Skip to main content

Advertisement

Log in

Motion vector-based video steganography with preserved local optimality

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Current motion vector based video steganography is unable to preserve the local optimality of modified motion vectors. Thus they are vulnerable to the attack of steganalysis. In this paper, we have proposed a novel method to guarantee the local optimality of modified motion vectors. To modify a motion vector, firstly designate a search area which consists of candidate motion vectors. Second, evaluate the local optimality of each motion vector in the search area to locate all local optimum ones, from which finally select the one contributing least to video compression efficiency degradation as the modified motion vector. Highly undetectable motion vector based video steganography can be developed by combining the proposed method with steganographic codes and reasonable cost assignment. Comparative experimental results have demonstrated that video steganography based on the proposed method is capable of withstanding current best steganalysis while keeping the video compression performance.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Aly H (2011) Data hiding in motion vectors of compressed video based on their associated prediction error. IEEE Trans Inf Forensic Secur 6(1):14–18

    Article  MathSciNet  Google Scholar 

  2. Cao Y, Zhao X, Feng D, Sheng R (2011) Video steganography with perturbed motion estimation. Proc IH’11 Lect Notes Comput Sci 6958:193–207

    Article  Google Scholar 

  3. Cao Y, Zhao X, Feng D (2012) Video steganalysis exploiting motion vector reversion-based features. IEEE Signal Process Lett 19(1):35–38

    Article  Google Scholar 

  4. Chang C, Lin C LIBSVM - a library for support vector machines. [Online]. Available: http://www.csie.ntu.edu.tw.

  5. Chen Z, Xu J, He Y, Zheng J (2006) Fast integer-pel and fractional-pel motion estimation for h.264/avc. J Vis Commun Image Represent 17(2):264–290

    Article  Google Scholar 

  6. Filler T, Judas J, Fridrich J (2011) Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans Inf Forensic Secur 6(3):920–935

    Article  Google Scholar 

  7. Fridrich J (2004) Feature-based steganalysis for jpeg images and its implications for future design of steganographic schemes. Proc. IH’04 Lect Notes Comput Sci 3200/2005 67–81

  8. Fridrich J, Goljan M, Lison · ek P, Soukal D (2005) Writing on wet paper. IEEE Trans Signal Process 53(10):3923–3935

    Article  MathSciNet  Google Scholar 

  9. Hao B, Zhao L, Zhong W (2011) A novel steganography algorithm based on motion vector and matrix encoding. In Proc. ICCSN’11, pp. 406–409

  10. Kutter M, Jordan F, Ebrahimi T (1997) Proposal of a watermarking technique for hiding/retrieving data in compressed and decompressed video. Technical Report M2281, ISO/IEC document, JTCI/ SC29/WG11

  11. Ren Y, Zhai L, Wang L, Zhu T (2014) Video steganalysis based on subtractive probability of optimal matching feature. In Proc ACM IH and MMSec’14 83–90

  12. Su Y, Zhang C, Zhang C (2011) A video steganalytic algorithm against motion-vector-based steganography. Signal Process 91(8):1901–1909

    Article  MATH  Google Scholar 

  13. VideoLAN. x264. [Online]. Available: http://www.videolan.org/developers/x264.html.

  14. Wang K, Zhao H, Wang H (2014) Video steganalysis against motion vector-based steganography by adding or subtracting one motion vector value. IEEE Trans Inf Forensic Secur 9(5):741–751

    Article  Google Scholar 

  15. Wiegand T, Schwarz H, Joch A et al (2003) Rate-constrained coder control and comparison of video coding standards. IEEE Trans Circuits Syst Video Technol 13(7):688–703

    Article  Google Scholar 

  16. Wiegand T, Sullivan GJ, Bjøntegaard G, Luthra A (2003) Overview of the h.264/avc video coding standard. IEEE Trans Circuits Syst Video Technol 13(7):560–576

    Article  Google Scholar 

  17. Xu C, Ping X, Zhang T (2006) Steganography in compressed video stream. In Proc. ICICIC’06, 269–272

  18. Yao Y, Zhang W, Yu N, Zhao X (2014) Defining embedding distortion for motion vector-based video steganography. Multimed Tools Appl Article in Press

  19. Zhu C, Lin X, Chau L (2002) Hexagon-based search pattern for fast block motion estimation. IEEE Trans Circuits Syst Video Technol 12(5):349–355

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hong Zhang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, H., Cao, Y. & Zhao, X. Motion vector-based video steganography with preserved local optimality. Multimed Tools Appl 75, 13503–13519 (2016). https://doi.org/10.1007/s11042-015-2743-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-015-2743-x

Keywords

Navigation