A Novel Video Steganography Algorithm Based on Trailing Coecients for H.264/AVC

Accompany with the growth of the speed in network, people’s living standard has greatly improved, but the threaten to its information security has also appeared, as an important branch of information security, steganography is a useful method to protect the secret information safety. In view of the high complexity of current video steganographic algorithms, and combining with the trailing coefficient produced in the process of quantization of H.264 encoding standard, we put forward a kind of algorithm based on trailing coefficients. The algorithm firstly conduct DCT transform on the frame, then obtain the trailing coefficient for each quantized DCT blocks, last, embedding by changing its values. The experimental result indicates that: this algorithm has little influence on video quality and has large capacity of steganography, and has a strong anti-steganalysis capability, high robustness. Above all, the information security has been protected.

[1]  Ramadhan J. Mstafa,et al.  A highly secure video steganography using Hamming code (7, 4) , 2014, IEEE Long Island Systems, Applications and Technology (LISAT) Conference 2014.

[2]  Xuansen He,et al.  A Novel Steganographic Algorithm Based on the Motion Vector Phase , 2008, 2008 International Conference on Computer Science and Software Engineering.

[3]  Doan B. Hoang,et al.  Multi-layer security analysis and experimentation of high speed protocol data transfer for GRID , 2012, Int. J. Grid Util. Comput..

[4]  Fatos Xhafa,et al.  Supporting situated computing with intelligent multi-agent systems , 2011, Int. J. Space Based Situated Comput..

[5]  James Ridgway,et al.  Developing a Video Steganography Toolkit , 2014, ArXiv.

[6]  Jessica J. Fridrich,et al.  Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.

[7]  Qingqi Pei,et al.  The multimedia service session handoff method in heterogeneous wireless networks , 2012, Int. J. Grid Util. Comput..

[8]  Rubem Pereira,et al.  Future internet: trends and challenges , 2015, Int. J. Space Based Situated Comput..

[9]  Hemant Gupta Video Steganography through LSB Based Hybrid Approach , 2013 .

[10]  K. Mahesh,et al.  Random Image Embedded in Videos using LSB Insertion Algorithm , 2014 .

[11]  Amal Said Khalifa,et al.  Video steganography: a comprehensive review , 2015, Multimedia Tools and Applications.

[12]  Reginald L. Lagendijk,et al.  Optimal differential energy watermarking of DCT encoded images and video , 2001, IEEE Trans. Image Process..

[13]  Mortaza Heidari,et al.  Universal image steganalysis using singular values of DCT coefficients , 2013, 2013 10th International ISC Conference on Information Security and Cryptology (ISCISC).

[14]  Yang Yi-xian Robust video watermarking algorithm for H.264/AVC based on texture feature , 2012 .

[15]  Oscal T.-C. Chen,et al.  Data hiding in inter and intra prediction modes of H.264/AVC , 2008, 2008 IEEE International Symposium on Circuits and Systems.

[16]  Chantana Phongpensri,et al.  Exploring Video Steganography for Hiding Images Based on Similar Lifting Wavelet Coefficients , 2013, IAIT.

[17]  Ying Wang,et al.  Degradation and encryption for outsourced PNG images in cloud storage , 2016, Int. J. Grid Util. Comput..