Covert Communication by Compressed Videos Exploiting the Uncertainty of Motion Estimation

This letter deals with information hiding in compressed video; its goal is to improve the security of motion vector-based steganography with respect to the current best steganalytic method. Our research suggests that the perfect security (undetectability) can be approached if the uncertain information, which exists in the process of motion estimation, is fully exploited and establishes a connection between single motion vector's embedding distortion and its associated uncertainty. Based on this, a novel video steganography is proposed. Under a given payload, the syndrome-trellis code is used to minimize the overall embedding impact. Experimental results show that the proposed method outperforms other existing motion vector-based approaches for a higher level of security and a smaller impact on coding performance.

[1]  Jessica J. Fridrich,et al.  Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.

[2]  H. A. Aly,et al.  Data Hiding in Motion Vectors of Compressed Video Based on Their Associated Prediction Error , 2011, IEEE Transactions on Information Forensics and Security.

[3]  Gary J. Sullivan,et al.  Rate-constrained coder control and comparison of video coding standards , 2003, IEEE Trans. Circuits Syst. Video Technol..

[4]  Christian Cachin,et al.  An information-theoretic model for steganography , 1998, Inf. Comput..

[5]  Ajay Luthra,et al.  Overview of the H.264/AVC video coding standard , 2003, IEEE Trans. Circuits Syst. Video Technol..

[6]  Tao Zhang,et al.  Steganography in Compressed Video Stream , 2006, First International Conference on Innovative Computing, Information and Control - Volume I (ICICIC'06).

[7]  Dengguo Feng,et al.  Video Steganalysis Exploiting Motion Vector Reversion-Based Features , 2012, IEEE Signal Processing Letters.

[8]  Lap-Pui Chau,et al.  Hexagon-based search pattern for fast block motion estimation , 2002, IEEE Trans. Circuits Syst. Video Technol..

[9]  Jessica J. Fridrich,et al.  Writing on wet paper , 2005, IEEE Transactions on Signal Processing.

[10]  Jianfeng Xu,et al.  Fast integer-pel and fractional-pel motion estimation for H.264/AVC , 2006, J. Vis. Commun. Image Represent..

[11]  Hong Zhao,et al.  Video Steganalysis Against Motion Vector-Based Steganography by Adding or Subtracting One Motion Vector Value , 2014, IEEE Transactions on Information Forensics and Security.

[12]  Dengguo Feng,et al.  Video Steganography with Perturbed Motion Estimation , 2011, Information Hiding.

[13]  Chih-Jen Lin,et al.  LIBSVM: A library for support vector machines , 2011, TIST.

[14]  Long-Wen Chang,et al.  Data hiding for digital video with phase of motion vector , 2006, 2006 IEEE International Symposium on Circuits and Systems.

[15]  Rainer Böhme,et al.  Moving steganography and steganalysis from the laboratory into the real world , 2013, IH&MMSec '13.

[16]  Kai-Kuang Ma,et al.  A new diamond search algorithm for fast block-matching motion estimation , 2000, IEEE Trans. Image Process..