DDCA: A Distortion Drift-Based Cost Assignment Method for Adaptive Video Steganography in the Transform Domain

被引:29
作者
Chen, Yi [1 ,2 ]
Wang, Hongxia [3 ]
Choo, Kim-Kwang Raymond [4 ,5 ]
He, Peisong [3 ]
Salcic, Zoran [2 ]
Kaafar, Dali [6 ]
Zhang, Xuyun [6 ]
机构
[1] Southwest Jiaotong Univ, Sch Informat Sci & Technol, Chengdu 611756, Sichuan, Peoples R China
[2] Univ Auckland, Dept Elect Comp & Software Engn, Auckland 1010, New Zealand
[3] Sichuan Univ, Sch Cyber Sci & Engn, Chengdu 610065, Sichuan, Peoples R China
[4] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
[5] Univ Texas San Antonio, Dept Elect & Comp Engn, Dept Comp Sci, San Antonio, TX 78249 USA
[6] Macquarie Univ, Fac Sci & Engn, Dept Comp, Macquarie Pk, NSW 2109, Australia
基金
中国国家自然科学基金; 美国国家科学基金会;
关键词
Distortion; Encoding; Transforms; Security; Video coding; Additives; Standards; Adaptive video steganography; distortion drift; minimal distortion; Syndrome-Trellis Codes (STCs); H; 264; H.264/AVC VIDEO; WATERMARKING; STREAMS;
D O I
10.1109/TDSC.2021.3058134
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cost assignment plays a key role in coding performance and security of video steganography. Existing cost assignment methods (for adaptive video steganography) are designed for specific transform coefficients rather than all transform coefficients. In addition, existing video steganographic frameworks do not allow Syndrome-Trellis Codes (STCs) to modify all transform coefficients in both intra-coded and inter-coded frames at the same time. To address these limitations, in this article, we first propose a novel video steganographic framework. Then, we give a theoretical analysis of distortion drift in both intra- and inter-coding procedures. Based on the analysis, we design a Distortion Drift-Based Cost Assignment method, hereafter referred to as DDCA. DDCA considers the inner-block, inter-block and inter-frame distortion costs in order to improve the coding performance and the security of stego videos when the embedding payload is fixed. We conducted extensive experiments using two video datasets to evaluate the proposed video steganographic framework and DDCA, in terms of the coding performance and the security. Our experiments show that the proposed framework outperforms three recent state-of-the-art methods, for example the coding performance and the security of stego videos can benefit from DDCA by making full use of all nonzero transform coefficients.
引用
收藏
页码:2405 / 2420
页数:16
相关论文
共 46 条
[1]   Data Hiding in Motion Vectors of Compressed Video Based on Their Associated Prediction Error [J].
Aly, Hussein A. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (01) :14-18
[2]   Introduction [J].
不详 .
DIABETES CARE, 2015, 38 :S1-S2
[3]  
[Anonymous], 2019, 2019 GLOBAL MEDIA FO
[4]   An Overview of Digital Video Watermarking [J].
Asikuzzaman, Md. ;
Pickering, Mark R. .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2018, 28 (09) :2131-2153
[5]   Cover Block Decoupling for Content-Adaptive H.264 Steganography [J].
Cao, Yun ;
Wang, Yu ;
Zhao, Xianfeng ;
Zhu, Meineng ;
Xu, Zhoujun .
PROCEEDINGS OF THE 6TH ACM WORKSHOP ON INFORMATION HIDING AND MULTIMEDIA SECURITY (IH&MMSEC'18), 2018, :23-30
[6]   Covert Communication by Compressed Videos Exploiting the Uncertainty of Motion Estimation [J].
Cao, Yun ;
Zhang, Hong ;
Zhao, Xianfeng ;
Yu, Haibo .
IEEE COMMUNICATIONS LETTERS, 2015, 19 (02) :203-206
[7]   Defining Cost Functions for Adaptive JPEG Steganography at the Microscale [J].
Chen, Kejiang ;
Zhou, Hang ;
Zhou, Wenbo ;
Zhang, Weiming ;
Yu, Nenghai .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (04) :1052-1066
[8]  
Chen Y., 2018, MULTIMEDIA TOOLS APP, V77, p20 157
[9]   Adaptive Video Data Hiding through Cost Assignment and STCs [J].
Chen, Yanli ;
Wang, Hongxia ;
Wu, Han-Zhou ;
Wu, Zhiqiang ;
Li, Tao ;
Malik, Asad .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (03) :1320-1335
[10]   A Data Hiding Scheme with High Quality for H.264/AVC Video Streams [J].
Chen, Yi ;
Wang, Hongxia ;
Wu, Hanzhou ;
Chen, Yanli ;
Liu, Yong .
CLOUD COMPUTING AND SECURITY, PT IV, 2018, 11066 :99-110