Unlock instant, AI-driven research and patent intelligence for your innovation.

A h.264 video steganography algorithm based on ued

A video steganography and algorithm technology, applied in the field of UED-based H.264 video steganography algorithm, can solve the problems of not considering the security of information hiding methods, poor performance, etc., to improve practicability and security, increase capacity, The effect of improving safety performance

Inactive Publication Date: 2021-05-04
SUN YAT SEN UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] In order to solve the problem that the video steganography algorithm in the prior art does not consider the security and poor performance of the information hiding method, the present invention provides a UED-based H.264 video steganography algorithm

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A h.264 video steganography algorithm based on ued
  • A h.264 video steganography algorithm based on ued
  • A h.264 video steganography algorithm based on ued

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0075] Such as figure 1 , figure 2 , image 3 , Figure 4 , Figure 5 as well as Image 6 As shown, a UED-based H.264 video steganography algorithm includes the following steps:

[0076] Step S1: For the horizontal component of a motion vector, define its modified cost function as:

[0077]

[0078] Among them, f n f (Δh) represents the horizontal component modification cost function of the motion vector, f n t (Δh) represents the frame type coefficient of the horizontal component of the motion vector, f n c (Δh) represents the correlation factor of the horizontal component of the motion vector residual, f n d (Δh) represents the reconstruction error factor of the horizontal component of the motion vector, f n q (Δh) represents the local optimal judgment condition of the horizontal component of the motion vector; α and β are constants; respectively solve f n c (Δh), f n q (Δh), f n d (Δh), f n t (Δh);

[0079] Step S2: Solve the modified cost functio...

Embodiment 2

[0125] Image 6 , Figure 7 with Figure 8 The algorithms (UED_H.264) proposed by Aly, Yao and this patent are respectively shown against NPEFLO (Near PerfectEstimation for Local Optimality, a A steganalysis method based on local optimality of motion vector) [5]. It can be seen that under different code rates, the method proposed in this patent has obvious improvement in security, and the detection rate of the encrypted carrier is lower (the closer to 0.5, the more secure it is considered).

[0126] Figure 10They are the change of the average PSNR of the compressed video and the impact on the encoding speed under different secret information loads. Among them, bpmv (bitsper mv) is the measurement unit of the load, which represents how many bits of information each motion vector carries on average. It can be seen from Table 1 that as the load increases, the change of the average PSNR also increases, and the impact on the video is more serious. But it can be seen that the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a UED-based H.264 video steganography algorithm, which proposes a multi-objective optimization modification cost function and a multi-stage STC information embedding method based on the UED-based H.264 video steganography algorithm. Using these two techniques, in the process of information embedding, the initial encoding is performed first, and the information required for re-encoding and the information necessary for the calculation of the cost function are collected during the encoding process. After the initialization coding is completed, it enters the stage of information steganography. In the information steganography stage, the modification cost of the motion vector is calculated according to the multi-objective optimization modification cost function, and the information is embedded into the motion vector according to the calculated cost by using the multi-stage STC information embedding method. Finally, re-encode the dense motion vector and other information required for encoding, and recalculate the prediction error based on the modified motion vector to obtain the desired dense compressed video.

Description

technical field [0001] The present invention relates to the field of information encryption, and more specifically, to a UED (Uniformly Embedded Distortion)-based H.264 video steganography algorithm. Background technique [0002] Multimedia information steganography is an information security technology that embeds secret information into multimedia files and hides the fact of information transmission by making a small amount of modification to some data in multimedia files. At present, there are many steganographic algorithms applied to images, and have achieved good results. However, due to the increasing demand for hidden capacity and the development of behavior-oriented steganalysis methods, image steganography algorithms are gradually unable to meet the changing needs, and the research on new steganographic carriers is becoming more and more urgent. In this case, due to its huge amount of data, video has increasingly become the focus of research on multimedia informati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04N19/467H04N19/139H04N19/513H04N19/567H04N19/176H04N19/61H04N19/625
CPCH04N19/139H04N19/176H04N19/467H04N19/513H04N19/567H04N19/61H04N19/625
Inventor 朱宝林倪江群
Owner SUN YAT SEN UNIV