Abstract
In recent steganographic literature, video steganography becomes popular due to its capability of accommodating higher payload. Since the video is transmitted mostly in a compressed format, compressed domain parameters are a natural choice for data embedding. In this paper, a motion vector based video steganographic method is proposed. For embedding the secret bit stream, the embedding motion vectors are selected for the homogeneous regions of the reference frame. Since homogeneous or smooth regions contain macro blocks with similar prediction error blocks, it helps to reduce the chance of detection by masking the embedding noise with similar prediction error among neighbouring macro blocks. The efficient search window and polar orientation based embedding technique are used to improve the imperceptibility against standard steganalysis schemes. A set of experiments is been carried out to justify the efficacy of the proposed scheme over the related existing steganographic methods.
Similar content being viewed by others
References
Abu-Marie W, Gutub A, Abu-Mansour H (2010) Image based steganography using truth table based and determinate array on rgb indicator. International Journal of Signal & Image Processing 1(3):196–204
Al-Juaid N A, Gutub A, Khan EA et al (2018) Enhancing pc data security via combining rsa cryptography and video based steganography
Al-Otaibi N A, Gutub A A (2014) 2-leyer security system for hiding sensitive text data on personal computers. Lecture Notes on Information Theory 2(2):151–157
Alanizy N, Alanizy A, Baghoza N, Al Ghamdi M, Gutub A (2018) 3-layer pc text security via combining compression, aes cryptography 2lsb image steganography. Journal of Research in Engineering and Applied Sciences (JREAS) 3(4):118–124
Alharthi N, Gutub A (2017) Data visualization to explore improving decision-making within hajj services. Scientific Modelling and Research 2(1):9–18
Alsmirat MA, Al-Alem F, Al-Ayyoub M, Jararweh Y, Gupta B (2019) Impact of digital fingerprint image quality on the fingerprint recognition accuracy. Multimed Tools Appl 78(3):3649–3688. https://doi.org/10.1007/s11042-017-5537-5
Aly H (2011) Data hiding in motion vectors of compressed video based on their associated prediction error. IEEE Transactions on Information Forensics and Security 6(1):14–18
Atawneh S, Almomani A, Al Bazar H, Sumari P, Gupta B (2017) Secure and imperceptible digital image steganographic algorithm based on diamond encoding in dwt domain. Multimed Tools Appl 76(18):18451–18472. https://doi.org/10.1007/s11042-016-3930-0
Avcibas I, Memon N, Sankur B (Feb 2003) Steganalysis using image quality metrics. IEEE Trans Image Process 12(2):221–229
Avcibas I, Nasir M, Sankur B (2001) Steganalysis based on image quality metrics. In: 2001 IEEE 4th workshop on multimedia signal processing (Cat. No.01TH8564), pp 517–522
Budhia U, Kundur D, Zourntos T (2006) Digital video steganalysis exploiting statistical visibility in the temporal domain. IEEE Transactions on Information Forensics and Security 1(4):502–516
Cao Y, Zhao X, Feng D (2012) Video steganalysis exploiting motion vector reversion-based features. IEEE Signal Processing Letters 19(1):35–38
Cao Y, Zhao X, Feng D, Sheng R (2011) Video steganography with perturbed motion estimation. In: Filler T, Pevný T, Craver S, Ker A (eds) Information hiding. Springer, Berlin, pp 193–207
Chebbo S, Durieux P, Pesquet-Popescu B (2010) Objective evaluation of compressed video’s temporal flickering. In: 2010 2nd international conference on image processing theory, tools and applications, pp 177–180
Chen B, Wornell GW (2001) Quantization index modulation methods for digital watermarking and information embedding of multimedia. J VLSI Signal Process Syst Signal, Image Video Technol 27(1):7–33. https://doi.org/10.1023/A:1008107127819
Chen C, Shi YQ, Chen W, Xuan G Statistical moments based universal steganalysis using jpeg 2-d array and 2-d characteristic function. In: 2006 international conference on image processing, 2006, pp 105–108
Dumitrescu S, Wu X, Wang Z (2003) Detection of lsb steganography via sample pair analysis. IEEE Trans Signal Process 51(7):1995–2007
Fang D-Y, Chang L-W (2006) Data hiding for digital video with phase of motion vector. In: 2006 IEEE international symposium on circuits and systems, pp 4
Fisher R A (1936) The use of multiple measurements in taxonomic problems. Annals of eugenics 7(2):179–188
Fridrich J (2005) Feature-based steganalysis for jpeg images and its implications for future design of steganographic schemes. In: Fridrich J (ed) Information hiding. Springer, Berlin, pp 67–81
Ghanbari M (1990) The cross-search algorithm for motion estimation [image coding]. IEEE Trans Communs 38(7):950–953
Gupta B, Agrawal D P, Yamaguchi S (2016) Handbook of research on modern cryptographic solutions for computer and cyber security, 1st edn. IGI Global, Hershey
Gupta B B (2018) Computer and cyber security: principles, algorithm, applications, and perspectives. CRC Press
Gutub A, Al-Ghamdi M (2019) Image based steganography to facilitate improving counting-based secret sharing. 3D Research 10(1):6
Gutub A, Al-Juaid N (2018) Multi-bits stego-system for hiding text in multimedia images based on user security priority. Journal of Computer Hardware Engineering 1 (2):1–9
Gutub AA-A, et al. (2010) Pixel indicator technique for rgb image steganography. Journal of emerging technologies in web intelligence 2(1):56–64
He X, Luo Z (2008) A novel steganographic algorithm based on the motion vector phase. In: 2008 international conference on computer science and software engineering, vol 3, pp 822–825
Huang F, Li B, Huang J (2007) Attack lsb matching steganography by counting alteration rate of the number of neighbourhood gray levels. In: 2007 IEEE international conference on image processing, vol 1, pp I – 401–I – 404
Jainsky JS, Kundur D, Halverson DR (2007) Towards digital video steganalysis using asymptotic memoryless detection. In: Proceedings of the 9th workshop on multimedia & security, ser. MM&Sec ’07. https://doi.org/10.1145/1288869.1288891. ACM, New York, pp 161–168
Jue W, Min-qing Z, Juan-li S (2011) Video steganography using motion vector components. In: 2011 IEEE 3rd international conference on communication software and networks (ICCSN), pp 500–503
Liang Y-R, Xiao Z-Y (2018) Image encryption algorithm based on compressive sensing and fractional dct via polynomial interpolation. International Journal of Automation and Computing. https://doi.org/10.1007/s11633-018-1159-2
Marvel L M, Boncelet C G, Retter C T (1999) Spread spectrum image steganography. IEEE Trans Image Process 8(8):1075–1083
Nam K M, Kim J-S, Park R-H, Shim Y S (1995) A fast hierarchical motion vector estimation algorithm using mean pyramid. IEEE Transactions on Circuits and Systems for Video Technology 5(4):344–351
Pankajakshan V, Ho A T S (2007) Improving video steganalysis using temporal correlation. In: 3rd international conference on intelligent information hiding and multimedia signal processing (IIH-MSP 2007), vol 1, pp 287–290
Parvez M T, Gutub AA-A (2011) Vibrant color image steganography using channel differences and secret data distribution. Kuwait J Sci Eng 38(1B):127–142
Po L-M, Ma W-C (1996) A novel four-step search algorithm for fast block motion estimation. IEEE Transactions on Circuits and Systems for Video Technology 6(3):313–317
Sadat E, Faez K, Saffari Pour M (2018) Entropy-based video steganalysis of motion vectors. Entropy 20(4):244
Solanki K, Sarkar A, Manjunath B S (2007) Yass: Yet another steganographic scheme that resists blind steganalysis. In: 9th int. workshop on info hiding
Solanki K, Sarkar A, Manjunath BS (2007) Yass: Yet another steganographic scheme that resists blind steganalysis. In: Furon T, Cayre F, Doërr G, Bas P (eds) Information hiding. Springer, Berlin, pp 16–31
Sur A, Madhav Krishna SV, Sahu N, Rana S (2015) Detection of motion vector based video steganography. Multimed Tools Appl 74(23):10479–10494. https://doi.org/10.1007/s11042-014-2181-1
Tasdemir K, Kurugollu F, Sezer S (2013) Video steganalysis of lsb based motion vector steganography. In: European workshop on visual information processing (EUVIP), pp 260–264
Wang P, Zheng Z, Ying J (2008) A novel video watermark technique in motion vectors. In: 2008 international conference on audio, language and image processing, pp 1555–1559
Westfeld A, Pfitzmann A (2000) Attacks on steganographic systems. In: Pfitzmann A (ed) Information hiding. Springer, Berlin, pp 61–76
Xu C, Ping X, Zhang T (2006) Steganography in compressed video stream. In: 1st international conference on innovative computing, Information and Control, 2006 ICICIC ’06, vol 1, pp 269–272
Yu C, Li J, Li X, Ren X, Gupta B (2018) Four-image encryption scheme based on quaternion fresnel transform, chaos and computer generated hologram. Multimed Tools Appl 77(4):4585–4608. https://doi.org/10.1007/s11042-017-4637-6
Zahariadis T, Kalivas D (1996) A spiral search algorithm for fast estimation of block motion vectors. In: European signal processing conference, 1996 EUSIPCO 1996. 8th, pp 1–4
Zhang C, Su Y, Zhang C (2008) A new video steganalysis algorithm against motion vector steganography. In: 4th International Conference on Wireless Communications, Networking and Mobile Computing, 2008. WiCOM ’08, pp 1–4
Zhang J, Li J, Zhang L (2001) Video watermark technique in motion vector. In: Proceedings XIV Brazilian symposium on computer graphics and image processing, pp 179–182
Zhou N, Hou WMX, Wen RH, Zou WP (2018) Imperceptible digital watermarking scheme in multiple transform domains. Multimed Tools Appl 77 (23):30251–30267. https://doi.org/10.1007/s11042-018-6128-9
Zhou N, Jiang H, Gong L, Xie X (2018) Double-image compression and encryption algorithm based on co-sparse representation and random pixel exchanging. Optics and Lasers in Engineering 110:72–79. http://www.sciencedirect.com/science/article/pii/S0143816618303099
Zhou N, Yan X, Liang H, Tao X, Li G (2018) Multi-image encryption scheme based on quantum 3d arnold transform and scaled zhongtang chaotic system. Quantum Information Processing 17(12):338. https://doi.org/10.1007/s11128-018-2104-6
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Rana, S., Kamra, R. & Sur, A. Motion vector based video steganography using homogeneous block selection. Multimed Tools Appl 79, 5881–5896 (2020). https://doi.org/10.1007/s11042-019-08525-w
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-019-08525-w