ABSTRACT
In this paper, with a novel data representation named macroblock partition mode, an effective steganography integrated with H.264/AVC compression is proposed. The main principle is to improve the steganographic security in two directions. First, to embed messages, an internal process of H.264 compression, i.e., the macroblock partition, is slightly perturbed, hence the compression compliance is ensured. Second, to minimize the embedding impact, a high efficient double-layered structure is deliberately designed. In the first layer, the syndrome-trellis codes (STCs) is utilized to perform adaptive embedding, and the costs in visual quality and compression efficiency are both considered to construct the distortion model. In the second layer, facilitated by the wet paper codes (WPCs), an expected 3-bit per change gain in embedding efficiency is obtained.
- H. Aly. Data hiding in motion vectors of compressed video based on their associated prediction error. IEEE Transactions on Information Forensics and Security, 6(1):14--18, 2011. Google ScholarDigital Library
- Y. Cao, X. Zhao, and D. Feng. Video steganalysis exploiting motion vector reversion-based features. IEEE Signal Processing Letters, 19(1):35--38, 2012.Google ScholarCross Ref
- Y. Cao, X. Zhao, D. Feng, and R. Sheng. Video steganography with perturbed motion estimation. In Proc. 13th Information Hiding Conf., volume 6958 of Lecture Notes in Computer Science, pages 193--207, 2011. Google ScholarDigital Library
- Y. Cao, X. Zhao, F. Li, and N. Yu. Video steganography with multi-path motion estimation. In Proc. SPIE, Media Watermarking, Security, and Forensics, volume 8665, pages 86650K--86650K--6, 2013.Google ScholarCross Ref
- C. Chang and C. Lin. Libsvm -- a library for support vector machines, 2013.Google Scholar
- I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker. Digital Watermarking and Steganography, 2nd ed. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 2008. Google ScholarDigital Library
- T. Filler, J. Judas, and J. Fridrich. Minimizing embedding impact in steganography using trellis-coded quantization. In Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia XII, volume 7541, pages 1--14, 2010.Google Scholar
- T. Filler, J. Judas, and J. Fridrich. Minimizing additive distortion in steganography using syndrome-trellis codes. Information Forensics and Security, IEEE Transactions on, 6(3):920--935, 2011. Google ScholarDigital Library
- J. Fridrich, M. Goljan, and D. Soukal. Perturbed quantization steganography with wet paper codes. In Proceedings of the 2004 workshop on Multimedia & security, MM&Sec'04, pages 4--15, 2004. Google ScholarDigital Library
- Y. Guo and F. Pan. Information hiding for h.264 in video stream switching application. In Proc. IEEE Int. Conference on Inform. Theory and Inform. Security, pages 419--421, 2010.Google Scholar
- B. Hao, L. Zhao, and W. Zhong. A novel steganography algorithm based on motion vector and matrix encoding. In Proc. IEEE 3rd International Conference on ICCSN, pages 406--409, 2011.Google Scholar
- ISO. Information technology-Coding of moving pictures and associated audio for digital storage media at up to about 1,5 Mbit/s-Part 1:System. Int. Organization for Standardization, Geneva, Switzerland, 1993.Google Scholar
- S. Kapotas and A. Skodras. A new data hiding scheme for scene change detection in h.264 encoded video sequences. In Multimedia and Expo, 2008 IEEE International Conference on, pages 277--280, 2008.Google ScholarCross Ref
- Y. Su, C. Zhang, and C. Zhang. A video steganalytic algorithm against motion-vector-based steganography. Signal Process., 91(8):1901--1909, 2011. Google ScholarDigital Library
- Y. Tew and K. Wong. An overview of information hiding in h.264/avc compressed video. IEEE Trans. Circuits Syst. Video Technol., 2013.Google Scholar
- T. Wiegand, G. J. Sullivan, G. Bjontegaard, and A. Luthra. Overview of the h.264/avc video coding standard. IEEE Trans. Circuits Syst. Video Technol., 13(7):560--576, Jul. 2003. Google ScholarDigital Library
- X. Xu, J. Dong, W. Wang, and T. Tan. Video steganalysis based on the constraints of motion vectors. In Proc. IEEE International Conference on Image Processing, 2013.Google ScholarCross Ref
- X. Yang, L. Zhao, and K. Niu. An efficient video steganography algorithm based on sub-macroblock partition for h.264/avc. Advanced Materials Research, pages 5384--5389, 2012.Google ScholarCross Ref
- C. Zhang, Y. Su, and C. Zhang. A new video steganalysis algorithm against motion vector steganography. In Proc. 4th International Conference on Wireless Communications, Networking and Mobile Computing, pages 1--4, 2008.Google ScholarCross Ref
- W. Zhang, X. Zhang, and S. Wang. Maximizing steganographic embedding efficiency by combining hamming codes and wet paper codes. In Proc. 10th Information Hiding Conf., volume 5284 of Lecture Notes in Computer Science, pages 60--71, 2008. Google ScholarDigital Library
Index Terms
- Video steganography with perturbed macroblock partition
Recommendations
Video Steganography Based on Optimized Motion Estimation Perturbation
IH&MMSec '15: Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia SecurityIn this paper, a novel motion vector-based video steganographic scheme is proposed, which is capable of withstanding the current best statistical detection method. With this scheme, secret message bits are embedded into motion vector (MV) values by ...
A practical design of high-volume steganography in digital video files
In this research, we consider exploiting the large volume of audio/video data streams in compressed video clips/files for effective steganography. By observing that most of the distributed video files employ H.264 Advanced Video Coding (AVC) and MPEG ...
A reversible steganographic scheme for VQ indices based on joint neighboring coding
A novel reversible steganographic scheme for VQ indices based in joint neighboring coding is proposed.The proposed scheme can embed n secret bits into one VQ index, where n=1, 2, 3, or 4.The proposed scheme can provide high embedding rates, low bit ...
Comments