High-fidelity H.264/AVC video three-coefficient reversible steganography method

A high-fidelity, high-efficiency technology, applied in digital video signal modification, electrical components, image communication, etc., can solve the problem of algorithm embedding efficiency reduction, achieve good visual quality, high embedding efficiency, and ensure reversibility

Active Publication Date: 2018-08-03
SOUTH CHINA UNIV OF TECH
View PDF4 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Such "useless modification" (that is, the carrier needs to be modified without embedding the secret letter) will greatly reduce the efficiency of algorithm embedding

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • High-fidelity H.264/AVC video three-coefficient reversible steganography method
  • High-fidelity H.264/AVC video three-coefficient reversible steganography method
  • High-fidelity H.264/AVC video three-coefficient reversible steganography method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0052] A high-fidelity three-coefficient reversible steganography method for H.264 / AVC video, including two parts: an embedding method and an extraction method. The flow chart of the embedding method is as follows: figure 1 As shown, the embedding process is mainly divided into six steps, including obtaining quantized residual DCT coefficients and macroblock prediction modes, selecting macroblocks to be embedded that meet the embedding requirements, determining the final 4×4TU sub-blocks for embedding, traversing the current Encode the frame to obtain the "vacuum value", modulate the carrier according to the "vacuum value" and the secret message content, and synchronize the change of the residual to the reconstructed macroblock of the macroblock, and entropy coding to obtain the compressed video after embedding. The flow chart of the extraction method is as follows figure 2 As shown, the extraction process is mainly divided into six steps, including entropy decoding to obtain...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a high-fidelity H.264/AVC video three-coefficient reversible steganography method which comprises two parts of an embedding method and an extraction method. The embedding method comprises the steps of: according to an H.264/AVC video standard, carrying out coding operation on a YUV video sequence frame by frame to obtain quantized residual DCT coefficients of all macro blocks in a current coded frame; sequentially traversing a plurality of macro blocks in the current coded frame according to a sequence from top to bottom and from left to right, and selecting 4*4TU sub-blocks of which texture-complexity is greater than or equal to a set threshold; and according to a three-coefficient embedding strategy, completing embedding, and carrying out entropy coding to obtaina compressed video after embedding. According to the invention, a three-coefficient modulation strategy combines information of a vacuum value, a coefficient translation path and the like, the quantized residual DCT coefficients which do not need to be modified are filtered out, useless modification of a carrier is reduced, embedding efficiency of an algorithm is improved, and video quality and algorithm safety are ensured.

Description

technical field [0001] The invention relates to the technical field of steganography in the video compression domain, in particular to a high-fidelity H.264 / AVC video three-coefficient reversible steganography method. Background technique [0002] Multimedia information steganography is an important branch in the field of information security. Digital video has become an ideal steganographic carrier because of its large data volume and the ability to accommodate a large number of encrypted messages. H.264 / AVC is currently the most widely used video coding standard and is used in various products on the Internet. Therefore, it is of great theoretical significance and practical application value to study the steganography algorithm based on it. [0003] Reversible information hiding is a technology that hides information in digital media in a reversible manner. After the hidden information is extracted from the carrier, the original media can be completely restored. Using ge...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04N19/122H04N19/124H04N19/129H04N19/13H04N19/176H04N19/467
CPCH04N19/122H04N19/124H04N19/129H04N19/13H04N19/176H04N19/467
Inventor 胡永健彭诗云刘琲贝刘烁炜
Owner SOUTH CHINA UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products