Unlock instant, AI-driven research and patent intelligence for your innovation.

A multi-objective optimized h.264 video steganography method with constraints

A technology of multi-objective optimization and constraints, applied in the field of multi-objective optimization of H.264 video steganography, can solve problems such as poor performance, not considering local optimality, etc., to improve performance, increase steganography capacity, reduce effect of influence

Inactive Publication Date: 2021-05-04
SUN YAT SEN UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0015] In order to solve the relatively poor performance in the prior art against the video steganalysis method based on motion vector correlation and motion vector local optimality, and does not take into account the deficiency of local optimality based on rate-distortion function, the present invention Provides a multi-objective optimized H.264 video steganography method with constraints

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A multi-objective optimized h.264 video steganography method with constraints
  • A multi-objective optimized h.264 video steganography method with constraints
  • A multi-objective optimized h.264 video steganography method with constraints

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0131] Such as figure 1 , figure 2 as well as image 3 As shown, a multi-objective optimization H.264 video steganography method with constraints includes the following steps:

[0132] Step S1: Establishing a three-dimensional set of motion vectors according to the temporal and spatial positions of the motion vectors in a video, and determining the correlation measurement factor of the motion vectors on the three-dimensional set of motion vectors;

[0133] Step S2: Confirm the local optimal motion vector set Ω in the video S and Ω T , and modify the locally optimal motion vector set Ω S and Ω T ;

[0134] Step S3: Confirm the horizontal component forbidden mode set F of each motion vector in the video h and the forbidden pattern set F of the vertical component v ;

[0135] Step S4: According to Ω S , Ω T , F h and F v These four sets solve the locally optimal constraints of any one motion vector in the three-dimensional set of motion vectors;

[0136] Step S5: C...

Embodiment 2

[0243] Such as Figure 4 , as shown in Table 1, Figure 4 Under different encoding parameters, the security of the algorithm UEDWR proposed by Aly [1], Yao [2], Zhang [3] and this patent against the steganalysis algorithm based on the local optimal characteristics of the motion vector is demonstrated. The detection algorithm is NPEFLO (Near Perfect Estimation For Local Optimality), see the paper [6] for details. Load is measured in average embedded bytes per motion vector - bpmv (bits per motion vector). in Figure 4 (1) The experimental parameter condition is QP=28, the frame structure is IPPPP, and the motion search method is EPZS [7]; Figure 4 (2) The experimental parameter condition is QP=28, the frame structure is IBBBP, and the motion search method is EPZS; Figure 4 (3) The experimental parameter condition is QP=28, the frame structure is IBBBP, and the motion search method is HEX [8]; Figure 4 The experimental parameter condition of (4) is QP=18, the frame struc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a multi-objective optimization H.264 video steganography method with constraints, which includes multi-objective optimization cost functions with constraints, including the expression of time-space domain motion vector correlation measurement factors, and local optimal constraints of motion vectors. The expression and calculation method and the expression and calculation method of the reconstruction frame error constraint condition based on motion vector classification; the present invention greatly improves the security performance of the steganography algorithm against different types of steganalysis algorithms, and expands the algorithm The scope of application, and reduce the impact on the objective quality of the video, and further improve the performance of the algorithm against the steganalysis algorithm based on the local optimal characteristics of the motion vector, and improve the security.

Description

technical field [0001] The present invention relates to the field of information encryption, and more specifically, relates to a multi-objective optimized H.264 video steganography method with constraints. Background technique [0002] Multimedia information steganography is an information security technology that embeds secret information into multimedia files and hides the fact of information transmission by making a small amount of modification to some data in multimedia files. At present, there are many steganographic algorithms applied to images, and have achieved good results. However, due to the unreasonable increase in the demand for hidden capacity and the development of behavior-oriented steganalysis methods, image steganography algorithms are gradually unable to meet the changing needs, and the research on new steganographic carriers is becoming more and more urgent. In this case, due to its huge data volume, video has increasingly become the focus of research on...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04N1/32H04N1/44H04N19/44H04N19/513H04N19/70H04N19/91
CPCH04N1/32149H04N1/4446H04N19/44H04N19/513H04N19/70H04N19/91
Inventor 朱宝林倪江群
Owner SUN YAT SEN UNIV