Video steganography algorithm based on motion vector difference

A technology of motion vector and video steganography, which is applied in digital video signal modification, electrical components, image communication, etc., can solve the problems that the statistical histogram of video motion information has a great influence, and the temporal-spatial correlation of motion vectors is easy to be destroyed, so as to maintain the temporal-spatial Correlation Effect

Inactive Publication Date: 2017-05-24
NANJING UNIV OF AERONAUTICS & ASTRONAUTICS
View PDF0 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0016] From the perspective of data security, the present invention, through research on the existing video steganography technology, finds that the existing video steganography methods generally have a great impact on the statistical histogram of video motion information, and are easy to destroy the temporal and spatial correlation of motion vectors, etc. question

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Video steganography algorithm based on motion vector difference
  • Video steganography algorithm based on motion vector difference
  • Video steganography algorithm based on motion vector difference

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0057] Embodiment 1 of the present invention introduces the steganographic embedding process of matrix coding based on the motion vector residual, and the process of selecting the secret key for matrix embedding. The specific steps are as follows: figure 2 shown, including:

[0058] (1) Convert the secret information to be embedded into binary form and encrypt to obtain the sequence M=(m 1 m 2 ...m n ), n is the length of secret information M. Convert n into binary form and encrypt to get sequence N=(n 1 no 2 ...n 32 ). Get the sequence to be embedded M'=N+M=(n 1 no 2 ...n 32 m 1 m 2 ...m n ).

[0059] (2) Setting the counter count_m=0 indicates the number of embedded information bits.

[0060] (3) Read and judge count_m, if count_m

[0061] (4) Read the MVD sequence of the current coded macroblock in order, select the one with the larger absolute value in the horizontal and vertical components of the MVD as the embeddin...

Embodiment 2

[0066] Embodiment 2 of the present invention introduces the LSB modification rule for maintaining the statistical characteristics of motion vector residuals, and its specific steps are as follows image 3 shown, including:

[0067] (1) Set counters count_0p1=0, count_0m1=0, count_p10=0, count_m10=0, empty queue sequence.

[0068] (2) If MVD b is 1, the MVD b -1 becomes 0, count_p10++, enqueues 1 into the sequence.

[0069] (3) If MVD b is -1, the MVD b +1 becomes 0, count_m10++, and -1 is added to the queue sequence.

[0070] (4) If MVD b is 0, and the sequence is not empty, then the sequence will dequeue an element, if the element is 1, then the MVD b +1 becomes 1, count_0p1++; if the element is -1, then MVD b -1 becomes -1, count_0m1++.

[0071] (5) If MVD b is 0, and the sequence is empty, judge the counter, if then the MVD b +1 becomes 1, count_0p1++; otherwise, MVD b -1 becomes -1, count_0m1++.

[0072] (6) If MVD b Not -1, 0, 1, and MVD b is positive odd...

Embodiment 3

[0075] Embodiment 3 of the present invention introduces the process that the receiving party uses the same matrix embedding key selection and matrix embedding code extraction rules to restore and extract secret information after receiving the encrypted video file. The specific steps are as follows: Figure 4 shown, including:

[0076] (1) Set counters count_n=0, count_m=0;

[0077] (2) If count_n<32, execute (3), otherwise execute (5);

[0078] (3) Read the MVD sequence of the current decoding macroblock in order, select the one with the larger absolute value in the horizontal and vertical components of the MVD as the carrier, and save its LSB information as a sequence G=(lsb 1 lsb 2 ... lsb l ), l is the length of sequence G. Compute the qualified a such that 2 a -1≤la+1 -1, take is the carrier sequence of secret information;

[0079] (4) Take the corresponding line a 2 a -1 column binary matrix calculate m'=(m 1 m 2 ...m a ) is the information sequence extrac...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a video steganography algorithm based on a motion vector difference MVD based on an H.264/AVC video coding and decoding framework. Through proving connection between the motion vector difference and motion vector space-time correlation, a statistics characteristic of the motion vector difference is used to design an embedding rule. Through combining a matrix coding algorithm, a series of matrix embedding secret keys with different sizes are designed and secret information is adaptively embedded into a video compression process so that the motion vector difference can well maintain an original histogram characteristic before and after steganography. The algorithm possesses good visual invisibility and can well resist steganography analysis based on motion vector space-time correlation.

Description

technical field [0001] The invention discloses a video steganography algorithm based on motion vector residuals, in particular to an improved LSB modification rule in the motion vector residuals of H.264 / AVC coding standard video sequences, using adaptive matrix coding The invention discloses a steganography algorithm for embedding and extracting secret information, which belongs to the field of information hiding and data security in the computer field. Background technique [0002] With the development of Internet information technology, information security has been paid more and more attention by ordinary people, enterprises and governments. Our country has also put forward the slogan "There is no national security without network security". Information security mainly includes four aspects: physical security, behavioral security, data security, and content security. The traditional field of information security pays more attention to the research of cryptography, and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04N19/176H04N19/513H04N19/124H04N19/625H04N19/467
CPCH04N19/176H04N19/124H04N19/467H04N19/513H04N19/625
Inventor 段然陈丹
Owner NANJING UNIV OF AERONAUTICS & ASTRONAUTICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products