Video Steganography Based on Optimized Motion Estimation Perturbation

In this paper, a novel motion vector-based video steganographic scheme is proposed, which is capable of withstanding the current best statistical detection method. With this scheme, secret message bits are embedded into motion vector (MV) values by slightly perturbing their motion estimation (ME) processes. In general, two measures are taken for steganographic security (statistical undetectability) enhancement. First, the ME perturbations are optimized ensuring the modified MVs are still local optimal, which essentially makes targeted detectors ineffective. Secondly, to minimize the overall embedding impact under a given relative payload, a double-layered coding structure is used to control the ME perturbations. Experimental results demonstrate that the proposed scheme achieves a much higher level of security compared with other existing MV-based approaches. Meanwhile, the reconstructed visual quality and the coding efficiency are slightly affected as well.

[1]  Jessica J. Fridrich,et al.  Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.

[2]  Zahir Tari,et al.  Security and Privacy in Cloud Computing , 2014, IEEE Cloud Computing.

[3]  Jessica J. Fridrich,et al.  Writing on wet paper , 2005, IEEE Transactions on Signal Processing.

[4]  Zhong Wei-Dong,et al.  A novel steganography algorithm based on motion vector and matrix encoding , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.

[5]  Lina Wang,et al.  Video steganalysis based on subtractive probability of optimal matching feature , 2014, IH&MMSec '14.

[6]  Weiming Zhang,et al.  Defining embedding distortion for motion vector-based video steganography , 2014, Multimedia Tools and Applications.

[7]  Hong Zhao,et al.  Video Steganalysis Against Motion Vector-Based Steganography by Adding or Subtracting One Motion Vector Value , 2014, IEEE Transactions on Information Forensics and Security.

[8]  Xinpeng Zhang,et al.  Efficient double-layered steganographic embedding , 2007 .

[9]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.

[10]  Tao Zhang,et al.  Steganography in Compressed Video Stream , 2006, First International Conference on Innovative Computing, Information and Control - Volume I (ICICIC'06).

[11]  Long-Wen Chang,et al.  Data hiding for digital video with phase of motion vector , 2006, 2006 IEEE International Symposium on Circuits and Systems.

[12]  Dengguo Feng,et al.  Video Steganography with Perturbed Motion Estimation , 2011, Information Hiding.

[13]  Li Xiang,et al.  Video steganography using motion vector and linear block codes , 2010, 2010 IEEE International Conference on Software Engineering and Service Sciences.

[14]  H. A. Aly,et al.  Data Hiding in Motion Vectors of Compressed Video Based on Their Associated Prediction Error , 2011, IEEE Transactions on Information Forensics and Security.

[15]  Dengguo Feng,et al.  Video Steganalysis Exploiting Motion Vector Reversion-Based Features , 2012, IEEE Signal Processing Letters.

[16]  Chih-Jen Lin,et al.  LIBSVM: A library for support vector machines , 2011, TIST.