Skip to main content
Log in

A robust coverless video steganography based on maximum DC coefficients against video attacks

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Coverless steganography has been of great interest in recent years, since it is a technology that can absolutely resist the detection of steganalysis by not modifying the carriers. Most existing coverless steganography algorithms select images as carriers, and few studies are reported on coverless video steganography. Compared with images, the video sequence contains more information. However, there are few methods that can be used in coverless video steganography for resisting video compression and other video attacks. In this paper, a novel coverless video steganography algorithm based on maximum Direct Current (DC) coefficients against video attacks is proposed. Firstly, a Gaussian distribution model of DC coefficients considering the video coding process is built, which indicates that the distribution of changes for maximum DC coefficients in a block is more stable than the adjacent DC coefficients. Then, a novel hash sequence generation method based on the maximum DC coefficients is proposed. After that, the video index structure is established to speed up the efficiency of searching videos. In the process of hiding, the secret information is converted into binary segments, and the video whose hash sequence equals the secret information segment is selected as the carrier according to the video index structure. Experimental results and analysis show that the proposed algorithm can resist most kinds of attacks because of the strong robustness of the maximum DC coefficients. What’s more, compared with the state-of-the-art work, the proposed algorithm has achieved apparent advantages in the resistance to the mainstream video coding and frame deletion, and gotten much higher effective capacity.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Data Availability Statements

Data sharing not applicable to this article as no new data were generated or analysed during the current study.

References

  1. Ahmed N, Natarajan T, Rao KR (1974) Discrete cosine transform. IEEE transactions on Computers 100(1):90–93

    Article  MathSciNet  Google Scholar 

  2. Cetin O, Ozcerit AT (2009) A new steganography algorithm based on color histograms for data embedding into raw video streams. Computers & Security 28(7):670–682

    Article  Google Scholar 

  3. Luo W, Huang F, Huang J (2010) Edge adaptive image steganography based on lsb matching revisited. IEEE Transactions on Information Forensics and Security 5(2):201–214. https://doi.org/10.1109/TIFS.2010.2041812

  4. Cetin O, Ozcerit AT (2009) A new steganography algorithm based on color histograms for data embedding into raw video streams. Computers & Security 28(7):670–682

    Article  Google Scholar 

  5. Chen X, Zhang Z, Qiu A, Xia Z, Xiong N (2020) A novel coverless steganography method based on image selection and stargan. IEEE Transactions on Network Science and Engineering 1–1. https://doi.org/10.1109/TNSE.2020.3041529

  6. Chhikara S, Kumar R (2021) Image steganalysis with entropy hybridized with chaotic grasshopper optimizer. Multimedia Tools and Applications 80(21):31865–31885

    Article  Google Scholar 

  7. Zhang L, Zhao X (2016) An adaptive video steganography based on intraprediction mode and cost assignment. In: International Workshop on Digital Watermarking, Springer, pp 518–532

  8. El-Emam NN (2015) New data-hiding algorithm based on adaptive neural networks with modified particle swarm optimization. Computers & Security 55:21–45

    Article  MathSciNet  Google Scholar 

  9. Huang F, Huang J, Shi Y-Q (2012) New channel selection rule for jpeg steganography. IEEE Transactions on Information Forensics and Security 7(4):1181–1191

    Article  Google Scholar 

  10. Huang K, Sun T, Jiang X, Dong Y, Fang Q (2020) Combined features for steganalysis against pu partition mode-based steganography in hevc. Multimedia Tools and Applications 79(41):31147–31164

    Article  Google Scholar 

  11. Jin Z, Feng G, Ren Y, Zhang X (2020) Feature extraction optimization of jpeg steganalysis based on residual images. Signal Processing 170

  12. Khare P, Singh J, Tiwari M (2011) Digital image steganography. Journal of Engineering Research and Studies 2(3):101–104

    Google Scholar 

  13. Lerch-Hostalot D, Megias D (2013) Lsb matching steganalysis based on patterns of pixel di erences and random embedding. Computers & security 32:192–206

    Article  Google Scholar 

  14. Li Z, Meng L, Jiang X, Li Z (2019) High capacity hevc video hiding algorithm based on emd coded pu partition modes. Symmetry 11(8):1015

    Article  Google Scholar 

  15. Li F, Yu Z, Qin C (2022) Gan-based spatial image steganography with cross feedback mechanism. Signal Processing 190

  16. Liu Q, Xiang X, Qin J, Tan Y, Tan J, Luo Y (2020) Coverless steganography based on image retrieval of densenet features and dwt sequence mapping. Knowledge-Based Systems 192

  17. Zhao, Y., Zhang, H., Cao, Y., Wang, P., Zhao, X (2015) Video steganalysis based on intra prediction mode calibration. In: International Workshop on Digital Watermarking, Springer pp. 119–133

  18. Chhikara S, Kumar R (2021) Image steganalysis with entropy hybridized with chaotic grasshopper optimizer. Multimedia Tools and Applications 80(21):31865–31885

  19. Luo W, Huang F, Huang J (2010) Edge adaptive image steganography based on lsb matching revisited. IEEE Transactions on Information Forensics and Security 5(2):201–214. https://doi.org/10.1109/TIFS.2010.2041812

    Article  Google Scholar 

  20. Luo Y, Qin J, Xiang X, Tan Y, Liu Q, Xiang L (2020) Coverless realtime image information hiding based on image block matching and dense convolutional network. Journal of Real-Time Image Processing 17(1):125–135

    Article  Google Scholar 

  21. Luo Y, Qin J, Xiang X, Tan Y (2020) Coverless image steganography based on multi-object recognition. IEEE Transactions on Circuits and Systems for Video Technology 1–1. https://doi.org/10.1109/TCSVT.2020.3033945

  22. Pan N, Qin J, Tan Y, Xiang X (2020) Hou, G (2020) A video coverless information hiding algorithm based on semantic segmentation. EURASIP Journal on Image and Video Processing 1:1–18

    Google Scholar 

  23. Ray B, Mukhopadhyay S, Hossain S, Ghosal SK, Sarkar R (2021) Image steganography using deep learning based edge detection. Multimedia Tools and Applications 80(24):33475–33503

    Article  Google Scholar 

  24. Zheng S, Wang L, Ling B, Hu D (2017) Coverless information hiding based on robust image hashing. In: International Conference on Intelligent Computing, Springer, pp. 536–547

  25. Wu S, Zhong S-H, Liu Y (2020) A novel convolutional neural network for image steganalysis with shared normalization. IEEE Transactions on Multimedia 22(1):256–270. https://doi.org/10.1109/TMM.2019.2920605

    Article  Google Scholar 

  26. Zhou Z, Mu Y, Wu QJ (2019) Coverless image steganography using partialduplicate image retrieval. Soft Computing 23(13):4927–4938

    Article  Google Scholar 

  27. Luo Y, Qin J, Xiang X, Tan Y, Liu Q, Xiang L (2020) Coverless realtime image information hiding based on image block matching and dense convolutional network. Journal of Real-Time Image Processing 17(1):125–135

    Article  Google Scholar 

  28. Yang Y, Li Z, Xie W, Zhang Z (2019) High capacity and multilevel information hiding algorithm based on pu partition modes for hevc videos. Multimedia Tools and Applications 78(7):8423–8446

    Article  Google Scholar 

  29. Yuan C, Xia Z, Sun X (2017) Coverless image steganography based on sift and bof. Journal of Internet Technology 18(2):435–442

    Google Scholar 

  30. Zhai L, Wang L, Ren Y (2019) Universal detection of video steganography in multiple domains based on the consistency of motion vectors. IEEE Transactions on Information Forensics and Security 15:1762–1777

    Article  Google Scholar 

  31. Zhang Z, Hou J, Zhao-Hong L (2015) Video-frame insertion and deletion detection based on consistency of quotients of mssim. J. Beijing Univ. Posts Telecommun 38(4):84–88

    Google Scholar 

  32. Zhang X, Peng F, Long M (2018) Robust coverless image steganography based on dct and lda topic classication. IEEE Transactions on Multimedia 20(12):3223–3238

    Article  Google Scholar 

  33. Zhang S, Su S, Li L, Zhou Q, Lu J, Chang C-C (2019) An image style transfer network using multilevel noise encoding and its application in coverless steganography. Symmetry 11(9):115

    Article  Google Scholar 

  34. Zhang Y, Zheng L, Lu YY, Thing VL, Zimmermann R (2019) Coverless image steganography framework with increased payload capacity. In: 2019 IEEE International Symposium on Multimedia (ISM), IEEE, pp. 140–1407

  35. Pan N, Qin J, Tan Y, Xiang X (2020) Hou, G (2020) A video coverless information hiding algorithm based on semantic segmentation. EURASIP Journal on Image and Video Processing 1:1–18

    Google Scholar 

  36. Tan Y, Qin J, Xiang X, Zhang C, Wang Z (2021) Coverless steganography based on motion analysis of video. Security and Communication Networks 2021

  37. Zou L, Wan W, Wei B, Sun J (2021) Coverless video steganography based on inter frame combination. Geometry and Vision 1386, 134

  38. Zhiweil K, Jing L, Yigang H (2007) Steganography based on wavelet transform and modulus function. Journal of Systems Engineering and Electronics 18(3):628–632. https://doi.org/10.1016/S1004-4132(07)60139-X

    Article  Google Scholar 

  39. Zhou Z, Mu Y, Wu QJ (2019) Coverless image steganography using partialduplicate image retrieval. Soft Computing 23(13):4927–4938

    Article  Google Scholar 

  40. Bojanowski P, Lajugie R, Bach F, Laptev I, Ponce J, Schmid C, Sivic J (2014) Weakly supervised action labeling in videos under ordering constraints. In: European Conference on Computer Vision, Springer, pp. 628–643

  41. Zou L, Wan W, Wei B, Sun J (2021) Coverless video steganography based on inter frame combination. Geometry and Vision 1386:134

    Article  Google Scholar 

Download references

Acknowledgements

This work is funded by the Scientific Research Common Program of Beijing Municipal Commission of Education (No. KM202110015004) and the Nature Natural Science Foundation of China (62002220).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xinghao Jiang.

Ethics declarations

All authors certify that they have no affiliations with or involvement in any organization or entity with any financial interest or non-financial interest in the subject matter or materials discussed in this manuscript.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Meng, L., Jiang, X., Zhang, Z. et al. A robust coverless video steganography based on maximum DC coefficients against video attacks. Multimed Tools Appl 83, 13427–13461 (2024). https://doi.org/10.1007/s11042-023-15697-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-15697-z

Keywords

Navigation