Unlock instant, AI-driven research and patent intelligence for your innovation.

Method, system and device for modifying video steganography by combining trailing coefficient of N-dimensional cubic coding

A technology of video steganography and coefficients, which is applied in digital video signal modification, electrical components, image communication, etc. It can solve the problems of unfavorable video carrier rapid transmission, large modification rate, and bit rate increase, achieving high invisibility and low The effect of low modification rate and bit rate

Inactive Publication Date: 2020-11-10
ENG UNIV OF THE CHINESE PEOPLES ARMED POLICE FORCE
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Someone also proposed a steganography algorithm based on tree structure motion compensation in inter-frame prediction mode, which increases the embedding capacity of the algorithm by forcing an additional prediction frame and using it as the reference frame of the current frame, but at the same time causes the overall video carrier The large increase in capacity is not conducive to real-time network transmission, and at the same time, the modification rate of the carrier is relatively large
[0008] There is also a new video steganography algorithm based on motion vectors. By introducing appropriate embedding rules, it can better maintain the carrier characteristics in the embedding process and increase the embedding efficiency at the same time, but the bit rate of the code stream after steganography increases greatly. Not conducive to network transmission
[0009] To sum up, whether using special motion vectors, inter-frame prediction, intra-frame prediction or DCT coefficients in the video, when modifying them, there will be a large modification rate or a large increase in the bit rate, which is not conducive to embedding Fast transfer of post-video carriers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, system and device for modifying video steganography by combining trailing coefficient of N-dimensional cubic coding
  • Method, system and device for modifying video steganography by combining trailing coefficient of N-dimensional cubic coding
  • Method, system and device for modifying video steganography by combining trailing coefficient of N-dimensional cubic coding

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] The present invention will be described in detail below in conjunction with the accompanying drawings.

[0061] First, calculate the N-dimensional cubic eigenvalues ​​of the smearing coefficients that are set and screened, and modify them according to the set embedding mechanism. During blind extraction, you only need to obtain the smearing coefficients of the embedded blocks, and recalculate their N-dimensional cubic encoding eigenvalues. At this time, converting the obtained value into binary is the embedded secret information.

[0062] Trailing coefficient

[0063] The smearing coefficients are generated during the CAVLC encoding process. Refers to the coefficients with an amplitude of 1 that appear consecutively at the end of the block. The standard stipulates that the number of trailing coefficients ranges from 0 to 3. When the number of coefficients satisfying this condition is greater than 3, only the last three trailing coefficients are selected, and the other...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method, a system and a device for modifying video steganography by combining a trailing coefficient of N-dimensional cubic coding, and the method comprises the steps: firstlycalculating an N-dimensional cubic feature value of a specifically screened trailing coefficient, carrying out the modification according to a specific embedding mechanism, just obtaining the trailing coefficient of an embedded block during blind extraction, and recalculating the N-dimensional cubic coding feature value of the embedded block; at the moment, converting the obtained numerical valueinto a binary system, namely embedded secret information, calculating an N-dimensional cubic characteristic value of a trailing coefficient by combining the trailing coefficient with a good embeddingcharacteristic in a video carrier, selecting a specific embedding mechanism for modification, only the trailing coefficient of an embedded block needs to be obtained during extraction, and recalculating the N-dimensional cubic code of the embedded block, at the moment, the obtained numerical value is converted into a binary system which is the embedded secret information, the invisibility is high, the modification rate is low, and meanwhile bit rate increase is small.

Description

technical field [0001] The invention belongs to the field of video information steganography, and in particular relates to a method, system and device for modifying video steganography in combination with trailing coefficients of N-dimensional cubic coding. Background technique [0002] With the rapid development of the network, people's life has become more convenient, but the security problems that follow follow one after another. As an important branch of information security, steganography plays an important role in protecting the transmission security of secret information. [0003] With the advent of the 5G era, people are more willing to share what they see and feel in the form of video, so there are a lot of multimedia files filled with video carriers on the Internet. Steganography technology is to store secret information on an open channel and transmit it in an open way, so it is of great practical significance to study the steganography algorithm with video as th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04N19/467H04N19/625H04N19/91H04N19/154
CPCH04N19/467H04N19/625H04N19/91H04N19/154
Inventor 张英男郭朝江孙捐利刘佳石林
Owner ENG UNIV OF THE CHINESE PEOPLES ARMED POLICE FORCE