Export file:

Format

  • RIS(for EndNote,Reference Manager,ProCite)
  • BibTex
  • Text

Content

  • Citation Only
  • Citation and Abstract

Data-Loss resilience video steganography using frame reference and data ensemble reconstruction

1 College of Computer Science and Technology, Shanghai University of Electric Power, Shanghai, P.R.China
2 School of Information and Computer, Shanghai Business School, Shanghai, P.R.China
3 School of Communication and Information Engineering, Shanghai University, Shanghai, P.R.China

Special Issues: Security and Privacy Protection for Multimedia Information Processing and communication

In this paper, we propose a robust video steganographic method, which can efficiently hide confidential messages in video sequences, and ensure that these messages are perfectly reconstructed by recipient. To apply proposed scheme to video sequences, we must be faced with two nontrivial problems: (a) how to effectively minimize the total steganographic distortion for each video frame? (b) how to recover the hidden messages if some frames are lost or damaged? We tackle the first question by designing a new distortion function, which employs two continuous adjacent frames with the same scene as side-information. The second question is addressed by data sharing. In this mechanism, the original data is expanded and split into multiple shares by using multi-ary Vandermonde matrix. Since these shares contain a lot of data redundancy, the recipient can recover the hidden data even if some frames are damaged or lost during delivery. Extensive experiments show that proposed scheme outperforms the state-of-the-arts in terms of robustness and diverse attacks.
  Figure/Table
  Supplementary
  Article Metrics

Keywords Information hiding; video steganography; side-information; data reconstruction; robustness

Citation: Fengyong Li, Jiang Yu, Yanli Ren. Data-Loss resilience video steganography using frame reference and data ensemble reconstruction. Mathematical Biosciences and Engineering, 2019, 16(5): 4559-4580. doi: 10.3934/mbe.2019228

References

  • 1. J. Mielikainen, LSB matching revisited, IEEE. SPL., 13(2006), 285–287.
  • 2. F. Li, X. Zhang, J. Yu, et al., Adaptive JPEG steganography with new distortion function, Ann. Telecommun., 69(2014), 431–440.
  • 3. V. Holub, J. Fridrich and T. Denemark, Universal distortion function for steganography in an arbitrary domain, EURASIP JIS., Special Issue on Revised Selected Papers of the 1st ACM IH and MMS Workshop, (2014), 2014:1.
  • 4. T. Pevný, T. Filler and P. Bas, Using high-dimensional image models to perform highly unde- tectable steganography, Proc. IH2010, Calgary, AB, Canada, June 28–30, 6387(2010), 161–177.
  • 5. F. Li, X. Zhang, H. Cheng, et al., Digital image steganalysis based on local textural features and double dimensionality reduction, SCN, 9(2016), 729–736.
  • 6. B. Chen, G. Feng, X. Zhang, et al., Mixing high-dimensional features for JPEG steganalysis with ensemble classifier, SIVP, 8(2014), 1475–1482.
  • 7. X. Song, F. Liu, C. Yang, et al., Steganalysis of adaptive JPEG steganography using 2D Gabor filters, Proc. IH&MMSec2015 , Portland, OR, USA, June 17-19, (2015), 15–23.
  • 8. F. Li, X. Zhang, B. Chen, et al., JPEG steganalysis with high- dimensional features and Bayesian ensemble classifier, IEEE SPL, 20(2013), 233–236.
  • 9. Z. Zhao, Q. Guan, X. Zhao, et al., Universal embedding strategy for batch adaptive steganography in both spatial and JPEG domain, MTAP, 77(2018), 14093–14113.
  • 10. R. Cogranne, V. Sedighi and J. Fridrich, Practical strategies for content-adaptive batch steganogra- phy and pooled steganalysis, Proc. ICASSP2017, New Orleans, USA, March 5–9, (2017), 2122– 2126.
  • 11. F. Li, K. Wu, X. Zhang, et al., Robust batch steganography in social networks with non-uniform payload and data decomposition, IEEE Access, 6(2018), 29912–29925.
  • 12. E. Franz, Embedding considering dependencies between pixels, Proc. SPIE, Electron. Imag., Se-cur., Forens., Steg., and Watermark. of Multimedia Contents X, 6819(2008), D 1–12.
  • 13. T. Denemark and J. Fridrich, Steganography with multiple JPEG images of the same scene, IEEE TIFS, 12(2017), 2308–2319.
  • 14. P. Chang, K. Chung, J. Chen, et al., A DCT/DST-based error propagation-free data hiding algo-rithm for HEVC intra-coded frames, JVCIR, 25(2014), 239–253.
  • 15. Y. Liu, Z. Li, X. Ma, et al., A robust data hiding algorithm for H.264/AVC video streams. J. Sys. Sof., 86(2013), 2174–2183.
  • 16. R. Mstafa, K. Elleithy and E. Abdelfattah, A robust and secure video steganography method in DWT-DCT domains based on multiple object tracking and ECC, IEEE Access, 5(2017), 5354–5367.
  • 17. H. Aly, Data hiding in motion vectors of compressed video based on their associated prediction error, IEEE TIFS, 6(2011), 14–18.
  • 18. H. Zhang, Y. Cao and X. Zhao, Motion vector-based video steganography with preserved local optimality, MTAP, 75(2016), 13503–13519.
  • 19. H. Zhang, Y. Cao, X. Zhao, et al., Video steganography with perturbed macroblock partition, Proc. IH&MMSec2014, Salzburg, Austria, Jun. 11–13, (2014), 115–122.
  • 20. I. Cox, J. Kilian, F. Leighton, et al., Secure spread spectrum watermarking for multimedia, IEEE TIP, 6(1997), 1673–1687.
  • 21. V. Neagoe, Inversion of the Van der Monde matrix, IEEE SPL, 3(1996), 119–120.
  • 22. YUV Video Sequences, Available from: http://trace.eas.asu.edu/yuv/index.html, [Accessed on 2018].
  • 23. J. Kodovský, J. Fridrich and V. Holub, Ensemble classifier for steganalysis of digital media, IEEE TIFS, 7(2012), 432–444.
  • 24. M. Dalal and M. Juneja, A robust and imperceptible steganography technique for SD and HD videos, MTAP, 2018, to appear. https://doi.org/10.1007/s11042-018-6093-3.
  • 25. A. Ker and T. Pevný, A new paradigm for steganalysis via clustering, Proc. SPIE, Media Water-mark., Secur., Forens. III, 7880(2011), 78800U.
  • 26. A. Ker and T. Pevný, The steganographer is the outlier: realistic large-scale steganalysis, IEEE TIFS, 9(2014), 1424–1435.
  • 27. F. Li, K. Wu, J. Lei, et al., Steganalysis over large-scale social networks with high-order joint features and clustering ensembles, IEEE TIFS, 11(2016), 344–357.

 

Reader Comments

your name: *   your email: *  

© 2019 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution Licese (http://creativecommons.org/licenses/by/4.0)

Download full text in PDF

Export Citation

Copyright © AIMS Press All Rights Reserved