Discover the SciOpen Platform and Achieve Your Research Goals with Ease.
Search articles, authors, keywords, DOl and etc.
Recently proposed steganalysis methods based on the local optimality of motion vector prediction (MVP) indicate that the existing HEVC (high efficiency video coding) motion vector (MV) domain video steganography algorithms can disturb the optimality of MVP in advanced motion vector prediction (AMVP) technology. In order to improve the security of steganography algorithm, this paper proposes an MV domain steganography method in HEVC based on MVP’s index and motion vector difference (MVD). First, we analyze the conditions that need to be met for steganography to resist attacks from MVP’s optimality features and other traditional steganalysis features. Then, a distortion function for minimizing embedding distortion is designed, and an algorithm for secret message embedding and extraction in units of inter-frame is proposed. Experimental results show that the proposed algorithm can resist attacks based on the optimality of MVP and also has high security against other traditional steganalysis methods. In addition, the proposed algorithm has excellent performance in visual quality and coding efficiency, and can be applied to practical scenarios of video covert communication.
M. Bouzegza, A. Belatreche, A. Bouridane, and M. Tounsi, A comprehensive review of video steganalysis, IET Imag. Proce., vol.16, no. 13, pp. 3407–3425, 2022.
Y. Dong, X. Jiang, Z. Li, T. Sun, and Z. Zhang, Multi-channel HEVC steganography by minimizing IPM steganographic distortions, IEEE Trans. Multimed., vol. 25, pp. 2698–2709, 2023.
Y. Dong, X. Jiang, Z. Li, T. Sun, and P. He, Adaptive HEVC steganography based on steganographic compression efficiency degradation model, IEEE Trans. Dependable Secure Comput., vol. 20, no. 1, pp. 769–783, 2023.
J. Wang, X. Jia, X. Kang, and Y. Q. Shi, A cover selection HEVC video steganography based on intra prediction mode, IEEE Access, vol. 7, pp. 119393–119402, 2019.
Z. Li, X. Jiang, Y. Dong, L. Meng, and T. Sun, An anti-steganalysis HEVC video steganography with high performance based on CNN and PU partition modes, IEEE Trans. Dependable Secure Comput., vol. 20, no. 1, pp. 606–619, 2023.
J. Liu, Z. Li, X. Jiang, and Z. Zhang, A high-performance CNN-applied HEVC steganography based on diamond-coded PU partition modes, IEEE Trans. Multimedia, vol. 24, pp. 2084–2097, 2022.
S. He, D. Xu, L. Yang, and W. Liang, Adaptive HEVC video steganography with high performance based on attention-net and PU partition modes, IEEE Trans. Multimedia, vol. 26, pp. 687–700, 2024.
S. He, D. Xu, L. Yang, and Y. Liu, HEVC video information hiding scheme based on adaptive double-layer embedding strategy, J. Vis. Commun. Image Represent, vol. 87, p. 103549, 2022.
J. Li, M. Zhang, K. Niu, and X. Yang, Investigation on principles for cost assignment in motion vector-based video steganography, J. Inf. Secur. Appl., vol. 73, p. 103439, 2023.
Y. Chen, H. Wang, K. K R. Choo, P. He, Z. Salcic, D. Kaafar, and X. Zhang, DDCA: A distortion drift-based cost assignment method for adaptive video steganography in the transform domain, IEEE Trans. Dependable Secure Comput, vol. 19, no. 4, pp. 2405–2420, 2022.
Y. Wang, Y. Cao, and X. Zhao, CEC: cluster embedding coding for H.264 steganography, IEEE Signal Process. Lett, vol. 27, pp. 955–959, 2020.
L. Yang, D. Xu, R. Wang, and S. He, Adaptive HEVC video steganography based on distortion compensation optimization, J. Inf. Secur. Appl., vol. 73, p. 103442, 2023.
Y. Chen, Z. Salcic, H. Wang, K. K. R. Choo, and X. Zhang, NACA: A joint distortion-based non-additive cost assignment method for video steganography, IEEE Trans. Dependable Secure Comput, vol. 20, no. 3, pp. 2360–2374, 2023.
G. J. Sullivan, J. R. Ohm, W. J. Han, and T. Wiegand, Overview of the high efficiency video coding (HEVC) standard, IEEE Trans. Circuits Syst. Video Technol., vol. 22, no. 12, pp. 1649–1668, 2012.
Y. Zhang, M. Zhang, X. Yang, D. Guo, and L. Liu, Novel video steganography algorithm based on secret sharing and error-correcting code for H.264/AVC, Tsinghua Science and Technology, vol. 22, no. 2, pp. 198–209, 2017.
J. Yang and S. Li, An efficient information hiding method based on motion vector space encoding for HEVC, Multimed. Tools Appl., vol. 77, no. 10, pp. 11979–12001, 2018.
Y. Hu, W. Gong, F. Liu, L. Liu, and M. Zhu, Large-capacity lossless HEVC information hiding based on index parameter modification (in Chinese), J. South China Univ. Technol, no. Nat.Sci.Ed., pp. 1–8, 2018.
S. Liu, B. Liu, Y. Hu, and X. Zhao, Non-degraded adaptive HEVC steganography by advanced motion vector prediction, IEEE Signal Process. Lett., vol. 28, pp. 1843–1847, 2021.
T. Filler, J. Judas, and J. Fridrich, Minimizing additive distortion in steganography using syndrome-trellis codes, IEEE Trans. Inf. Forensics Secur., vol. 6, no. 3, pp. 920–935, 2011.
K. Wang, H. Zhao, and H. Wang, Video steganalysis against motion vector-based steganography by adding or subtracting one motion vector value, IEEE Trans. Inform. Forensic Secur., vol. 9, no. 5, pp. 741–751, 2014.
H. Zhang, Y. Cao, and X. Zhao, A steganalytic approach to detect motion vector modification using near-perfect estimation for local optimality, IEEE Trans. Inform. Forensic Secur., vol. 12, no. 2, pp. 465–478, 2017.
L. Zhai, L. Wang, and Y. Ren, Universal detection of video steganography in multiple domains based on the consistency of motion vectors, IEEE Trans. Inform. Forensic Secur., vol. 15, pp. 1762–1777, 2020.
Y. Hu, X. Huang, Y. Wang, B. Liu, and S. Liu, Improving deep learning-based video steganalysis by using MVD detection space (in Chinese), Journal of Image and Graphics, vol. 3, no. 28, pp. 702–715, 2022.
S. Liu, Y. Hu, B. Liu, and C. T. Li, An HEVC steganalytic approach against motion vector modification using local optimality in candidate list, Pattern Recognit. Lett., vol. 146, pp. 23–30, 2021.
C. C. Chang and C. J. Lin, LIBSVM: A library for support vector machines, ACM Transactions on Intelligent Systems and Technology, vol. 2, no. 3, pp. 1–27, 2011.
The articles published in this open access journal are distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/).