Video steganography method based on motion vector

A technology of motion vector and video steganography, which is applied in the field of video coding and information hiding, can solve the problem of not having a more effective definition of distortion function, and achieve the effect of ensuring security

Active Publication Date: 2013-10-02
UNIV OF SCI & TECH OF CHINA
View PDF3 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the research on distortion functions for video steganography is still in its infancy, and there is no effective way to define distortion functions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Video steganography method based on motion vector
  • Video steganography method based on motion vector
  • Video steganography method based on motion vector

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0022] figure 1 It is a flow chart of a motion vector-based video steganography method provided by Embodiment 1 of the present invention. Such as figure 1 As shown, the method mainly includes the following steps:

[0023] Step 11, judging the type of each frame in the video sequence one by one. If the tth frame is a key frame I frame that adopts intra-frame predictive encoding, then proceed to step 12; if the tth frame is a predictive frame P frame that adopts inter-frame predictive encoding, then proceed to step 13.

[0024] In the embodiment of the present invention, before judging the type of the video frame, it is necessary to decode the coded bit stream to obtain the corresponding video sequence, and the arrangement of the frame images in the video sequence is also arranged according to its original time sequence.

[0025] The embodiment of the present invention mainly distinguishes video frames that use two compression coding methods: a key frame I frame that adopts i...

Embodiment 2

[0039] In order to facilitate understanding of the present invention, below in conjunction with Figure 2-Figure 3 The present invention is further introduced, such as figure 2 As shown, the method mainly includes the following steps:

[0040] Step 21, judge the type of each frame in the video sequence one by one, and obtain the corresponding motion vector set according to the type of the video frame.

[0041] The embodiment of the present invention mainly distinguishes video frames that use two compression coding methods: a key frame I frame that adopts intra-frame predictive coding and a predictive frame P frame that adopts inter-frame predictive coding.

[0042] If the tth frame is an I frame, motion estimation is not performed, and the motion vector set MV of the frame is directly t Leave blank.

[0043] If the tth frame is a P frame, perform motion estimation. Specifically, motion estimation is performed on each coding block in the frame to obtain the motion vector m...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a video steganography method based on a motion vector, which comprises the following steps: the type of each frame of a video sequence is judged; if the t-th frame is the key I frame, the motion vector collection of the frame is set up to null; if the t-th frame is the predictive P frame, motion estimation is performed to the frame to obtain the motion vector collection, and preset distortion function is used for performing embedded distortion definition to the motion vector collection; after the types of all the frames of the video sequence are judged and after the embedded distortion definition is performed to the motion vectors of all the P frames, syndrome-trellis codes (STC) are used for embedding secret information by taking all the motion vectors of the video sequence as carriers so as to obtain motion vector collection subjected to modification, and then compressed coding is performed to each frame of the video sequence in sequence to obtain the coding bit stream of the video sequence. Through the method disclosed by the invention, the anti-detection performance of embedding secret information is improved, and low bit rate expansion of the coding bit steam and the reconstruction of excellent visual quality of the video are ensured.

Description

technical field [0001] The invention relates to the technical field of video coding and information hiding, in particular to a motion vector-based video steganography method. Background technique [0002] Video has become one of the most popular media on the Internet today. Video is composed of a series of spatially and temporally correlated images. Compared with a single frame image, it has a larger amount of data and can accommodate more secret messages. Raw video is not convenient for transmission in a network with limited bandwidth, and redundant data must first be removed through a compression process. Video compression processes and transforms the original video signal, and derives more information expression forms, such as motion vectors, residual signals, and quantized DCT (discrete cosine transform) coefficients. Coupled with the popularity of video on the Internet, embedded messages can be spread quickly and easily. The organic combination of these factors provi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04N7/26H04N7/36H04N7/46H04N21/2347
Inventor 俞能海张卫明姚远志叶惠
Owner UNIV OF SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products