Video Steganography with Perturbed Motion Estimation

  • Conference paper
Information Hiding (IH 2011)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6958))

Included in the following conference series:

  • 2559 Accesses

Abstract

In this paper, we propose an adaptive video steganography tightly bound to video compression. Unlike traditional approaches utilizing spatial/transformed domain of images or raw videos which are vulnerable to certain existing steganalyzers, our approach targets the internal dynamics of video compression. Inspired by Fridrich et al’s perturbed quantization (PQ) steganography, a technique called perturbed motion estimation (PME) is introduced to perform motion estimation and message hiding in one step. Intending to minimize the embedding impacts, the perturbations are optimized with the hope that these perturbations will be confused with normal estimation deviations. Experimental results show that, satisfactory levels of visual quality and security are achieved with adequate payloads.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Xvid Codec 1.1.3 (2009), http://www.xvid.org/

  2. Aly, H.: Data hiding in motion vectors of compressed video based on their associated prediction error. IEEE Transactions on Information Forensics and Security 6(1), 14–18 (2011)

    Article  Google Scholar 

  3. Bellifemine, F., Capellino, A., Chimienti, A., Picco, R., Ponti, R.: Statistical analysis of the 2d-dct coefficients of the differential signal for images. Signal Processing: Image Communication 4(6), 477–488 (1992)

    Google Scholar 

  4. Budhia, U., Kundur, D., Zourntos, T.: Digital video steganalysis exploiting statistical visibility in the temporal domain. IEEE Transactions on Information Forensics and Security 1(4), 502–516 (2006)

    Article  Google Scholar 

  5. Cachin, C.: An information-theoretic model for steganography. Cryptology ePrint Archive, Report 2000/028 (2000)

    Google Scholar 

  6. Chang, C., Lin, C.: Libsvm: a library for support vector machines (2001), http://www.csie.ntu.edu.tw/~cjlin/libsvm

  7. Fang, D.Y., Chang, L.W.: Data hiding for digital video with phase of motion vector. In: Proceedings of IEEE International Symposium on Circuits and Systems, pp. 1422–1425 (2006)

    Google Scholar 

  8. Fridrich, J., Goljan, M., Soukal, D.: Perturbed quantization steganography with wet paper codes. In: Proceedings of the 2004 Workshop on Multimedia & Security, MM&Sec 2004, pp. 4–15. ACM, New York (2004)

    Google Scholar 

  9. Gormish, M.J., Gill, J.T.: Computation-rate-distortion in transform coders for image compression. In: SPIE Visual Communications and Image Processing, pp. 146–152 (1993)

    Google Scholar 

  10. Jainsky, J.S., Kundur, D., Halverson, D.R.: Towards digital video steganalysis using asymptotic memoryless detection. In: Proceedings of the 9th Workshop on Multimedia & Security, MM&Sec 2007, pp. 161–168. ACM, New York (2007)

    Google Scholar 

  11. Kutter, M., Jordan, F., Ebrahimi, T.: Proposal of a watermarking technique for hiding/retrieving data in compressed and decompressed video. Technical report M2281, ISO/IEC document, JTC1/SC29/WG11 (1997)

    Google Scholar 

  12. Pankajakshan, V., Doerr, G., Bora, P.K.: Detection of motion-incoherent components in video streams. IEEE Transactions on Information Forensics and Security 4(1), 49–58 (2009)

    Article  Google Scholar 

  13. Pevny, T., Bas, P., Fridrich, J.: Steganalysis by subtractive pixel adjacency matrix. IEEE Transactions on Information Forensics and Security 5(2), 215–224 (2010)

    Article  Google Scholar 

  14. Wang, Z., Bovik, A., Sheikh, H., Simoncelli, E.: Image quality assessment: from error visibility to structural similarity. IEEE Transactions on Image Processing 13(4), 600–612 (2004)

    Article  Google Scholar 

  15. Xu, C., **, X., Zhang, T.: Steganography in compressed video stream. In: Proceedings of the First International Conference on Innovative Computing, Information and Control, ICICIC 2006, pp. 269–272. IEEE Computer Society, Washington, DC, USA (2006)

    Google Scholar 

  16. Xuan, G., Shi, Y.Q., Gao, J., Zou, D., Yang, C., Zhang, Z., Chai, P., Chen, C., Chen, W.: Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions. In: Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Pérez-González, F. (eds.) IH 2005. LNCS, vol. 3727, pp. 262–277. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  17. Zhang, C., Su, Y.: Video steganalysis based on aliasing detection. Electronics Letters 44(13), 801–803 (2008)

    Article  Google Scholar 

  18. Zhang, C., Su, Y., Zhang, C.: A new video steganalysis algorithm against motion vector steganography. In: Proceedings of the 4th International Conference on Wireless Communications, Networking and Mobile Computing, pp. 1–4 (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Cao, Y., Zhao, X., Feng, D., Sheng, R. (2011). Video Steganography with Perturbed Motion Estimation. In: Filler, T., Pevný, T., Craver, S., Ker, A. (eds) Information Hiding. IH 2011. Lecture Notes in Computer Science, vol 6958. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24178-9_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-24178-9_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-24177-2

  • Online ISBN: 978-3-642-24178-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

Navigation