Abstract
Coverless steganography has been of great interest in recent years, since it is a technology that can absolutely resist the detection of steganalysis by not modifying the carriers. Most existing coverless steganography algorithms select images as carriers, and few studies are reported on coverless video steganography. Compared with images, the video sequence contains more information. However, there are few methods that can be used in coverless video steganography for resisting video compression and other video attacks. In this paper, a novel coverless video steganography algorithm based on maximum Direct Current (DC) coefficients against video attacks is proposed. Firstly, a Gaussian distribution model of DC coefficients considering the video coding process is built, which indicates that the distribution of changes for maximum DC coefficients in a block is more stable than the adjacent DC coefficients. Then, a novel hash sequence generation method based on the maximum DC coefficients is proposed. After that, the video index structure is established to speed up the efficiency of searching videos. In the process of hiding, the secret information is converted into binary segments, and the video whose hash sequence equals the secret information segment is selected as the carrier according to the video index structure. Experimental results and analysis show that the proposed algorithm can resist most kinds of attacks because of the strong robustness of the maximum DC coefficients. What’s more, compared with the state-of-the-art work, the proposed algorithm has achieved apparent advantages in the resistance to the mainstream video coding and frame deletion, and gotten much higher effective capacity.
Similar content being viewed by others
Data Availability Statements
Data sharing not applicable to this article as no new data were generated or analysed during the current study.
References
Ahmed N, Natarajan T, Rao KR (1974) Discrete cosine transform. IEEE transactions on Computers 100(1):90–93
Cetin O, Ozcerit AT (2009) A new steganography algorithm based on color histograms for data embedding into raw video streams. Computers & Security 28(7):670–682
Luo W, Huang F, Huang J (2010) Edge adaptive image steganography based on lsb matching revisited. IEEE Transactions on Information Forensics and Security 5(2):201–214. https://doi.org/10.1109/TIFS.2010.2041812
Cetin O, Ozcerit AT (2009) A new steganography algorithm based on color histograms for data embedding into raw video streams. Computers & Security 28(7):670–682
Chen X, Zhang Z, Qiu A, Xia Z, Xiong N (2020) A novel coverless steganography method based on image selection and stargan. IEEE Transactions on Network Science and Engineering 1–1. https://doi.org/10.1109/TNSE.2020.3041529
Chhikara S, Kumar R (2021) Image steganalysis with entropy hybridized with chaotic grasshopper optimizer. Multimedia Tools and Applications 80(21):31865–31885
Zhang L, Zhao X (2016) An adaptive video steganography based on intraprediction mode and cost assignment. In: International Workshop on Digital Watermarking, Springer, pp 518–532
El-Emam NN (2015) New data-hiding algorithm based on adaptive neural networks with modified particle swarm optimization. Computers & Security 55:21–45
Huang F, Huang J, Shi Y-Q (2012) New channel selection rule for jpeg steganography. IEEE Transactions on Information Forensics and Security 7(4):1181–1191
Huang K, Sun T, Jiang X, Dong Y, Fang Q (2020) Combined features for steganalysis against pu partition mode-based steganography in hevc. Multimedia Tools and Applications 79(41):31147–31164
Jin Z, Feng G, Ren Y, Zhang X (2020) Feature extraction optimization of jpeg steganalysis based on residual images. Signal Processing 170
Khare P, Singh J, Tiwari M (2011) Digital image steganography. Journal of Engineering Research and Studies 2(3):101–104
Lerch-Hostalot D, Megias D (2013) Lsb matching steganalysis based on patterns of pixel di erences and random embedding. Computers & security 32:192–206
Li Z, Meng L, Jiang X, Li Z (2019) High capacity hevc video hiding algorithm based on emd coded pu partition modes. Symmetry 11(8):1015
Li F, Yu Z, Qin C (2022) Gan-based spatial image steganography with cross feedback mechanism. Signal Processing 190
Liu Q, Xiang X, Qin J, Tan Y, Tan J, Luo Y (2020) Coverless steganography based on image retrieval of densenet features and dwt sequence mapping. Knowledge-Based Systems 192
Zhao, Y., Zhang, H., Cao, Y., Wang, P., Zhao, X (2015) Video steganalysis based on intra prediction mode calibration. In: International Workshop on Digital Watermarking, Springer pp. 119–133
Chhikara S, Kumar R (2021) Image steganalysis with entropy hybridized with chaotic grasshopper optimizer. Multimedia Tools and Applications 80(21):31865–31885
Luo W, Huang F, Huang J (2010) Edge adaptive image steganography based on lsb matching revisited. IEEE Transactions on Information Forensics and Security 5(2):201–214. https://doi.org/10.1109/TIFS.2010.2041812
Luo Y, Qin J, Xiang X, Tan Y, Liu Q, Xiang L (2020) Coverless realtime image information hiding based on image block matching and dense convolutional network. Journal of Real-Time Image Processing 17(1):125–135
Luo Y, Qin J, Xiang X, Tan Y (2020) Coverless image steganography based on multi-object recognition. IEEE Transactions on Circuits and Systems for Video Technology 1–1. https://doi.org/10.1109/TCSVT.2020.3033945
Pan N, Qin J, Tan Y, Xiang X (2020) Hou, G (2020) A video coverless information hiding algorithm based on semantic segmentation. EURASIP Journal on Image and Video Processing 1:1–18
Ray B, Mukhopadhyay S, Hossain S, Ghosal SK, Sarkar R (2021) Image steganography using deep learning based edge detection. Multimedia Tools and Applications 80(24):33475–33503
Zheng S, Wang L, Ling B, Hu D (2017) Coverless information hiding based on robust image hashing. In: International Conference on Intelligent Computing, Springer, pp. 536–547
Wu S, Zhong S-H, Liu Y (2020) A novel convolutional neural network for image steganalysis with shared normalization. IEEE Transactions on Multimedia 22(1):256–270. https://doi.org/10.1109/TMM.2019.2920605
Zhou Z, Mu Y, Wu QJ (2019) Coverless image steganography using partialduplicate image retrieval. Soft Computing 23(13):4927–4938
Luo Y, Qin J, Xiang X, Tan Y, Liu Q, Xiang L (2020) Coverless realtime image information hiding based on image block matching and dense convolutional network. Journal of Real-Time Image Processing 17(1):125–135
Yang Y, Li Z, Xie W, Zhang Z (2019) High capacity and multilevel information hiding algorithm based on pu partition modes for hevc videos. Multimedia Tools and Applications 78(7):8423–8446
Yuan C, Xia Z, Sun X (2017) Coverless image steganography based on sift and bof. Journal of Internet Technology 18(2):435–442
Zhai L, Wang L, Ren Y (2019) Universal detection of video steganography in multiple domains based on the consistency of motion vectors. IEEE Transactions on Information Forensics and Security 15:1762–1777
Zhang Z, Hou J, Zhao-Hong L (2015) Video-frame insertion and deletion detection based on consistency of quotients of mssim. J. Beijing Univ. Posts Telecommun 38(4):84–88
Zhang X, Peng F, Long M (2018) Robust coverless image steganography based on dct and lda topic classication. IEEE Transactions on Multimedia 20(12):3223–3238
Zhang S, Su S, Li L, Zhou Q, Lu J, Chang C-C (2019) An image style transfer network using multilevel noise encoding and its application in coverless steganography. Symmetry 11(9):115
Zhang Y, Zheng L, Lu YY, Thing VL, Zimmermann R (2019) Coverless image steganography framework with increased payload capacity. In: 2019 IEEE International Symposium on Multimedia (ISM), IEEE, pp. 140–1407
Pan N, Qin J, Tan Y, Xiang X (2020) Hou, G (2020) A video coverless information hiding algorithm based on semantic segmentation. EURASIP Journal on Image and Video Processing 1:1–18
Tan Y, Qin J, Xiang X, Zhang C, Wang Z (2021) Coverless steganography based on motion analysis of video. Security and Communication Networks 2021
Zou L, Wan W, Wei B, Sun J (2021) Coverless video steganography based on inter frame combination. Geometry and Vision 1386, 134
Zhiweil K, Jing L, Yigang H (2007) Steganography based on wavelet transform and modulus function. Journal of Systems Engineering and Electronics 18(3):628–632. https://doi.org/10.1016/S1004-4132(07)60139-X
Zhou Z, Mu Y, Wu QJ (2019) Coverless image steganography using partialduplicate image retrieval. Soft Computing 23(13):4927–4938
Bojanowski P, Lajugie R, Bach F, Laptev I, Ponce J, Schmid C, Sivic J (2014) Weakly supervised action labeling in videos under ordering constraints. In: European Conference on Computer Vision, Springer, pp. 628–643
Zou L, Wan W, Wei B, Sun J (2021) Coverless video steganography based on inter frame combination. Geometry and Vision 1386:134
Acknowledgements
This work is funded by the Scientific Research Common Program of Beijing Municipal Commission of Education (No. KM202110015004) and the Nature Natural Science Foundation of China (62002220).
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
All authors certify that they have no affiliations with or involvement in any organization or entity with any financial interest or non-financial interest in the subject matter or materials discussed in this manuscript.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Meng, L., Jiang, X., Zhang, Z. et al. A robust coverless video steganography based on maximum DC coefficients against video attacks. Multimed Tools Appl 83, 13427–13461 (2024). https://doi.org/10.1007/s11042-023-15697-z
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-023-15697-z