Cover Block Decoupling for Content-Adaptive H.264 Steganography

被引:20
作者
Cao, Yun [1 ,2 ]
Wang, Yu [1 ,2 ]
Zhao, Xianfeng [1 ,2 ]
Zhu, Meineng [3 ]
Xu, Zhoujun [4 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
[3] Beijing Inst Elect Technol & Applicat, Beijing 100091, Peoples R China
[4] Beijing Informat Technol Inst, Beijing 100094, Peoples R China
来源
PROCEEDINGS OF THE 6TH ACM WORKSHOP ON INFORMATION HIDING AND MULTIMEDIA SECURITY (IH&MMSEC'18) | 2018年
关键词
ALGORITHM; SCHEME;
D O I
10.1145/3206004.3206014
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper makes the first attempt to achieve content-adaptive H.264 steganography with the quantised discrete cosine transform (QDCT) coefficients in intra-frames. Currently, state-of-the-art JPEG steganographic schemes embed their payload while minimizing a heuristically defined distortion. However, porting this concept to schemes of compressed videos remains an unsolved challenge. Because of H.264 intra prediction, the QDCT coefficient blocks are highly depended on their adjacent encoded blocks, and modifying one coefficient block will set off a chain reaction in the following cover blocks. Based on a thorough investigation into this problem, we propose two embedding strategies for cover block decoupling to inhibit the embedding interactions. With this methodology, the latest achievements in the JPEG domain are expected to be incorporated to construct H.264 steganographic schemes for better performances.
引用
收藏
页码:23 / 30
页数:8
相关论文
共 19 条
[1]  
Bellifemine F., 1992, Signal Processing: Image Communication, V4, P477, DOI 10.1016/0923-5965(92)90032-B
[2]   LIBSVM: A Library for Support Vector Machines [J].
Chang, Chih-Chung ;
Lin, Chih-Jen .
ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY, 2011, 2 (03)
[3]  
Denemark T, 2015, P 3 ACM WORKSH INF H, P5
[4]   Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes [J].
Filler, Tomas ;
Judas, Jan ;
Fridrich, Jessica .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) :920-935
[5]   Gibbs Construction in Steganography [J].
Filler, Tomas ;
Fridrich, Jessica .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2010, 5 (04) :705-720
[6]   Minimizing Embedding Impact in Steganography using Trellis-Coded Quantization [J].
Filler, Tomas ;
Judas, Jan ;
Fridrich, Jessica .
MEDIA FORENSICS AND SECURITY II, 2010, 7541
[7]   Universal distortion function for steganography in an arbitrary domain [J].
Holub, Vojtech ;
Fridrich, Jessica ;
Denemark, Tomas .
EURASIP JOURNAL ON INFORMATION SECURITY, 2014, 2014 (01)
[8]   Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT [J].
Holub, Vojtech ;
Fridrich, Jessica .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (02) :219-228
[9]   A Controllable Error-Drift Elimination Scheme for Watermarking Algorithm in H.264/AVC Stream [J].
Huo, Weijing ;
Zhu, Yuesheng ;
Chen, Hongyuan .
IEEE SIGNAL PROCESSING LETTERS, 2011, 18 (09) :535-538
[10]   A Strategy of Clustering Modification Directions in Spatial Image Steganography [J].
Li, Bin ;
Wang, Ming ;
Li, Xiaolong ;
Tan, Shunquan ;
Huang, Jiwu .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (09) :1905-1917