skip to main content
10.1145/2909827.2930801acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
research-article

A Novel Embedding Distortion for Motion Vector-Based Steganography Considering Motion Characteristic, Local Optimality and Statistical Distribution

Authors Info & Claims
Published:20 June 2016Publication History

ABSTRACT

This paper presents an effective motion vector (MV)-based steganography to cope with different steganalytic models. The main principle is to define a distortion scale expressing the multi-level embedding impact of MV modification. Three factors including motion characteristic of video content, MV's local optimality and statistical distribution are considered in distortion definition. For every embedding location, the contributions of three factors are dynamically adjusted according to MV's property. Based on the defined distortion function, two layered syndrome-trellis codes (STCs) are utilized to minimize the overall embedding impact in practical embedding implementation. Experimental results demonstrate that the proposed method achieves higher level of security compared with other existing MV-based approaches, especially for high quality videos.

References

  1. F. JORDAN. Proposal of a watermarking technique for hiding/retrieving data in compressed and decompressed video. ISO/IEC Doc. JTC1/SC 29/QWG 11 MPEG 97/M 2281, 1997.Google ScholarGoogle Scholar
  2. Changyong Xu, Xijian Ping, and Tao Zhang. Steganography in compressed video stream. In Innovative Computing, Information and Control, 2006. ICICIC '06. First International Conference on, volume 1, pages 269--272, Aug 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. H.A. Aly. Data hiding in motion vectors of compressed video based on their associated prediction error. Information Forensics and Security, IEEE Transactions on, 6(1):14--18, March 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. J. Fridrich, M. Goljan, P. Lisonek, and D. Soukal. Writing on wet paper. Signal Processing, IEEE Transactions on, 53(10):3923--3935, Oct 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Tomáš Filler, Jan Judas, and Jessica Fridrich. Minimizing embedding impact in steganography using trellis-coded quantization, 2010.Google ScholarGoogle Scholar
  6. T. Filler, J. Judas, and J. Fridrich. Minimizing additive distortion in steganography using syndrome-trellis codes. Information Forensics and Security, IEEE Transactions on, 6(3):920--935, Sept 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Yun Cao, Xianfeng Zhao, Dengguo Feng, and Rennong Sheng. Information Hiding: 13th International Conference, IH 2011, Prague, Czech Republic, May 18--20, 2011, Revised Selected Papers, chapter Video Steganography with Perturbed Motion Estimation, pages 193--207. Springer Berlin Heidelberg, Berlin, Heidelberg, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Yuanzhi Yao, Weiming Zhang, Nenghai Yu, and Xianfeng Zhao. Defining embedding distortion for motion vector-based video steganography. Multimedia Tools and Applications, 74(24):11163--11186, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Yanzhen Ren, Liming Zhai, Lina Wang, and Tingting Zhu. Video steganalysis based on subtractive probability of optimal matching feature. In Proceedings of the 2Nd ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec '14, pages 83--90, New York, NY, USA, 2014. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Keren Wang, Hong Zhao, and Hongxia Wang. Video steganalysis against motion vector-based steganography by adding or subtracting one motion vector value. Information Forensics and Security, IEEE Transactions on, 9(5):741--751, May 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Hong Zhang, Yun Cao, and Xianfeng Zhao. Motion vector-based video steganography with preserved local optimality. Multimedia Tools and Applications, pages 1--17, 2015.Google ScholarGoogle Scholar
  12. Yun Cao, Hong Zhang, Xianfeng Zhao, and Haibo Yu. Video steganography based on optimized motion estimation perturbation. In Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec '15, pages 25--31, New York, NY, USA, 2015. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Yun Cao, Xianfeng Zhao, and Dengguo Feng. Video steganalysis exploiting motion vector reversion-based features. Signal Processing Letters, IEEE, 19(1):35--38, Jan 2012.Google ScholarGoogle ScholarCross RefCross Ref
  14. Peipei Wang, Yun Cao, Xianfeng Zhao, and Bin Wu. Motion vector reversion-based steganalysis revisited. In Signal and Information Processing (ChinaSIP), 2015 IEEE China Summit and International Conference on, pages 463--467, July 2015.Google ScholarGoogle ScholarCross RefCross Ref
  15. Tomáš Pevnỳ, Tomáš Filler, and Patrick Bas. Information Hiding: 12th International Conference, IH 2010, Calgary, AB, Canada, June 28--30, 2010, Revised Selected Papers, chapter Using High-Dimensional Image Models to Perform Highly Undetectable Steganography, pages 161--177. Springer Berlin Heidelberg, Berlin, Heidelberg, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. V. Holub and J. Fridrich. Designing steganographic distortion using directional filters. In Information Forensics and Security (WIFS), 2012 IEEE International Workshop on, pages 234--239, Dec 2012.Google ScholarGoogle ScholarCross RefCross Ref
  17. Danfeng Xie, Zhiwei Huang, Shizheng Wang, and Heguang Liu. Moving objects segmentation from compressed surveillance video based on motion estimation. In Pattern Recognition (ICPR), 2012 21st International Conference on, pages 3132--3135, Nov 2012.Google ScholarGoogle Scholar
  18. Wei Zeng, Jun Du, Wen Gao, and Qingming Huang. Robust moving object segmentation on h.264/avc compressed video using the block-basedMRF\ model. Real-Time Imaging, 11(4):290 -- 299, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. R. Venkatesh Babu and K.R. Ramakrishnan. Recognition of human actions using motion history information extracted from the compressed video. Image and Vision Computing, 22(8):597 -- 607, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  20. T. Wiegand, G.J. Sullivan, G. Bjontegaard, and A. Luthra. Overview of the h.264/avc video coding standard. Circuits and Systems for Video Technology, IEEE Transactions on, 13(7):560--576, July 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. M. Tom and R.V. Babu. Fast moving-object detection in h.264/avc compressed domain for video surveillance. In Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG), 2013 Fourth National Conference on, pages 1--4, Dec 2013.Google ScholarGoogle Scholar
  22. Yuting Su, Chengqian Zhang, and Chuntian Zhang. A video steganalytic algorithm against motion-vector-based steganography. Signal Processing, 91(8):1901--1909, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. VideoLan. x264. Available: http://www.videolan.org/developers/x264.html.Google ScholarGoogle Scholar
  24. C.Chang and C.Lin. LIBSVM: A Library for Support Vector Machines, 2001 {online}. Available: http://www.csie.ntu.edu.tw/cjlin/libsvm. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A Novel Embedding Distortion for Motion Vector-Based Steganography Considering Motion Characteristic, Local Optimality and Statistical Distribution

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        IH&MMSec '16: Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security
        June 2016
        200 pages
        ISBN:9781450342902
        DOI:10.1145/2909827

        Copyright © 2016 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 20 June 2016

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        IH&MMSec '16 Paper Acceptance Rate21of61submissions,34%Overall Acceptance Rate128of318submissions,40%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader