Abstract
Current motion vector based video steganography is unable to preserve the local optimality of modified motion vectors. Thus they are vulnerable to the attack of steganalysis. In this paper, we have proposed a novel method to guarantee the local optimality of modified motion vectors. To modify a motion vector, firstly designate a search area which consists of candidate motion vectors. Second, evaluate the local optimality of each motion vector in the search area to locate all local optimum ones, from which finally select the one contributing least to video compression efficiency degradation as the modified motion vector. Highly undetectable motion vector based video steganography can be developed by combining the proposed method with steganographic codes and reasonable cost assignment. Comparative experimental results have demonstrated that video steganography based on the proposed method is capable of withstanding current best steganalysis while keeping the video compression performance.
Similar content being viewed by others
References
Aly H (2011) Data hiding in motion vectors of compressed video based on their associated prediction error. IEEE Trans Inf Forensic Secur 6(1):14–18
Cao Y, Zhao X, Feng D, Sheng R (2011) Video steganography with perturbed motion estimation. Proc IH’11 Lect Notes Comput Sci 6958:193–207
Cao Y, Zhao X, Feng D (2012) Video steganalysis exploiting motion vector reversion-based features. IEEE Signal Process Lett 19(1):35–38
Chang C, Lin C LIBSVM - a library for support vector machines. [Online]. Available: http://www.csie.ntu.edu.tw.
Chen Z, Xu J, He Y, Zheng J (2006) Fast integer-pel and fractional-pel motion estimation for h.264/avc. J Vis Commun Image Represent 17(2):264–290
Filler T, Judas J, Fridrich J (2011) Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans Inf Forensic Secur 6(3):920–935
Fridrich J (2004) Feature-based steganalysis for jpeg images and its implications for future design of steganographic schemes. Proc. IH’04 Lect Notes Comput Sci 3200/2005 67–81
Fridrich J, Goljan M, Lison · ek P, Soukal D (2005) Writing on wet paper. IEEE Trans Signal Process 53(10):3923–3935
Hao B, Zhao L, Zhong W (2011) A novel steganography algorithm based on motion vector and matrix encoding. In Proc. ICCSN’11, pp. 406–409
Kutter M, Jordan F, Ebrahimi T (1997) Proposal of a watermarking technique for hiding/retrieving data in compressed and decompressed video. Technical Report M2281, ISO/IEC document, JTCI/ SC29/WG11
Ren Y, Zhai L, Wang L, Zhu T (2014) Video steganalysis based on subtractive probability of optimal matching feature. In Proc ACM IH and MMSec’14 83–90
Su Y, Zhang C, Zhang C (2011) A video steganalytic algorithm against motion-vector-based steganography. Signal Process 91(8):1901–1909
VideoLAN. x264. [Online]. Available: http://www.videolan.org/developers/x264.html.
Wang K, Zhao H, Wang H (2014) Video steganalysis against motion vector-based steganography by adding or subtracting one motion vector value. IEEE Trans Inf Forensic Secur 9(5):741–751
Wiegand T, Schwarz H, Joch A et al (2003) Rate-constrained coder control and comparison of video coding standards. IEEE Trans Circuits Syst Video Technol 13(7):688–703
Wiegand T, Sullivan GJ, Bjøntegaard G, Luthra A (2003) Overview of the h.264/avc video coding standard. IEEE Trans Circuits Syst Video Technol 13(7):560–576
Xu C, Ping X, Zhang T (2006) Steganography in compressed video stream. In Proc. ICICIC’06, 269–272
Yao Y, Zhang W, Yu N, Zhao X (2014) Defining embedding distortion for motion vector-based video steganography. Multimed Tools Appl Article in Press
Zhu C, Lin X, Chau L (2002) Hexagon-based search pattern for fast block motion estimation. IEEE Trans Circuits Syst Video Technol 12(5):349–355
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Zhang, H., Cao, Y. & Zhao, X. Motion vector-based video steganography with preserved local optimality. Multimed Tools Appl 75, 13503–13519 (2016). https://doi.org/10.1007/s11042-015-2743-x
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-015-2743-x