Skip to main content
Log in

Motion vector based video steganography using homogeneous block selection

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In recent steganographic literature, video steganography becomes popular due to its capability of accommodating higher payload. Since the video is transmitted mostly in a compressed format, compressed domain parameters are a natural choice for data embedding. In this paper, a motion vector based video steganographic method is proposed. For embedding the secret bit stream, the embedding motion vectors are selected for the homogeneous regions of the reference frame. Since homogeneous or smooth regions contain macro blocks with similar prediction error blocks, it helps to reduce the chance of detection by masking the embedding noise with similar prediction error among neighbouring macro blocks. The efficient search window and polar orientation based embedding technique are used to improve the imperceptibility against standard steganalysis schemes. A set of experiments is been carried out to justify the efficacy of the proposed scheme over the related existing steganographic methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Abu-Marie W, Gutub A, Abu-Mansour H (2010) Image based steganography using truth table based and determinate array on rgb indicator. International Journal of Signal & Image Processing 1(3):196–204

    Google Scholar 

  2. Al-Juaid N A, Gutub A, Khan EA et al (2018) Enhancing pc data security via combining rsa cryptography and video based steganography

  3. Al-Otaibi N A, Gutub A A (2014) 2-leyer security system for hiding sensitive text data on personal computers. Lecture Notes on Information Theory 2(2):151–157

    Google Scholar 

  4. Alanizy N, Alanizy A, Baghoza N, Al Ghamdi M, Gutub A (2018) 3-layer pc text security via combining compression, aes cryptography 2lsb image steganography. Journal of Research in Engineering and Applied Sciences (JREAS) 3(4):118–124

    Google Scholar 

  5. Alharthi N, Gutub A (2017) Data visualization to explore improving decision-making within hajj services. Scientific Modelling and Research 2(1):9–18

    Article  Google Scholar 

  6. Alsmirat MA, Al-Alem F, Al-Ayyoub M, Jararweh Y, Gupta B (2019) Impact of digital fingerprint image quality on the fingerprint recognition accuracy. Multimed Tools Appl 78(3):3649–3688. https://doi.org/10.1007/s11042-017-5537-5

    Article  Google Scholar 

  7. Aly H (2011) Data hiding in motion vectors of compressed video based on their associated prediction error. IEEE Transactions on Information Forensics and Security 6(1):14–18

    Article  Google Scholar 

  8. Atawneh S, Almomani A, Al Bazar H, Sumari P, Gupta B (2017) Secure and imperceptible digital image steganographic algorithm based on diamond encoding in dwt domain. Multimed Tools Appl 76(18):18451–18472. https://doi.org/10.1007/s11042-016-3930-0

    Article  Google Scholar 

  9. Avcibas I, Memon N, Sankur B (Feb 2003) Steganalysis using image quality metrics. IEEE Trans Image Process 12(2):221–229

    Article  MathSciNet  Google Scholar 

  10. Avcibas I, Nasir M, Sankur B (2001) Steganalysis based on image quality metrics. In: 2001 IEEE 4th workshop on multimedia signal processing (Cat. No.01TH8564), pp 517–522

  11. Budhia U, Kundur D, Zourntos T (2006) Digital video steganalysis exploiting statistical visibility in the temporal domain. IEEE Transactions on Information Forensics and Security 1(4):502–516

    Article  Google Scholar 

  12. Cao Y, Zhao X, Feng D (2012) Video steganalysis exploiting motion vector reversion-based features. IEEE Signal Processing Letters 19(1):35–38

    Article  Google Scholar 

  13. Cao Y, Zhao X, Feng D, Sheng R (2011) Video steganography with perturbed motion estimation. In: Filler T, Pevný T, Craver S, Ker A (eds) Information hiding. Springer, Berlin, pp 193–207

  14. Chebbo S, Durieux P, Pesquet-Popescu B (2010) Objective evaluation of compressed video’s temporal flickering. In: 2010 2nd international conference on image processing theory, tools and applications, pp 177–180

  15. Chen B, Wornell GW (2001) Quantization index modulation methods for digital watermarking and information embedding of multimedia. J VLSI Signal Process Syst Signal, Image Video Technol 27(1):7–33. https://doi.org/10.1023/A:1008107127819

    Article  Google Scholar 

  16. Chen C, Shi YQ, Chen W, Xuan G Statistical moments based universal steganalysis using jpeg 2-d array and 2-d characteristic function. In: 2006 international conference on image processing, 2006, pp 105–108

  17. Dumitrescu S, Wu X, Wang Z (2003) Detection of lsb steganography via sample pair analysis. IEEE Trans Signal Process 51(7):1995–2007

    Article  Google Scholar 

  18. Fang D-Y, Chang L-W (2006) Data hiding for digital video with phase of motion vector. In: 2006 IEEE international symposium on circuits and systems, pp 4

  19. Fisher R A (1936) The use of multiple measurements in taxonomic problems. Annals of eugenics 7(2):179–188

    Article  Google Scholar 

  20. Fridrich J (2005) Feature-based steganalysis for jpeg images and its implications for future design of steganographic schemes. In: Fridrich J (ed) Information hiding. Springer, Berlin, pp 67–81

  21. Ghanbari M (1990) The cross-search algorithm for motion estimation [image coding]. IEEE Trans Communs 38(7):950–953

    Article  Google Scholar 

  22. Gupta B, Agrawal D P, Yamaguchi S (2016) Handbook of research on modern cryptographic solutions for computer and cyber security, 1st edn. IGI Global, Hershey

    Book  Google Scholar 

  23. Gupta B B (2018) Computer and cyber security: principles, algorithm, applications, and perspectives. CRC Press

  24. Gutub A, Al-Ghamdi M (2019) Image based steganography to facilitate improving counting-based secret sharing. 3D Research 10(1):6

    Article  Google Scholar 

  25. Gutub A, Al-Juaid N (2018) Multi-bits stego-system for hiding text in multimedia images based on user security priority. Journal of Computer Hardware Engineering 1 (2):1–9

    Google Scholar 

  26. Gutub AA-A, et al. (2010) Pixel indicator technique for rgb image steganography. Journal of emerging technologies in web intelligence 2(1):56–64

    Google Scholar 

  27. He X, Luo Z (2008) A novel steganographic algorithm based on the motion vector phase. In: 2008 international conference on computer science and software engineering, vol 3, pp 822–825

  28. Huang F, Li B, Huang J (2007) Attack lsb matching steganography by counting alteration rate of the number of neighbourhood gray levels. In: 2007 IEEE international conference on image processing, vol 1, pp I – 401–I – 404

  29. Jainsky JS, Kundur D, Halverson DR (2007) Towards digital video steganalysis using asymptotic memoryless detection. In: Proceedings of the 9th workshop on multimedia & security, ser. MM&Sec ’07. https://doi.org/10.1145/1288869.1288891. ACM, New York, pp 161–168

  30. Jue W, Min-qing Z, Juan-li S (2011) Video steganography using motion vector components. In: 2011 IEEE 3rd international conference on communication software and networks (ICCSN), pp 500–503

  31. Liang Y-R, Xiao Z-Y (2018) Image encryption algorithm based on compressive sensing and fractional dct via polynomial interpolation. International Journal of Automation and Computing. https://doi.org/10.1007/s11633-018-1159-2

  32. Marvel L M, Boncelet C G, Retter C T (1999) Spread spectrum image steganography. IEEE Trans Image Process 8(8):1075–1083

    Article  Google Scholar 

  33. Nam K M, Kim J-S, Park R-H, Shim Y S (1995) A fast hierarchical motion vector estimation algorithm using mean pyramid. IEEE Transactions on Circuits and Systems for Video Technology 5(4):344–351

    Article  Google Scholar 

  34. Pankajakshan V, Ho A T S (2007) Improving video steganalysis using temporal correlation. In: 3rd international conference on intelligent information hiding and multimedia signal processing (IIH-MSP 2007), vol 1, pp 287–290

  35. Parvez M T, Gutub AA-A (2011) Vibrant color image steganography using channel differences and secret data distribution. Kuwait J Sci Eng 38(1B):127–142

    Google Scholar 

  36. Po L-M, Ma W-C (1996) A novel four-step search algorithm for fast block motion estimation. IEEE Transactions on Circuits and Systems for Video Technology 6(3):313–317

    Article  Google Scholar 

  37. Sadat E, Faez K, Saffari Pour M (2018) Entropy-based video steganalysis of motion vectors. Entropy 20(4):244

    Article  Google Scholar 

  38. Solanki K, Sarkar A, Manjunath B S (2007) Yass: Yet another steganographic scheme that resists blind steganalysis. In: 9th int. workshop on info hiding

  39. Solanki K, Sarkar A, Manjunath BS (2007) Yass: Yet another steganographic scheme that resists blind steganalysis. In: Furon T, Cayre F, Doërr G, Bas P (eds) Information hiding. Springer, Berlin, pp 16–31

  40. Sur A, Madhav Krishna SV, Sahu N, Rana S (2015) Detection of motion vector based video steganography. Multimed Tools Appl 74(23):10479–10494. https://doi.org/10.1007/s11042-014-2181-1

    Article  Google Scholar 

  41. Tasdemir K, Kurugollu F, Sezer S (2013) Video steganalysis of lsb based motion vector steganography. In: European workshop on visual information processing (EUVIP), pp 260–264

  42. Wang P, Zheng Z, Ying J (2008) A novel video watermark technique in motion vectors. In: 2008 international conference on audio, language and image processing, pp 1555–1559

  43. Westfeld A, Pfitzmann A (2000) Attacks on steganographic systems. In: Pfitzmann A (ed) Information hiding. Springer, Berlin, pp 61–76

  44. Xu C, Ping X, Zhang T (2006) Steganography in compressed video stream. In: 1st international conference on innovative computing, Information and Control, 2006 ICICIC ’06, vol 1, pp 269–272

  45. Yu C, Li J, Li X, Ren X, Gupta B (2018) Four-image encryption scheme based on quaternion fresnel transform, chaos and computer generated hologram. Multimed Tools Appl 77(4):4585–4608. https://doi.org/10.1007/s11042-017-4637-6

    Article  Google Scholar 

  46. Zahariadis T, Kalivas D (1996) A spiral search algorithm for fast estimation of block motion vectors. In: European signal processing conference, 1996 EUSIPCO 1996. 8th, pp 1–4

  47. Zhang C, Su Y, Zhang C (2008) A new video steganalysis algorithm against motion vector steganography. In: 4th International Conference on Wireless Communications, Networking and Mobile Computing, 2008. WiCOM ’08, pp 1–4

  48. Zhang J, Li J, Zhang L (2001) Video watermark technique in motion vector. In: Proceedings XIV Brazilian symposium on computer graphics and image processing, pp 179–182

  49. Zhou N, Hou WMX, Wen RH, Zou WP (2018) Imperceptible digital watermarking scheme in multiple transform domains. Multimed Tools Appl 77 (23):30251–30267. https://doi.org/10.1007/s11042-018-6128-9

    Article  Google Scholar 

  50. Zhou N, Jiang H, Gong L, Xie X (2018) Double-image compression and encryption algorithm based on co-sparse representation and random pixel exchanging. Optics and Lasers in Engineering 110:72–79. http://www.sciencedirect.com/science/article/pii/S0143816618303099

    Article  Google Scholar 

  51. Zhou N, Yan X, Liang H, Tao X, Li G (2018) Multi-image encryption scheme based on quantum 3d arnold transform and scaled zhongtang chaotic system. Quantum Information Processing 17(12):338. https://doi.org/10.1007/s11128-018-2104-6

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shuvendu Rana.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Rana, S., Kamra, R. & Sur, A. Motion vector based video steganography using homogeneous block selection. Multimed Tools Appl 79, 5881–5896 (2020). https://doi.org/10.1007/s11042-019-08525-w

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-08525-w

Keywords

Navigation