Skip to main content
Log in

Defining embedding distortion for motion vector-based video steganography

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

This paper presents an effective methodology for motion vector-based video steganography. The main principle is to design a suitable distortion function expressing the embedding impact on motion vectors by exploiting the spatial-temporal correlation based on the framework of minimal-distortion steganography. Two factors are considered in the proposed distortion function, which are the statistical distribution change (SDC) of motion vectors in spatial-temporal domain and the prediction error change (PEC) caused by modifying the motion vectors. The practical embedding algorithm is implemented using syndrome-trellis codes (STCs). Experimental results show that the proposed method can enhance the security performance significantly compared with other existing motion vector-based video steganographic approaches, while obtaining the higher video coding quality as well.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Notes

  1. 1 The video sequence can be a series of raw images or a series of decompressed images obtaining from the coded bit stream.

References

  • Aly H (2011) Data hiding in motion vectors of compressed video based on their associated prediction error. IEEE Trans Inf Forensic Secur 6 (1):14–18

    Article  MathSciNet  Google Scholar 

  • Bellifemine F, Capellino A, Chimienti A et al (1992) Statistical analysis of the 2D-DCT coefficients of the differential signal for images. Signal Process Image Commun 4 (6):477–488

    Article  Google Scholar 

  • Cao Y, Zhao X, Feng D, Sheng R (2011) Video steganography with perturbed motion estimation. In: Proceedings of 13th international workshop information hiding, lecture notes in computer science, vol 6958, pp 193–207

  • Cao Y, Zhao X, Feng D (2012) Video steganalysis exploiting motion vector reversion-based features. IEEE Signal Process Lett 19 (1):35–38

    Article  Google Scholar 

  • Crandall R (1998) Some notes on steganography. Steganography mailing list. http://os.inf.tu-dresden.de/westfeld/crandall

  • Fang D-Y, Chang L-W (2006) Data hiding for digital video with phase of motion vector. In: Proceedings of international symposium circuits and systems (ISCAS), pp 1422–1425

  • Filler T, Fridrich J (2010) Gibbs construction in steganography. IEEE Trans Inf Forensic Secur 5 (4):705–720

    Article  Google Scholar 

  • Filler T, Judas J, Fridrich J (2010) Minimizing embedding impact in steganography using trellis-coded quantization. In: Proceedings of SPIE, media forensics and security II, vol 7541, pp 05-01–05-14

  • Filler T, Fridrich J (2011) Design of adaptive steganographic schemes for digital images. In: Proceedings of SPIE, media watermarking, security and forensics III, vol 7880, pp 0F-01–0F-14

  • Filler T, Judas J, Fridrich J (2011) Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans Inf Forensic Secur 6 (3):920–934

    Article  Google Scholar 

  • Filler T, Judas J, Fridrich J Syndrome-trellis codes toolbox, ver. 1.0, http://dde.binghamton.edu/download/syndrome/

  • Fridrich J, Goljan M, Lisonekm P, Soukal D (2005) Writing on wet paper. IEEE Trans Signal Process 53 (10):3923–3935

    Article  MathSciNet  Google Scholar 

  • Gormish MJ, Gill JT (1993) Computation-rate-distortion in transform coders for image compression. SPIE Vis Commun Image Process:146–152

  • Guo L, Ni J, Shi YQ (2012) An efficient JPEG steganographic scheme using uniform embedding. In: Proceedings of international workshop infornamtion forensics security (WIFS), pp 169–174

  • Holub V, Fridrich J (2012) Designing steganographic distortion using directional filters. In: Proceedings of international workshop information forensics security (WIFS), pp 234–239

  • Holub V, Fridrich J (2013) Digital image steganography using universal distortion. In: Proceedings of first international workshop information hiding and multimedia security, pp 59–68

  • Huang F, Huang J, Shi YQ (2012) New channel selection rule for JPEG steganography. IEEE Trans Inf Forensic Secur 7 (4):1181–1191

    Article  Google Scholar 

  • Ker AD, Bas P, Bohme R et al (2013) Moving steganography and steganalysis from the laboratory into the real world. In: Proceedings of ftrst internatonal workshop information hiding and multimedia security, pp 45–58

  • Kodovsky J, Fridrich J, Holub V (2012) Ensemble classifiers for steganalysis of digital media. IEEE Trans Inf Forensic Secur 7 (2):432–444

    Article  Google Scholar 

  • Pevný T, Filler T, Bas P (2010) Using high-dimensional image models to perform highly undetectable steganography. In: Proceedings of 12th international workshop information hiding, lecture notes in computer science, pp 161–177

  • Sachnev V, Kim HJ (2012) Modified BCH data hiding scheme for JPEG steganography. EURASIP J Adv Signal Proc 89:1–10

    Google Scholar 

  • Shanableh T (2012) Data hiding in MPEG video files using multivariate regression and flexible macroblock ordering. IEEE Trans Inf Forensic Secur 7 (2):455–464

    Article  Google Scholar 

  • Su Y, Zhang C, Zhang C (2011) A video steganalytic algorithm against motion-vector-based steganography. Signal Process 91 (8):1901–1909

    Article  MATH  Google Scholar 

  • The H.264/AVC joint model JM), ver. 10.2, http://iphome.hhi.de/suehring/tml/download/old_jm

  • Wiegand T, Sullivan GJ, Bjontegaard G, Luthra A (2003) Overview of the H.264/AVC video coding standard. IEEE Trans Circuits Syst Video Technol 13 (7):560–576

    Article  Google Scholar 

  • Wiegand T, Schwarz H, Joch A et al (2003) Rate-constrained coder control and comparison of video coding standards. IEEE Trans Circuits Syst Video Technol 13 (7):688–703

    Article  Google Scholar 

  • Xu C, Ping X, Zhang T (2006) Steganography in compressed video stream. In: Proceedings of international conference innovative computing, information and control, pp 803–806

  • Yang X, Zhao L, Niu K (2012) An efficient video steganography algorithm based on sub-macroblock partition for H.264/AVC. Adv Mater Res 433–440:5384–5389

    Article  Google Scholar 

  • YUV Video Sequences, http://trace.eas.asu.edu/yuv/index.html

  • Zhang X, Zhang W, Wang S (2007) Efficient double-layered steganographic embedding. Electron Lett 43:482–483

    Article  Google Scholar 

  • Zhang W, Zhang X, Wang S (2007) A double layered “plus-minus one” data embedding scheme. IEEE Signal Process Lett 14 (11):848–851

    Article  Google Scholar 

Download references

Acknowledgments

This work was supported in part by the Natural Science Foundation of China under Grant 61170234 and Grant 60803155, and in part by the Strategic Priority Research Program of the Chinese Academy of Sciences under Grant XDA06030601.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Weiming Zhang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yao, Y., Zhang, W., Yu, N. et al. Defining embedding distortion for motion vector-based video steganography. Multimed Tools Appl 74, 11163–11186 (2015). https://doi.org/10.1007/s11042-014-2223-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-014-2223-8

Keywords

Navigation