skip to main content
10.1145/2600918.2600936acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
research-article

Video steganography with perturbed macroblock partition

Published: 11 June 2014 Publication History

Abstract

In this paper, with a novel data representation named macroblock partition mode, an effective steganography integrated with H.264/AVC compression is proposed. The main principle is to improve the steganographic security in two directions. First, to embed messages, an internal process of H.264 compression, i.e., the macroblock partition, is slightly perturbed, hence the compression compliance is ensured. Second, to minimize the embedding impact, a high efficient double-layered structure is deliberately designed. In the first layer, the syndrome-trellis codes (STCs) is utilized to perform adaptive embedding, and the costs in visual quality and compression efficiency are both considered to construct the distortion model. In the second layer, facilitated by the wet paper codes (WPCs), an expected 3-bit per change gain in embedding efficiency is obtained.

References

[1]
H. Aly. Data hiding in motion vectors of compressed video based on their associated prediction error. IEEE Transactions on Information Forensics and Security, 6(1):14--18, 2011.
[2]
Y. Cao, X. Zhao, and D. Feng. Video steganalysis exploiting motion vector reversion-based features. IEEE Signal Processing Letters, 19(1):35--38, 2012.
[3]
Y. Cao, X. Zhao, D. Feng, and R. Sheng. Video steganography with perturbed motion estimation. In Proc. 13th Information Hiding Conf., volume 6958 of Lecture Notes in Computer Science, pages 193--207, 2011.
[4]
Y. Cao, X. Zhao, F. Li, and N. Yu. Video steganography with multi-path motion estimation. In Proc. SPIE, Media Watermarking, Security, and Forensics, volume 8665, pages 86650K--86650K--6, 2013.
[5]
C. Chang and C. Lin. Libsvm -- a library for support vector machines, 2013.
[6]
I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker. Digital Watermarking and Steganography, 2nd ed. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 2008.
[7]
T. Filler, J. Judas, and J. Fridrich. Minimizing embedding impact in steganography using trellis-coded quantization. In Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia XII, volume 7541, pages 1--14, 2010.
[8]
T. Filler, J. Judas, and J. Fridrich. Minimizing additive distortion in steganography using syndrome-trellis codes. Information Forensics and Security, IEEE Transactions on, 6(3):920--935, 2011.
[9]
J. Fridrich, M. Goljan, and D. Soukal. Perturbed quantization steganography with wet paper codes. In Proceedings of the 2004 workshop on Multimedia & security, MM&Sec'04, pages 4--15, 2004.
[10]
Y. Guo and F. Pan. Information hiding for h.264 in video stream switching application. In Proc. IEEE Int. Conference on Inform. Theory and Inform. Security, pages 419--421, 2010.
[11]
B. Hao, L. Zhao, and W. Zhong. A novel steganography algorithm based on motion vector and matrix encoding. In Proc. IEEE 3rd International Conference on ICCSN, pages 406--409, 2011.
[12]
ISO. Information technology-Coding of moving pictures and associated audio for digital storage media at up to about 1,5 Mbit/s-Part 1:System. Int. Organization for Standardization, Geneva, Switzerland, 1993.
[13]
S. Kapotas and A. Skodras. A new data hiding scheme for scene change detection in h.264 encoded video sequences. In Multimedia and Expo, 2008 IEEE International Conference on, pages 277--280, 2008.
[14]
Y. Su, C. Zhang, and C. Zhang. A video steganalytic algorithm against motion-vector-based steganography. Signal Process., 91(8):1901--1909, 2011.
[15]
Y. Tew and K. Wong. An overview of information hiding in h.264/avc compressed video. IEEE Trans. Circuits Syst. Video Technol., 2013.
[16]
T. Wiegand, G. J. Sullivan, G. Bjontegaard, and A. Luthra. Overview of the h.264/avc video coding standard. IEEE Trans. Circuits Syst. Video Technol., 13(7):560--576, Jul. 2003.
[17]
X. Xu, J. Dong, W. Wang, and T. Tan. Video steganalysis based on the constraints of motion vectors. In Proc. IEEE International Conference on Image Processing, 2013.
[18]
X. Yang, L. Zhao, and K. Niu. An efficient video steganography algorithm based on sub-macroblock partition for h.264/avc. Advanced Materials Research, pages 5384--5389, 2012.
[19]
C. Zhang, Y. Su, and C. Zhang. A new video steganalysis algorithm against motion vector steganography. In Proc. 4th International Conference on Wireless Communications, Networking and Mobile Computing, pages 1--4, 2008.
[20]
W. Zhang, X. Zhang, and S. Wang. Maximizing steganographic embedding efficiency by combining hamming codes and wet paper codes. In Proc. 10th Information Hiding Conf., volume 5284 of Lecture Notes in Computer Science, pages 60--71, 2008.

Cited By

View all
  • (2025)High-Security HEVC Video Steganography Method Using the Motion Vector Prediction Index and Motion Vector DifferenceTsinghua Science and Technology10.26599/TST.2024.901001630:2(813-829)Online publication date: Apr-2025
  • (2024)An anti-steganalysis adaptive steganography for HEVC video based on PU partition modesJournal of Visual Communication and Image Representation10.1016/j.jvcir.2023.10399598(103995)Online publication date: Feb-2024
  • (2023)Efficient Video Steganalytic Feature Design by Exploiting Local Optimality and Lagrangian Cost QuotientSymmetry10.3390/sym1502052015:2(520)Online publication date: 15-Feb-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
IH&MMSec '14: Proceedings of the 2nd ACM workshop on Information hiding and multimedia security
June 2014
212 pages
ISBN:9781450326476
DOI:10.1145/2600918
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 11 June 2014

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. h.264/avc
  2. information hiding
  3. steganography
  4. video

Qualifiers

  • Research-article

Funding Sources

Conference

IH&MMSec '14
Sponsor:

Acceptance Rates

IH&MMSec '14 Paper Acceptance Rate 24 of 64 submissions, 38%;
Overall Acceptance Rate 128 of 318 submissions, 40%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)12
  • Downloads (Last 6 weeks)1
Reflects downloads up to 15 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2025)High-Security HEVC Video Steganography Method Using the Motion Vector Prediction Index and Motion Vector DifferenceTsinghua Science and Technology10.26599/TST.2024.901001630:2(813-829)Online publication date: Apr-2025
  • (2024)An anti-steganalysis adaptive steganography for HEVC video based on PU partition modesJournal of Visual Communication and Image Representation10.1016/j.jvcir.2023.10399598(103995)Online publication date: Feb-2024
  • (2023)Efficient Video Steganalytic Feature Design by Exploiting Local Optimality and Lagrangian Cost QuotientSymmetry10.3390/sym1502052015:2(520)Online publication date: 15-Feb-2023
  • (2023)An Adaptive IPM-Based HEVC Video Steganography via Minimizing Non-Additive DistortionIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.319342320:4(2896-2912)Online publication date: 1-Jul-2023
  • (2023)An Anti-Steganalysis HEVC Video Steganography With High Performance Based on CNN and PU Partition ModesIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.314089920:1(606-619)Online publication date: 1-Jan-2023
  • (2023)CSM In Motion Vector Steganalysis: The Effect of Coders on Motion Vectors in H.264 Video EncodingICASSP 2023 - 2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)10.1109/ICASSP49357.2023.10096323(1-5)Online publication date: 4-Jun-2023
  • (2022)A Review of Motion Vector-Based Video SteganographySecurity and Communication Networks10.1155/2022/29468122022Online publication date: 1-Jan-2022
  • (2022)DDCA: A Distortion Drift-Based Cost Assignment Method for Adaptive Video Steganography in the Transform DomainIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2021.305813419:4(2405-2420)Online publication date: 1-Jul-2022
  • (2022)A Novel Video Steganographic Scheme Incorporating the Consistency Degree of Motion VectorsIEEE Transactions on Circuits and Systems for Video Technology10.1109/TCSVT.2021.313538432:7(4905-4910)Online publication date: Jul-2022
  • (2022)A comprehensive review of video steganalysisIET Image Processing10.1049/ipr2.1257316:13(3407-3425)Online publication date: 5-Jul-2022
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media