Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Video steganography method based on motion vector local optimality preservation

A motion vector and local optimal technology, applied in the sub-field of information hiding, can solve the problems of distinguishing common carriers, being unable to resist attacks, destroying the local optimality of motion vectors, etc., to reduce the impact, improve the embedding efficiency and security, resist the effect of attack

Inactive Publication Date: 2015-08-19
INST OF INFORMATION ENG CHINESE ACAD OF SCI
View PDF6 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] 5) Security: Even with prior knowledge about the steganography algorithm, the existing steganalysis methods cannot distinguish between ordinary carriers and files steganographiced by the algorithm with a high enough probability
However, since the patented method still modifies the motion vector in the traditional way of "adding or subtracting one to a certain component of the motion vector", that is (mv' x ,mv' y )∈{(mv x +1, mv y ),(mv x -1,mv y ),(mv x ,mv y +1),(mv x ,mv y -1)}(where (mv x ,mv y ) and (mv' x ,mv' y ) represent the original and steganographically modified motion vectors respectively), so it is possible to destroy the local optimality of the motion vector (Local Optimality), so it cannot resist the attack of AoSO, the most effective steganalysis feature in the current motion vector field (refer to Literature: K.Wang, H.Zhao, and H.Wang. Video Steganalysis Against Motion Vector-Based Steganography by Adding or Subtracting One Motion Vector Value. IEEE Transactions on Information Forensics and Security, vol.9(5):741-751 ,2014.)

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Video steganography method based on motion vector local optimality preservation
  • Video steganography method based on motion vector local optimality preservation
  • Video steganography method based on motion vector local optimality preservation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0069] Below through specific embodiment and in conjunction with appendix Figure 5-6 The present invention is further described.

[0070] Before adopting the present invention to steganographically embed secret information, the data to be embedded can be encrypted first to obtain a random binary data stream. The secret information embedding process of the video steganography method based on the local optimality preservation of the motion vector proposed by the present invention is as follows: Figure 5 As shown, the specific operation details are as follows:

[0071] 1) Obtain the video frame that needs to be steganographically embedded, for each motion vector (mv x ,mv y ), get the lowest bit of the sum of its horizontal and vertical components, namely LSB (mv x +mv y ), and form all calculation results into a binary vector x;

[0072] 2) For each motion vector MV in the video frame 0,0 =(mv x ,mv y ), according to the preset motion vector perturbation cost calculat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a video steganography method based on motion vector local optimality preservation. Criteria for motion vector local optimality and a search algorithm for optimal candidate motion vectors are established. On this basis, by constructing a reasonable motion vector disturbance cost calculation model and selecting the most efficient steganographic codes, covert channels are established to complete steganographic insertion of secret information, and an extraction process of the secrete information is thus completed. Syndrome trellis code (STC) steganographic codes are preferably adopted. The method provided by the present invention is a motion vector field video steganography method which is based on motion vector local optimality preservation, has a high insertion efficiency and can effectively resist conventional steganalysis attacks, and is especially applicable to covert communication situations with high safety requirements.

Description

technical field [0001] The present invention relates to a video steganography (Video Steganography) method, in particular to a high-concealment video steganography method based on motion vector local optimality preservation and its application in covert communication. The method belongs to the technical field of information security The information hiding subfield in . Background technique [0002] Modern information hiding technology mainly includes Steganography, Steganalysis and Digital Watermarking. Steganography mainly studies how to embed secret information into digital multimedia files such as images, videos, and audios to achieve the purpose of covert communication; steganalysis mainly uses methods such as machine learning and pattern recognition to classify and judge the files under test. [0003] In general, the design of a steganographic algorithm needs to comprehensively consider and weigh the following elements: [0004] 1) Imperceptibility: The carrier before...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04N19/467H04N19/51
Inventor 张弘曹纭赵险峰于海波
Owner INST OF INFORMATION ENG CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products