Video steganography method, system and device based on macro block complexity

A technology of video steganography and complexity, applied in the field of image information hiding, can solve the problems of bit growth, characterization of reconstruction blocks, algorithm security discount, etc., to achieve simple algorithm information extraction, good resistance to steganalysis, and efficient information extraction. Effect

Active Publication Date: 2020-09-25
ENG UNIV OF THE CHINESE PEOPLES ARMED POLICE FORCE
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In order to ensure the local optimality of motion vectors, Zhang et al. proposed a local optimality preservation algorithm in 2015, which uses candidate motion vectors that simultaneously satisfy local optimality and are opposite to the parity of the optimal motion vector as the post-steganographic motion vector, since the replaced motion vector may not satisfy the global optimum within the search range, the increase in the residual error will lead to a significant increase in bit
[0003] Chinese patent CN 105704489 A measures the complexity of macroblocks, but it cannot completely describe the difference between adjacent pixels of the reconstruction block. In addition, there are certain defects in the selection method of the threshold, which may lead to incomplete embedding of secret information
[0004] In the existing steganographic algorithm based on motion vector, modifying the motion vector may cause the reconstructed block to not satisfy the local optimality at the decoding end, thus being detected by the steganalysis method based on local optimality hiding, thus exposing the concealed communication fact The security of the algorithm will be greatly reduced, so how to select the appropriate motion vector for information embedding and ensure that the reconstruction block can still maintain the local optimality of the motion vector at the decoding end has a great impact on the security of the steganography algorithm. plays a vital role

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Video steganography method, system and device based on macro block complexity
  • Video steganography method, system and device based on macro block complexity
  • Video steganography method, system and device based on macro block complexity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035]The present invention will be described in detail below in conjunction with the accompanying drawings.

[0036] Such as figure 1 As shown, it is a flow chart of video inter-frame compression. The video is divided into macroblocks of the same size, and then each macroblock is traversed. The encoder will search for the best match of the current block in the reference frame and According to the relative relationship between the position of the current block and the position of the best matching block, the motion vector is obtained, and the corresponding pixels of the current block and the best matching block are subtracted to obtain the residual block, which is changed and quantized by DCT together with the reference frame information and the motion vector Write the compressed video stream, for subsequent frame reference, undergo inverse quantization and inverse DCT changes, and reconstruct with the best matching block to obtain the reconstructed block. Through the above s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a video steganography method, system and device based on macro block complexity, and the method specifically comprises the steps: carrying out the normal compression of a video, calculating the complexity of a reconstruction block, and determining an embedded threshold of a steganography carrier according to the counted embedded secret information length; carrying out steganography on a motion vector of a macro block according to the embedded threshold, then embedding secret information, reconstructing the macro block according to the steganography motion vector, and obtaining a steganography frame; circularly traversing the reconstructed block of a steganography frame, calculating the complexity of the reconstructed block of the steganography frame, comparing the complexity with an embedded threshold, and if the complexity is smaller than the embedded threshold, extracting the secret information from the least significant bits of a horizontal component and a vertical component of the steganography macro block motion vector; a sender carrying out steganography repeatedly to obtain a steganography video; a receiving end repeatedly extracting the received steganography video to extract the secret information. According to the method, the local optimality of the motion vector can be obviously maintained, and it is indicated through analysis that the local optimality of the motion vector is easier to maintain when the smooth macro block is subjected to motion vector modification.

Description

technical field [0001] The invention belongs to the technical field of image information hiding, and in particular relates to a video steganography method, system and device based on macroblock complexity. Background technique [0002] The video steganography algorithm based on the motion vector has been extensively studied. The idea of ​​using the motion vector as the steganographic carrier was proposed by Kutter et al. A video watermarking method was implemented by directly modifying the motion vector. In 2006, Xu et al. embed information by embedding information in the least significant bits of motion vector components with larger magnitudes. Aly found through research that the selection strategy based on the magnitude of the motion vector cannot guarantee smaller distortion, so a selection strategy directly related to the macroblock prediction error is designed, and the motion vector of the macroblock with a higher prediction error is selected and Information embedding ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04N19/467H04N19/176H04N19/14H04N19/51H04N19/567
CPCH04N19/467H04N19/176H04N19/14H04N19/51H04N19/567
Inventor 唐洪琼张英男杨晓元
Owner ENG UNIV OF THE CHINESE PEOPLES ARMED POLICE FORCE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products