Video steganography based on macroblock complexity

被引:0
|
作者
Yang X. [1 ,2 ]
Tang H. [1 ]
Niu K. [1 ,2 ]
Zhang Y. [1 ]
机构
[1] School of Cryptography Engineering, Engineering University of PAP, Xi'an
[2] Key Laboratory of Network and Information Security of PAP, Xi'an
来源
Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University | 2022年 / 49卷 / 02期
关键词
Hilbert curve; Macroblock complexity; Motion vector; Steganalysis; Steganography;
D O I
10.19665/j.issn1001-2400.2022.02.019
中图分类号
学科分类号
摘要
The video steganography based on the motion vector (MV) usually destroys the local optimality MV, and the destruction of such statistical properties is easily detected by the corresponding steganography analytical algorithms, resulting in a reduced performance of anti-stegoanalysis and steganography security. In order to reduce the damage to the local optimality of MVs, a video steganography algorithm based on macroblock complexity is proposed through the analysis of the influence of MV modification on the video quality and the local optimality of MV, and the low-complexity macroblock motion vectors are selected as carriers to effectively maintain the local optimality after embedding information. The proposed algorithm first introduces the Hilbert filling curve to scan macroblock pixels and defines macroblock complexity, then the macroblock complexity distribution is counted and the embedding threshold is dynamically determined according to the length of to-be-embedded data, and finally selects the MV of macroblock whose complexity is lower than the embedding threshold for random matching modification to embed secret information. Experimental results show that the stego video PSNR and SSIM degradation of the proposed algorithmare no more than 0. 30 dB and 0. 04, respectively, and the bit rate increase does not exceed 0. 97 % when the video is compressed and embedded with a compression rate of 1000 Kb/s. Its comparison with related algorithms show that the stego video of the proposed algorithm has a high-level visual quality and a low-level bit rate growth, and that the proposed algorithm has good anti-steganalysis detection capability and security. © 2022, The Editorial Board of Journal of Xidian University. All right reserved.
引用
收藏
页码:164 / 172
页数:8
相关论文
共 18 条
  • [1] KUTTER M, JORDAN F, EBRAHIMI T., Proposal of A Watermarking Technique for Hiding/Retrieving Data in Compressed And Decompressed Video, (1997)
  • [2] XU C Y, PING X J, ZHANG T., Steganography in Compressed Video Stream, International Conference on Innovative Computing, Information and Control, pp. 269-272, (2006)
  • [3] FANG D Y, CHANG L W., Data Hiding for Digital Video with Phase of Motion Vector, Proceedings of IEEE International Symposium on Circuits and Systems, pp. 1422-1425, (2006)
  • [4] ALY H., Data Hiding in Motion Vectors of Compressed Video Based on Their Associated Prediction Error, IEEE Transactions on Information Forensics and Security, 6, 1, pp. 14-18, (2011)
  • [5] CAO Y, ZHAO X F, FENG D G, Et al., Video Steganography with Perturbed Motion Estimation, International Conference on Information Hiding, pp. 193-207, (2011)
  • [6] CAO Y, ZHANG H, ZHAO X F, Et al., Video Steganography Based on Optimized Motion Estimation Perturbation, ACM Workshop on Information Hiding and Multimedia Security, pp. 25-31, (2015)
  • [7] FILLER T, JUDAS J, FRIDRICH J., Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes, IEEE Transactions on Information Forensics and Security, 6, 3, pp. 920-935, (2011)
  • [8] NIU Ke, LI Jun, LIU Jia, Et al., Strategic Adaptive Steganography Based on the Game Theory Model, Journal of Xidian University, 42, 4, pp. 165-170, (2015)
  • [9] YAO Z Y, ZHANG W M, YU N H, Et al., Defining Embedding Distortion for Motion Vector-Based Video Steganography, Multimedia Tools and Applications, 74, 24, pp. 11163-11186, (2015)
  • [10] WANG P P, ZHANG H, CAO Y, Et al., A Novel Embedding Distortion for Motion Vector-Based Steganography Considering Motion Characteristic, Local Optimality and Statistical Distribution, ACM Workshop on Information Hiding and Multimedia Security, pp. 127-137, (2016)