A Cover Selection HEVC Video Steganography Based on Intra Prediction Mode

被引:32
作者
Wang, Jie [1 ]
Jia, Xiaoqing [1 ]
Kang, Xiangui [1 ]
Shi, Yun-Qing [2 ]
机构
[1] Sun Yat Sen Univ, Sch Data & Comp Sci, Guangdong Key Lab Informat Secur, Guangzhou 510006, Guangdong, Peoples R China
[2] New Jersey Inst Technol, Dept ECE, Newark, NJ 07102 USA
来源
IEEE ACCESS | 2019年 / 7卷
基金
中国国家自然科学基金;
关键词
Video steganography; HEVC; IPM; cover selection rule;
D O I
10.1109/ACCESS.2019.2936614
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Existing video steganography puts much emphasis on the design of algorithms such as mapping rules or distortion functions, thereby ignoring the selection of cover to embed secret information. However, this is just one of the major differences between image steganography and video steganography. In addition, since HEVC is the latest standard in the video codec field, it is of important academic significance and applied value to study HEVC-based steganography. This paper proposes a novel video steganography in HEVC, based on intra-prediction mode (IPM). Firstly, this paper analyzes the probability distribution of 4 x 4 IPMs. Then a cover selection rule combined with the Coding Unit (CU) and Prediction Unit (PU) coding information is proposed, which can improve the security performance of a stego video stream. In addition, matrix coding is used as a coding example to implement the steganography on HEVC video streams. Experimental results show that the proposed algorithm can not only maintain the video quality and the security performance but is also easy to implement. Furthermore, the proposed cover selection rule can also be integrated into other HEVC IPM based steganography.
引用
收藏
页码:119393 / 119402
页数:10
相关论文
共 26 条
  • [1] [Anonymous], 1996, Lecture Notes in Computer Science, DOI DOI 10.1007/3-540-61996-8_52
  • [2] [Anonymous], 2014, P JOINT COLL TEAM VI
  • [3] [Anonymous], 2001, VCEG M
  • [4] Chang P. C., 2013, 2013 FUTURE NETWORK, P1
  • [5] Comparative study of digital audio steganography techniques
    Djebbar, Fatiha
    Ayad, Beghdad
    Meraim, Karim Abed
    Hamam, Habib
    [J]. EURASIP JOURNAL ON AUDIO SPEECH AND MUSIC PROCESSING, 2012,
  • [6] Matrix embedding for large payloads
    Fridrich, Jessica
    Soukal, David
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2006, 1 (03) : 390 - 395
  • [7] Hu Y, 2007, 2007 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOLS 1-5, P1231
  • [8] Jiang B., 2015, J COMPUT INF SYST, V11, P6
  • [9] Exploring steganography: Seeing the unseen
    Johnson, NF
    Jajodia, S
    [J]. COMPUTER, 1998, 31 (02) : 26 - +
  • [10] A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression
    Kang, XG
    Huang, JW
    Shi, YQ
    Lin, Y
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2003, 13 (08) : 776 - 786