Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Video steganography method, system and device based on macroblock complexity

A video steganography and complexity technology, applied in the field of image information hiding, can solve the problems of bit growth, algorithm security discount, residual error increase, etc., achieve simple algorithm information extraction, maintain local optimality, and control bit rate The effect of growth

Active Publication Date: 2022-04-01
ENG UNIV OF THE CHINESE PEOPLES ARMED POLICE FORCE
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In order to ensure the local optimality of motion vectors, Zhang et al. proposed a local optimality preservation algorithm in 2015, which uses candidate motion vectors that simultaneously satisfy local optimality and are opposite to the parity of the optimal motion vector as the post-steganographic motion vector, since the replaced motion vector may not satisfy the global optimum within the search range, the increase in the residual error will lead to a significant increase in bit
[0003] Chinese patent CN 105704489 A measures the complexity of macroblocks, but it cannot completely describe the difference between adjacent pixels of the reconstruction block. In addition, there are certain defects in the selection method of the threshold, which may lead to incomplete embedding of secret information
[0004] In the existing steganographic algorithm based on motion vector, modifying the motion vector may cause the reconstructed block to not satisfy the local optimality at the decoding end, thus being detected by the steganalysis method based on local optimality hiding, thus exposing the concealed communication fact The security of the algorithm will be greatly reduced, so how to select the appropriate motion vector for information embedding and ensure that the reconstruction block can still maintain the local optimality of the motion vector at the decoding end has a great impact on the security of the steganography algorithm. plays a vital role

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Video steganography method, system and device based on macroblock complexity
  • Video steganography method, system and device based on macroblock complexity
  • Video steganography method, system and device based on macroblock complexity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035]The present invention will be described in detail below in conjunction with the accompanying drawings.

[0036] like figure 1 As shown, it is a flow chart of video inter-frame compression. The video is divided into macroblocks of the same size, and then each macroblock is traversed. The encoder will search for the best match of the current block in the reference frame and According to the relative relationship between the position of the current block and the position of the best matching block, the motion vector is obtained, and the corresponding pixels of the current block and the best matching block are subtracted to obtain the residual block, which is changed and quantized by DCT together with the reference frame information and the motion vector Write the compressed video stream, for subsequent frame reference, undergo inverse quantization and inverse DCT changes, and reconstruct with the best matching block to obtain the reconstructed block. Through the above step...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a video steganography method, system and device based on the complexity of macroblocks. The method is specifically to perform normal compression on the video, calculate the complexity of the reconstructed block, and determine the embedding threshold of the steganographic carrier based on the statistical length of embedded secret information. ;According to the embedding threshold, the macroblock motion vector is steganographically, and then the secret information is embedded, and the macroblock is reconstructed according to the steganographic motion vector to obtain the steganographic frame; the reconstruction block of the steganographic frame is looped through, and the reconstruction of the steganographic frame is calculated The complexity of the block is compared with the embedding threshold. If it is less than the embedding threshold, the secret information is extracted from the least significant bit of the horizontal component and the vertical component of the steganography macroblock motion vector; the sender repeats the steganography to obtain the steganography video; the receiver Secret information can be extracted by repeatedly extracting the steganography video received by the terminal. The invention can obviously maintain the local optimality of the motion vector, and it is pointed out through analysis that it is easier to maintain the local optimality by modifying the motion vector of a smooth macroblock.

Description

technical field [0001] The invention belongs to the technical field of image information hiding, and in particular relates to a video steganography method, system and device based on macroblock complexity. Background technique [0002] The video steganography algorithm based on the motion vector has been extensively studied. The idea of ​​using the motion vector as the steganographic carrier was proposed by Kutter et al. A video watermarking method was implemented by directly modifying the motion vector. In 2006, Xu et al. embed information by embedding information in the least significant bits of motion vector components with larger magnitudes. Aly found through research that the selection strategy based on the magnitude of the motion vector cannot guarantee smaller distortion, so a selection strategy directly related to the macroblock prediction error is designed, and the motion vector of the macroblock with a higher prediction error is selected and Information embedding ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04N19/467H04N19/176H04N19/14H04N19/51H04N19/567
CPCH04N19/467H04N19/176H04N19/14H04N19/51H04N19/567
Inventor 唐洪琼张英男杨晓元
Owner ENG UNIV OF THE CHINESE PEOPLES ARMED POLICE FORCE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products