skip to main content
10.1145/2600918.2600936acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
research-article

Video steganography with perturbed macroblock partition

Authors Info & Claims
Published:11 June 2014Publication History

ABSTRACT

In this paper, with a novel data representation named macroblock partition mode, an effective steganography integrated with H.264/AVC compression is proposed. The main principle is to improve the steganographic security in two directions. First, to embed messages, an internal process of H.264 compression, i.e., the macroblock partition, is slightly perturbed, hence the compression compliance is ensured. Second, to minimize the embedding impact, a high efficient double-layered structure is deliberately designed. In the first layer, the syndrome-trellis codes (STCs) is utilized to perform adaptive embedding, and the costs in visual quality and compression efficiency are both considered to construct the distortion model. In the second layer, facilitated by the wet paper codes (WPCs), an expected 3-bit per change gain in embedding efficiency is obtained.

References

  1. H. Aly. Data hiding in motion vectors of compressed video based on their associated prediction error. IEEE Transactions on Information Forensics and Security, 6(1):14--18, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Y. Cao, X. Zhao, and D. Feng. Video steganalysis exploiting motion vector reversion-based features. IEEE Signal Processing Letters, 19(1):35--38, 2012.Google ScholarGoogle ScholarCross RefCross Ref
  3. Y. Cao, X. Zhao, D. Feng, and R. Sheng. Video steganography with perturbed motion estimation. In Proc. 13th Information Hiding Conf., volume 6958 of Lecture Notes in Computer Science, pages 193--207, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Y. Cao, X. Zhao, F. Li, and N. Yu. Video steganography with multi-path motion estimation. In Proc. SPIE, Media Watermarking, Security, and Forensics, volume 8665, pages 86650K--86650K--6, 2013.Google ScholarGoogle ScholarCross RefCross Ref
  5. C. Chang and C. Lin. Libsvm -- a library for support vector machines, 2013.Google ScholarGoogle Scholar
  6. I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker. Digital Watermarking and Steganography, 2nd ed. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. T. Filler, J. Judas, and J. Fridrich. Minimizing embedding impact in steganography using trellis-coded quantization. In Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia XII, volume 7541, pages 1--14, 2010.Google ScholarGoogle Scholar
  8. T. Filler, J. Judas, and J. Fridrich. Minimizing additive distortion in steganography using syndrome-trellis codes. Information Forensics and Security, IEEE Transactions on, 6(3):920--935, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. J. Fridrich, M. Goljan, and D. Soukal. Perturbed quantization steganography with wet paper codes. In Proceedings of the 2004 workshop on Multimedia & security, MM&Sec'04, pages 4--15, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Y. Guo and F. Pan. Information hiding for h.264 in video stream switching application. In Proc. IEEE Int. Conference on Inform. Theory and Inform. Security, pages 419--421, 2010.Google ScholarGoogle Scholar
  11. B. Hao, L. Zhao, and W. Zhong. A novel steganography algorithm based on motion vector and matrix encoding. In Proc. IEEE 3rd International Conference on ICCSN, pages 406--409, 2011.Google ScholarGoogle Scholar
  12. ISO. Information technology-Coding of moving pictures and associated audio for digital storage media at up to about 1,5 Mbit/s-Part 1:System. Int. Organization for Standardization, Geneva, Switzerland, 1993.Google ScholarGoogle Scholar
  13. S. Kapotas and A. Skodras. A new data hiding scheme for scene change detection in h.264 encoded video sequences. In Multimedia and Expo, 2008 IEEE International Conference on, pages 277--280, 2008.Google ScholarGoogle ScholarCross RefCross Ref
  14. Y. Su, C. Zhang, and C. Zhang. A video steganalytic algorithm against motion-vector-based steganography. Signal Process., 91(8):1901--1909, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Y. Tew and K. Wong. An overview of information hiding in h.264/avc compressed video. IEEE Trans. Circuits Syst. Video Technol., 2013.Google ScholarGoogle Scholar
  16. T. Wiegand, G. J. Sullivan, G. Bjontegaard, and A. Luthra. Overview of the h.264/avc video coding standard. IEEE Trans. Circuits Syst. Video Technol., 13(7):560--576, Jul. 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. X. Xu, J. Dong, W. Wang, and T. Tan. Video steganalysis based on the constraints of motion vectors. In Proc. IEEE International Conference on Image Processing, 2013.Google ScholarGoogle ScholarCross RefCross Ref
  18. X. Yang, L. Zhao, and K. Niu. An efficient video steganography algorithm based on sub-macroblock partition for h.264/avc. Advanced Materials Research, pages 5384--5389, 2012.Google ScholarGoogle ScholarCross RefCross Ref
  19. C. Zhang, Y. Su, and C. Zhang. A new video steganalysis algorithm against motion vector steganography. In Proc. 4th International Conference on Wireless Communications, Networking and Mobile Computing, pages 1--4, 2008.Google ScholarGoogle ScholarCross RefCross Ref
  20. W. Zhang, X. Zhang, and S. Wang. Maximizing steganographic embedding efficiency by combining hamming codes and wet paper codes. In Proc. 10th Information Hiding Conf., volume 5284 of Lecture Notes in Computer Science, pages 60--71, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Video steganography with perturbed macroblock partition

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            IH&MMSec '14: Proceedings of the 2nd ACM workshop on Information hiding and multimedia security
            June 2014
            212 pages
            ISBN:9781450326476
            DOI:10.1145/2600918

            Copyright © 2014 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 11 June 2014

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

            Acceptance Rates

            IH&MMSec '14 Paper Acceptance Rate24of64submissions,38%Overall Acceptance Rate128of318submissions,40%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader