHANG Chengqian, and ZHANG Chuntian. A video steganalytic algorithm against motion-vector-based steganography[J]. Signal Processing, 2011, 91(8): 1901–1909. doi: 10.1016/j.sigpro.2011.02.012
|
CAO Yun, ZHAO Xianfeng, and FENG Dengguo. Video steganalysis exploiting motion vector reversion-based features[J]. IEEE Signal Processing Letters, 2012, 19(1): 35–38. doi: 10.1109/LSP.2011.2176116
|
WANG Keren, ZHAO Hong, and WANG Hongxia. Video steganalysis against motion vector-based steganography by adding or subtracting one motion vector value[J]. IEEE Transactions on Information Forensics and Security, 2014, 9(5): 741–751. doi: 10.1109/TIFS.2014.2308633
|
ZHANG Hong, CAO Yun, and ZHAO Xianfeng. A steganalytic approach to detect motion vector modification using near-perfect estimation for local optimality[J]. IEEE Transactions on Information Forensics and Security, 2017, 12(2): 465–478. doi: 10.1109/TIFS.2016.2623587
|
LI Bin, WANG Ming, LI Xiaolong, et al. A strategy of clustering modification directions in spatial image steganography[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(9): 1905–1917. doi: 10.1109/TIFS.2015.2434600
|
汤光明, 姜明明, 孙艺. 失真代价动态更新的自适应彩色图像隐写算法[J]. 电子与信息学报, 2019, 41(3): 656–665. doi: 10.11999/JEIT180388
TANG Guangming, JIANG Mingming, and SUN Yi. Adaptive color image steganography based on dynamic distortion modification[J]. Journal of Electronics &Information Technology, 2019, 41(3): 656–665. doi: 10.11999/JEIT180388
|
LI Weixiang, ZHANG Weiming, CHEN Kejiang, et al. Defining joint distortion for JPEG steganography[C]. The 6th ACM Workshop on Information Hiding and Multimedia Security, Innsbruck, Austria, 2018: 5–16. doi: 10.1145/3206004.3206008.
|
ZHANG Weiming, ZHANG Zhuo, ZHANG Lili, et al. Decomposing joint distortion for adaptive steganography[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2017, 27(10): 2274–2280. doi: 10.1109/TCSVT.2016.2587388
|
周洋, 吴佳忆, 陆宇, 等. 面向三维高效视频编码的深度图错误隐藏[J]. 电子与信息学报, 2019, 41(11): 2760–2767. doi: 10.11999/JEIT180926
ZHOU Yang, WU Jiayi, LU Yu, et al. Depth map error concealment for 3D high efficiency video coding[J]. Journal of Electronics &Information Technology, 2019, 41(11): 2760–2767. doi: 10.11999/JEIT180926
|
FILLER T and FRIDRICH J. Gibbs construction in steganography[J]. IEEE Transactions on Information Forensics and Security, 2010, 5(4): 705–720. doi: 10.1109/TIFS.2010.2077629
|
KODOVSKY J, FRIDRICH J, and HOLUB V. Ensemble classifiers for steganalysis of digital media[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(2): 432–444. doi: 10.1109/TIFS.2011.2175919
|