CN104853215B - The video steganography method kept based on motion vector local optimality - Google Patents

The video steganography method kept based on motion vector local optimality Download PDF

Info

Publication number
CN104853215B
CN104853215B CN201510184721.7A CN201510184721A CN104853215B CN 104853215 B CN104853215 B CN 104853215B CN 201510184721 A CN201510184721 A CN 201510184721A CN 104853215 B CN104853215 B CN 104853215B
Authority
CN
China
Prior art keywords
motion vector
steganography
secret information
vector
video
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201510184721.7A
Other languages
Chinese (zh)
Other versions
CN104853215A (en
Inventor
张弘
曹纭
赵险峰
于海波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Institute of Information Engineering of CAS
Original Assignee
Institute of Information Engineering of CAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Institute of Information Engineering of CAS filed Critical Institute of Information Engineering of CAS
Priority to CN201510184721.7A priority Critical patent/CN104853215B/en
Publication of CN104853215A publication Critical patent/CN104853215A/en
Application granted granted Critical
Publication of CN104853215B publication Critical patent/CN104853215B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The present invention relates to a kind of video steganography methods kept based on motion vector local optimality.This method establishes a kind of criterion of motion vector local optimality and the searching algorithm of optimal candidate motion vector, herein on basis, cost computation model and preferably efficient steganography code are disturbed by constructing reasonable motion vector, to establish private communication channel to complete the insertion of the steganography of secret information, and then complete the extraction process of secret information.This method preferably uses STC steganography code.This method is a kind of based on the holding of motion vector local optimality, the motion vector field video steganography method for possessing higher Embedding efficiency and capable of being effective against existing steganalysis attack, especially suitable for the higher covert communications scene of security requirement.

Description

The video steganography method kept based on motion vector local optimality
Technical field
The present invention relates to a kind of video steganography (Video Steganography) methods, and in particular to one kind is based on movement The highly concealed type video steganography method and its application in covert communications, this method that vector local optimality is kept belong to information Information hiding subdomains in security technology area.
Background technique
Present information concealing technology mainly include steganography (Steganography), steganalysis (Steganalysis) with And digital watermarking (Digital Watermarking).How steganography is mainly studied by secret information embedded images, video, audio Equal digital multimedia documents are to achieve the purpose that covert communications;Steganalysis mainly uses the methods of machine learning, pattern-recognition Steganography classification judgement is carried out to file to be measured.
Under normal circumstances, the design needs of steganographic algorithm comprehensively consider and weigh following several respects element:
1) not sentience: carrier before and after the steganography undistinguishable for human body can not only rely on the mankind Audio visual judge whether file to be measured passes through steganography;
2) robustness: steganography file bear a degree of noise jamming and multi-media processing (if compressed, cut out, Size change over etc.) after, it still is able to the secret information for accurately restoring wherein to be embedded into;
3) embedding capacity: under the premise of guaranteeing not sentience and robustness to a certain degree, as much as possible to carrier Middle insertion secret information;
4) Embedding efficiency: under the premise of embedding information amount is certain, the modification number or degree to carrier are reduced as far as possible;
5) safety: even if possessing the priori knowledge about steganographic algorithm, existing steganalysis method also can not be with foot Enough high probability distinguish general carrier and the file Jing Guo the algorithm steganography.
With making rapid progress for Internet technology, the booming and height of the tertiary industry such as video on demand, video calling Effect video encoding standard is weeded out the old and bring forth the new, and video relies on its visual performance abundant and powerful information propagation capabilities, just gradually Replace image, becomes current most popular communication media and more suitable steganography carrier, therefore, video steganography also results in The extensive concern of this field scholar.
Video steganography can generally be divided into airspace (Spatial Domain) video steganography and compression domain (Compressed Domain) video steganography: the former is by modifying the original pixel value of video frame directly to be embedded in secret information;The latter is then in video Cataloged procedure in introduce steganography disturbance so that compressed encoding and steganography insertion can carry out simultaneously.Compressed domain video steganography root According to the difference of embedded domain, can be divided into based on motion vector (Motion Vector, MV) video steganography (bibliography: C.Xu,X.Ping,and T.Zhang.Steganography in compressed video stream.In Proc.1st Int.Conf.Innov.Comput.,Inf.Control,vol.1:269–272,2006.;H.Aly.Data hiding in motion vectors of compressed video based on their associated prediction error.IEEE Transactions on Information Forensics and Security,vol.6(1):14–18, 2006.;Y.Cao,X.Zhao,D.Feng,and R.Sheng.Video steganography with perturbed motion estimation.In Proc.13th Int.Conf.IH,vol.6958:193–207,2011.;Y.Yao, W.Zhang,N.Yu,and X.Zhao.Defining embedding distortion for motion vector-based video steganography.Multimedia Tools and Applications,Article in Press,2014, DOI:10.1007/s11042-014-2223-8.), the video based on transformation coefficient (Transform Coefficient) is hidden It writes, the video steganography based on intra prediction mode (Intra Prediction Mode), be based on inter-frame forecast mode (Inter Prediction Mode) video steganography and be based on this several class of the video steganography of entropy coding (Entropy Coding).
By patent consulting, existing related application situation is as follows in the field of the present invention:
(1) " video based on the disturbance of macro block division mode is hidden for the Chinese patent that number of patent application is 201410233838.5 Write method " discloses one kind based on H.264/AVC video encoding standard, and by modification macro block division mode to be embedded in secret letter The video steganography method of breath.The patented method in telescopiny preferred steganography code STC (Syndrome Trellis Code, Verify grid code) and WPC (Wet Paper Code, l Water Paper coding) double-deck private communication channel of building, to effectively increase insertion Capacity and Embedding efficiency.The patented method belongs to the video steganography based on inter-frame forecast mode, is not directed to motion vector Disturbance modification, therefore, the patent application and general object of the present invention, mentality of designing and specific implementation are significantly different.
(2) Chinese patent " a kind of video steganography side based on motion vector that number of patent application is 201310275143.9 Method " discloses a kind of video steganography method based on motion vector.The patented method carry out secret information steganography insertion when, Current video sequence is encoded first, obtains the motion vector that wherein all P frames include, and count respectively according to preset distortion function The steganography insertion cost of resulting each horizontal motion vector and vertical component is calculated, then all horizontal components are formed using STC Carrier carry out insertion disturbance, and cost is embedded according to the steganography that steganography result adjusts vertical component, then uses STC pairs again The carrier of all vertical component compositions carries out insertion disturbance, and then recompiles this according to the steganography result of horizontal and vertical component Video sequence obtains final steganography video file.Distortion function defined in the patented method has comprehensively considered motion vector Airspace, the residual error that generates of relativity of time domain and estimation, enable the motion vector modified as to keep adjacent as possible Domain statistical property, while reducing steganography and disturbing the influence generated to video coding performance (code rate, fidelity), therefore, the patent Method can be effective against motion vector field steganalysis feature MVRB and ADB_MV (bibliography: Y.Cao, X.Zhao, and D.Feng.Video steganalysis exploiting motion vector reversion-based features.IEEE Signal Processing Letters,vol.19(1):35-38,2012.;Y.Su,C.Zhang, and C.Zhang.A video steganalytic algorithm against motion-vector-based steganography.Signal Processing,vol.91(8):1901-1909,2011.).However, due to the patent side Method is still traditional " carry out adding one to a certain component of motion vector or subtract one " to the modification mode of motion vector, i.e., (mv'x,mv'y)∈{(mvx+1,mvy),(mvx-1,mvy),(mvx,mvy+1),(mvx,mvy- 1) } (wherein (mvx,mvy) and (mv'x,mv'y) respectively indicate the original and process modified motion vector of steganography), it is therefore possible to destroy the office of motion vector Portion's optimality (Local Optimality), therefore can not resist the most effective steganalysis feature AoSO's in current motion vector domain Attack (bibliography: K.Wang, H.Zhao, and H.Wang.Video Steganalysis Against Motion Vector-Based Steganography by Adding or Subtracting One Motion Vector Value.IEEE Transactions on Information Forensics and Security,vol.9(5):741- 751,2014.).As a comparison, the angle that the present invention is kept from motion vector local optimality devises completely new reasonable It is embedded in cost function and motion vector perturbation scheme, the attack of AoSO can be effective against, be a kind of highly concealed type communication party Method, therefore, the patent application and general object of the present invention, mentality of designing and implementation are significantly different.
Summary of the invention
The object of the present invention is to provide one kind to be kept based on motion vector local optimality, possess higher Embedding efficiency And the motion vector field video steganography method of existing steganalysis attack can be effective against.
The present invention compares other motion vector field video steganography methods, establishes a kind of sentencing for motion vector local optimality The searching algorithm of calibration standard and optimal candidate motion vector (Best Candidate MV) passes through building herein on basis Reasonable motion vector disturbance cost computation model and preferably efficient steganography code, to establish private communication channel to complete secret letter The steganography of breath is embedded in.As it can be seen that method proposed by the present invention is different from previous any video steganography method, especially suitable for safety The more demanding covert communications scene of property.
According to investigation, overwhelming majority motion vector field video steganography method does not use steganography code to improve insertion effect at present Rate and safety, moreover, all motion vector field video steganography methods can not resist AoSO's (referring to background technique) Attack.Against the above deficiency and disadvantage, improvement of the invention are as follows: firstly, it is preferred that and apply suitable steganography code, not only mention High Embedding efficiency and safety, also effectively reduce steganography disturbance influence caused by video coding performance;Secondly, abandoning Traditional motion vector modifies mode, influence of the steganography operation to safety and video coding performance is comprehensively considered, by reasonable Efficient searching algorithm filters out most suitable local optimum motion vector as final modification as a result, so as to be effective against The attack of the motion vector fields steganalysis method such as AoSO.
Specifically, The technical solution adopted by the invention is as follows:
A kind of video steganography method kept based on motion vector local optimality, wherein the telescopiny packet of secret information Include following steps:
1) it pre-processes: in current video frame, to each motion vector (mvx,mvy), calculate LSB (mvx+mvy) obtain two System number 0 or 1, and write all calculated results as vector x, wherein LSB () expression takes lowest bit position (Least Significant Bit) operation, mvxAnd mvyRespectively indicate the horizontal and vertical component of motion vector;
2) construct private communication channel: regarding gained vector x in step 1) as the carrier of private communication channel, according to preferred steganography code Working principle, the parameter appointed in advance according to communicating pair generates parity check matrix H, and combines preset motion vector Disturbance cost computation model is ultimately constructed to be gone out to meet the x' of Hx'=m, and wherein m indicates secret letter to be embedded in the private communication channel Breath, x' indicate modified carrier vector;
3) it can determine in current video frame there is which motion vector to need to modify according to step 2);
4) current video frame is encoded according to result obtained as above, and according to preset optimal candidate motion vector sought algorithm Each motion vector to be modified is substituted for corresponding optimal candidate motion vector respectively, and then is completed to the secret of private communication channel Confidential information insertion;
5) according to the frame coded sequence of video file, step 1) is repeated to 4) until secret information is complete to remaining every frame Portion's insertion finishes, and obtains final steganography video file.
Further, the above method further includes the extraction process of secret information, comprising the following steps:
1) current video frame is decoded, to each motion vector (mvx,mvy), calculate LSB (mvx+mvy) obtain binary number 0 Or 1, and write all calculated results as vector x, wherein LSB () expression takes lowest bit bit manipulation;
2) according to preferred steganography code working principle, generate even-odd check according to the parameter that communicating pair is appointed in advance Matrix H, calculates Hx, and acquired results are the secret information bit extracted;
3) according to the frame decoding sequence of video file, step 1) is repeated to 2) until secret information is complete to remaining every frame It extracts and finishes in portion.
On the basis of above scheme, the present invention is further improved, i.e., has carried out preferably to the steganography code of use.Embedding Enter the private communication channel established in process (Fig. 1), using steganography code Syndrome Trellis Code (STC verifies grid code) into The insertion of row secret information extracts secret information from the private communication channel according to the working principle of STC in extraction process (Fig. 2). About being summarized as follows for STC:
If x=(x1,x2,…,xn)TFor original binary carrier vector;X'=(x'1,x'2,…,x'n)TFor by steganography Carrier vector after insertion;It the real vector that is positive and indicates the element x in xiIt is modified as 1-xi Cost value;H is parity matrix;M is secret information vector.Then STC can construct the x' for meeting Hx'=m, and make It is minimum to obtain steganography insertion cost, wherein function δ meets
It, can by estimation (Motion Estimation) in the Inter prediction module (Fig. 3) of video compression coding To obtain the corresponding motion vector of original block (Original Block), it is directed toward the best prediction block in reference frame (Prediction Block).The residual block (Residual Block) then obtained is by converting (Transformation) After quantization (Quantization) operation, result not only needs to carry out entropy coding (Entropy) and obtains binary code stream, also It needs to obtain reconstructive residual error block by inverse quantization (Rescale) and inverse transformation (Inverse Transformation) operation (Reconstructed Residual Block), and finally obtain the corresponding reconstructed block (Reconstructed of original block Block).Since quantization operation is that information detracts irreversible process, reconstructed block and original block be not identical, the phase of the two It is determined like degree by motion-estimation precision and quantization operation step-length collective effect.
When video encoder carries out estimation to original block to be encoded, usually using rate-distortion optimization (Rate Distortion Optimization, RDO) compromise between model choosing comprehensively code rate and the distortion factor, in motion vector sought Selection possesses the minimum i.e. J of RDO functional value in rangemvThe motion vector of=D+ λ R as the corresponding optimal movement of this block to be encoded to Amount, wherein D indicates the distortion factor between the prediction block that motion vector is directed toward and original block, needed for R presentation code motion vector Bit number, λ indicate the parameter between adjusting D and R, and the λ the big, more tend to the distortion of low bit- rate height, smaller, more tend to high code Rate low distortion.
Based on the brief introduction above to inter prediction encoding overall flow and estimation, now to movement proposed by the present invention The criterion of vector local optimality, motion vector disturbance cost computation model and optimal candidate motion vector sought algorithm are done As described in detail below.
[1] a kind of criterion of motion vector local optimality:
For motion vector MV0,0=(mvx,mvy), if its prediction block being directed toward is Pred (MV0,0), by inter-prediction Encoding obtained reconstructed block is Rec (MV0,0).Calculating matrix Pred (MV0,0) and Rec (MV0,0) between absolute error and (Sum Of Absolute Difference, SAD), i.e. sad0,0=SAD (Rec (MV0,0),Pred(MV0,0)).Similarly, for MV0,0 8 adjacent motion vector MV of surroundingi,j=(mvx+i,mvy+ j) (- 1≤i, j≤1) (Fig. 4), respectively obtain the pre- of their directions Survey block Pred (MVi,j), and calculate sadi,j=SAD (Rec (MV0,0),Pred(MVi,j)).If sadi,jIn (- 1≤i, j≤1) Minimum value is sad0,0, then claim motion vector MV0,0Has local optimality.
Note:Wherein, Mi,jAnd Ni,jPositioned at (i, j) in respectively matrix M and N Element;
[2] a kind of computation model of motion vector disturbance cost:
To motion vector MV0,0=(mvx,mvy) both horizontally and vertically upper 4 adjacent motion vector, that is, MV-1,0= (mvx-1,mvy)、MV1,0=(mvx+1,mvy)、MV0,-1=(mvx,mvy- 1) and MV0,1=(mvx,mvy+ 1) (Fig. 4) carries out part Optimal sex determination, if thering is N (0≤N≤4) a motion vector to have local optimality in them, to motion vector MV0,0It carries out The disturbance cost of steganography insertion are as follows:
Wherein, Ω={ MV-1,0,MV1,0,MV0,-1,MV0,1, i.e., the disturbance cost of motion vector depends on its contiguous range The quantity of interior local optimum motion vector and the variation degree of RDO functional value;
[3] a kind of searching algorithm of optimal candidate motion vector:
If according to steganography insertion as a result, it is desirable to motion vector MV0,0=(mvx,mvy) modify, then it successively executes Following steps select most suitable local optimum motion vector as final modification result from all candidate motion vectors:
A) respectively to MV0,0Four motion vector MV in contiguous range-1,0=(mvx-1,mvy)、MV1,0=(mvx+1, mvy)、MV0,-1=(mvx,mvy- 1) and MV0,1=(mvx,mvy+ 1) local optimum sex determination is carried out;
B) by MV-1,0, MV1,0, MV0,-1And MV0,1In local optimum motion vector composition candidate motion vector set close Ψ, If Ψ non-empty, go to step e), otherwise continues to execute step c);
C) region of search of a motion vector, size (the candidate motion vector quantity for including) and final search delimited Time is directly proportional, it should be chosen according to practical computing resource or ability, in addition, for any Candidate Motion in the region Vector M V'=(mvx',mvy'), it is necessary to meet LSB (mvx+mvy)≠LSB(mvx'+mvy');
D) for each candidate motion vector in the region of search, local optimum sex determination is carried out respectively, is determined wherein The motion vector of all local optimums, and by their composite set Ψ;
E) for each local optimum motion vector in Ψ, its RDO functional value is calculated, selection possesses minimum RDO function The local optimum motion vector of value is as final modification result.
Based on content described above, being protected based on motion vector local optimality using steganography code STC proposed by the present invention The video steganography method held, wherein the telescopiny of secret information include the following steps (unless otherwise specified, following steps by Computer executes):
1) in current video frame, by each motion vector (mvx,mvy) horizontal and vertical component summation after take minimum ratio Special position, i.e. LSB (mvx+mvy), binary number 0 or 1 is obtained, and all calculated results are formed into binary system carrier vector x;
2) in current video frame, for each motion vector MV, cost is disturbed according to preset motion vector and calculates mould Its steganography disturbance cost Cost (MV) is calculated in type, and all calculated results are formed vector Γ;
3) private communication channel is constructed: according to the working principle of steganography code STC, first according to the preassigned load factor of communicating pair α and parameter matrix Η constructs parity matrix ΗSTC, reconstruct out and meet ΗSTCX'=m and make steganography be embedded in generation Valence D (x, x', Γ) reaches the smallest x', wherein m indicates that secret information to be embedded in private communication channel, x' are indicated by hidden The carrier vector modified after the insertion of channel steganography;If the binary number on x and x' corresponding position is not identical, then it represents that corresponding Original motion vector needs to modify, and then indicates not needing to modify if they are the same;
4) according to the modification of carrier vector in private communication channel as a result, for each motion vector for needing to modify, according to pre- If optimal candidate motion vector sought algorithm be substituted for the smallest local optimum fortune of RDO functional value in candidate motion vector Moving vector;
5) current video frame is encoded according to result obtained as above to complete the steganography of secret information and be embedded in;
6) according to the frame coded sequence of video file, step 1) is repeated to 5) until secret information is complete to remaining every frame Portion's insertion finishes, and obtains final steganography video file.
Further, included the following steps (unless otherwise specified, using the extraction process of the secret information of steganography code STC Following steps are executed by computer):
1) current video frame is decoded, to each motion vector (mvx,mvy) calculate LSB (mvx+mvy) obtain binary number 0 Or 1, and write all calculated results as binary vector x;
2) secret information in private communication channel is extracted: preassigned negative according to communicating pair according to the working principle of STC Load rate α and parameter matrixConstruct parity matrix ΗSTC, calculate ΗSTCX, acquired results are the secret information extracted Bit;
3) according to the frame decoding sequence of video file, step 1) is repeated to 2) until secret information is complete to remaining every frame It extracts and finishes in portion.
Video steganography method of the invention has the beneficial effect that correlative technology field:
1) Embedding efficiency is high, and steganography disturbance is small.Current almost all of motion vector field video steganography method is not all embedding It uses steganography code to improve Embedding efficiency during entering, thus steganography operation can not be effectively reduced to video coding performance etc. Caused by disturb so that the compression efficiency of video and fidelity become negatively affected;In contrast, the preferred steganography code of the present invention STC, so as to complete the steganography insertion of secret information with higher Embedding efficiency, in other words, in the identical condition of load factor Under, the present invention will be far fewer than other motion vector field video steganography methods, so as to effective to the modification number of carrier video Steganography is reduced to disturb and keep the coding efficiency of video.
2) it can be effective against steganalysis, have higher-security.Firstly, present invention employs steganography code STC raisings Embedding efficiency, reduces the modification number and degree to carrier video, to effectively reduce steganography operation to Video coding It is disturbed caused by performance etc., so that steganography video and the original video undistinguishable in visual perception;Secondly, the present invention is got rid of Traditional motion vector modification mode has been abandoned, has used preset optimal candidate motion vector sought algorithm to protect in telescopiny Card is by the local optimality of modification motion vector, so as to be effective against the most powerful steganalysis spy in current motion vector domain Levy the attack of AoSO.Therefore, the present invention compares other motion vector field video steganography methods, possesses higher steganography safety.
3) customized motion vector disturbs cost computation model.The present invention is by modification motion vector to carry out secret The steganography of information is embedded in, it is therefore desirable to carry out effective evaluation to the disturbance cost of motion vector.Different evaluation mechanism may be led It causes different steganography to be embedded in effect and the safety of steganographic algorithm is had an impact.The present invention is adjacent by calculating current motion vector The variation degree of the quantity of local optimum motion vector and RDO functional value is within the scope of domain to evaluate disturbance generation of this motion vector Valence, steganography insertion when preferentially modify in contiguous range there are more local optimum motion vectors and RDO functional value variation it is smaller Those of motion vector.As it can be seen that can to guarantee that video coding performance does not generate as far as possible in steganography telescopiny larger by the present invention It disturbs and motion vector to be modified can preferentially be changed to the local optimum motion vector (if present) in its contiguous range To shorten steganography time-consuming.In addition to this, for different application scenarios, the present invention can customize different motion vector disturbance generations Valence computation model, therefore possess higher flexibility.
It 4) can be by adjusting region of search size to compromise between steganographic algorithm performance and insertion time-consuming.In this hair In bright preset optimal candidate motion vector sought algorithm, transported when local optimum is not present in motion vector contiguous range to be modified When moving vector, a region of search can be delimited and exhaustive search wherein goes out the smallest local optimum motion vector of RDO functional value As final modification result.Under normal circumstances, the area of region of search is bigger, i.e. the quantity of candidate motion vector is more, finally Obtained best local optimum motion vector is more ideal, it also requires longer search is time-consuming.Therefore, steganography insertion is being carried out When, demand of the current application scene to time cost and safety can be comprehensively considered, region of search size is carried out flexible Regulation is to be bonded actual compromise in time-consuming make between algorithm performance of insertion.
Detailed description of the invention
Fig. 1 is secret information insertion schematic diagram of the invention;
Fig. 2 is that secret information of the invention extracts schematic diagram;
Fig. 3 is video interprediction encoding frame flow diagram;
Fig. 4 is motion vector (mvx,mvy) and its contiguous range in relative position schematic diagram between motion vector;
Fig. 5 is secret information insertion flow chart of the invention;
Fig. 6 is that secret information of the invention extracts flow chart.
Specific embodiment
Below by specific embodiment and in conjunction with attached drawing 5-6, the invention will be further described.
Before carrying out the insertion of secret information steganography using the present invention, the data that can be first embedded in needs are encrypted, and are obtained To random binary data stream.It is proposed by the present invention based on motion vector local optimality keep video steganography method it is secret Confidential information is embedded in process as shown in figure 5, concrete operations details is as follows:
1) video frame for needing to carry out steganography insertion is obtained, for each motion vector (mv in the framex,mvy), it obtains Lowest bit position, that is, LSB (mv of the sum of its horizontal and vertical componentx+mvy), and all calculated results are formed into binary system carrier Vector x;
2) for each motion vector MV in the video frame0,0=(mvx,mvy), generation is disturbed according to preset motion vector Valence computation model obtains its steganography insertion cost: according to preset motion vector local optimality criterion, counting MV0,0It is adjacent Four motion vector MV within the scope of domain-1,0=(mvx-1,mvy)、MV1,0=(mvx+1,mvy)、MV0,-1=(mvx,mvy- 1) and MV0,1=(mvx,mvy+ 1) have the quantity N (0≤N≤4) of the motion vector of local optimality in, and be based on rate-distortion optimization mould It includes MV that type, which calculates,0,0The RDO functional value J of five motion vectors insideMV(MV∈{MV0,0,MV-1,0,MV1,0,MV0,-1, MV0,1), and then MV is calculated0,0Steganography be embedded in cost
Wherein, Ω={ MV-1,0,MV1,0,MV0,-1,MV0,1, and just by the steganography of each motion vector insertion cost composition Real vector Γ;
3) private communication channel and the thereto secret letter of insertion are established using steganography code Syndrome Trellis Code (STC) Breath.The load factor α and parameter matrix appointed in advance according to communicating pair firstEven-odd check square needed for establishing STC Battle array ΗSTC, then using vector x obtained by step 1) as carrier needed for STC, and vector Γ obtained by step 2) is combined, using STC structure It produces and meets ΗSTCX'=m and make overall steganography insertion cost D (x, x', Γ) the smallest x', wherein m is indicated by hidden The secret information of channel insertion, x' indicates the carrier vector after steganography is embedded in, if the binary number on x and x' corresponding position Difference then illustrates that corresponding original motion vector needs to modify, on the contrary then do not need to modify;
4) according to step 3) as a result, for the motion vector MV for needing to modify each in the video frame0,0=(mvx, mvy), it modifies according to preset optimal candidate motion vector sought algorithm to it: by MV0,0Four fortune in contiguous range Moving vector MV-1,0=(mvx-1,mvy)、MV1,0=(mvx+1,mvy)、MV0,-1=(mvx,mvy- 1) and MV0,1=(mvx,mvy+1) In local optimum motion vector form set Ψ, if Ψ non-empty, the smallest local optimum of RDO functional value is selected in Ψ to move Vector is as final modification as a result, if Ψ is sky, i.e. MV-1,0,MV1,0,MV0,-1,MV0,1Do not have local optimality, then delimit One candidate motion vector region of search (its scale need according to practical computing resource and algorithm institute's allowed time at This determination) and all local optimum motion vectors in the region are formed into set Ψ, and then select RDO functional value in Ψ minimum Local optimum motion vector as final modification result.
5) video frame is encoded according to the result of step 4), that is, completes to be embedded in the secret information of private communication channel;
6) according to the frame coded sequence of video file, step 1) is repeated to 5) until secret information is complete to remaining every frame Portion's insertion finishes, and obtains final steganography video file.
The secret information of the video steganography method proposed by the present invention kept based on motion vector local optimality extracts stream Journey is as shown in fig. 6, concrete operations details is as follows:
1) video frame for needing to extract secret information is obtained, for each motion vector (mv in the framex,mvy), it obtains Lowest bit position, that is, LSB (mv of the sum of its horizontal and vertical componentx+mvy), and all calculated results are formed into binary vector x;
2) secret information in private communication channel is extracted.The load factor α and ginseng appointed in advance according to communicating pair first Matrix numberParity matrix Η needed for establishing Syndrome Trellis Code (STC)STC, reuse step 1) institute It obtains vector x and calculates ΗSTCX, calculated result are the secret information bit extracted;
3) according to the frame decoding sequence of video file, step 1) is repeated to 2) until secret information is complete to remaining every frame It extracts and finishes in portion.
It can be seen that in insertion process of the invention from the above specific embodiment, according to the needs of application scenarios, both Different motion vector disturbance cost computation models can be customized to influence execution speed, safety and the steganography of steganographic algorithm The compressed encoding performance (code rate, fidelity etc.) of video, can also adjust the region of search size of optimal candidate motion vector with Compromise between algorithm performance and insertion time-consuming, therefore the present invention has stronger adaptability and flexibility.
It is a kind of highly concealed type motion vector field video steganography method in order to which it is proposed by the present invention to protrude explanation, use is following Configuration prepares video sample collection and carries out steganalysis experiment:
1) YUV sequence: it is 300 frames that by internet, to collect to obtain 50 resolution ratio, which be CIF (352 × 288), length, YUV420 sequence.
2) video encoder: using x264 open source video encoder preparation compression video sample, in order to reduce time overhead, Setting coding class is basic class Baseline.
3) compress video parameter: bit rate (bitrate) is 0.5mb/s, 1mb/s, 3mb/s or 10mb/s, and frame per second is 30fps。
4) steganography parameter: the load factor (payload) of carrier video is 0, and the load factor of steganography video is 0.25 or 0.5.
5) prepared by carrier video sample collection: according to the above configuration instruction, 4 carriers are prepared in 50 YUV420 files Video sample collection is denoted as 0.5mb/s_0,1mb/s_0,3mb/s_0,10mb/ according to the form of " bitrate_payload " respectively s_0。
6) prepared by steganography video sample collection: according to the above configuration instruction, 8 steganography are prepared in 50 YUV420 files Video sample collection, is denoted as 0.5mb/s_0.25,0.5mb/s_0.5,1mb/s_0.25,1mb/s_0.5,3mb/s_0.25 respectively, 3mb/s_0.5,10mb/s_0.25,10mb/s_0.5.
7) steganalysis configures: extracting AoSO feature to carrier video sample collection and steganography video sample collection, is divided into 8 groups of spies Collection closes and carries out steganalysis respectively, i.e., { 0.5mb/s_0,0.5mb/s_0.25 }, { 0.5mb/s_0,0.5mb/s_0.5 }, { 1mb/s_0,1mb/s_0.25 }, { 1mb/s_0,1mb/s_0.5 }, { 3mb/s_0,3mb/s_0.25 }, { 3mb/s_0,3mb/s_ 0.5 }, { 10mb/s_0,10mb/s_0.25 }, { 10mb/s_0,10mb/s_0.5 };It is any to select for each of the above characteristic set It takes the feature of wherein 40 pairs of videos for classifier training, obtains the support vector machines based on Gaussian kernel and polynomial kernel (Support Vector Machine, SVM), the feature of remaining 10 pairs of videos repeat this process 100 for steganography classification judgement It is secondary and the data obtained is averaged.
According to the above experimental configuration, the results are shown in Table 1 for gained steganalysis, it can be seen that final average detected is just True rate is all very low (only one group of accuracy is more than 60%), and therefore, the method for the present invention can be fully against current motion vector domain The attack of most effective steganalysis feature AoSO, is a kind of highly concealed type video steganography method, especially suitable for safety More demanding covert communications scene.
Table 1 carries out the average detected accuracy of steganalysis using AoSO feature to the proposed method of the present invention
The above embodiments are merely illustrative of the technical solutions of the present invention rather than is limited, the ordinary skill of this field Personnel can be with modification or equivalent replacement of the technical solution of the present invention are made, without departing from the spirit and scope of the present invention, this The protection scope of invention should subject to the claims.

Claims (8)

1. a kind of video steganography method kept based on motion vector local optimality, which is characterized in that the insertion of secret information Process the following steps are included:
1) in current video frame, to each motion vector (mvx,mvy), calculate LSB (mvx+mvy) binary number 0 or 1 is obtained, And write all calculated results as vector x, wherein LSB expression takes lowest bit bit manipulation;
2) using gained vector x as the carrier of private communication channel, according to the working principle of the steganography code of selection, according to communicating pair thing The parameter first arranged generates parity check matrix H, and combines preset motion vector disturbance cost computation model ultimately constructed out Meet the x' of Hx'=m, wherein m indicates secret information to be embedded in the private communication channel, x' indicate modified carrier to Amount, Hx' expression parity check matrix H and vector x ' be multiplied;
3) motion vector for needing to modify in current video frame is determined according to step 2);
4) current video frame is encoded according to result obtained as above, and is distinguished according to preset optimal candidate motion vector sought algorithm Each motion vector to be modified is substituted for corresponding optimal candidate motion vector, and then completes to believe the secret of private communication channel Breath insertion;
5) according to the frame coded sequence of video file, step 1) is repeated to 4) until secret information is all embedding to remaining every frame Enter to finish, obtains final steganography video file.
2. the method as described in claim 1, which is characterized in that further include the extraction process of secret information, its step are as follows:
1) current video frame is decoded, to each motion vector (mvx,mvy), calculate LSB (mvx+mvy) binary number 0 or 1 is obtained, And write all calculated results as vector x, wherein LSB expression takes lowest bit bit manipulation;
2) according to the working principle of the steganography code of selection, parity matrix is generated according to the parameter that communicating pair is appointed in advance H, calculates the product Hx of parity check matrix H and vector x, and acquired results are the secret information bit extracted;
3) according to the frame decoding sequence of video file, step 1) is repeated to 2) until secret information is all mentioned to remaining every frame It takes complete.
3. method according to claim 1 or 2, which is characterized in that the steganography code is STC steganography code.
4. method according to claim 1 or 2, which is characterized in that the preset motion vector disturbs cost computation model Are as follows:
To motion vector MV0,0=(mvx,mvy) both horizontally and vertically upper 4 adjacent motion vector, that is, MV-1,0=(mvx- 1,mvy)、MV1,0=(mvx+1,mvy)、MV0,-1=(mvx,mvy- 1) and MV0,1=(mvx,mvy+ 1) local optimality is carried out to sentence It is fixed, if there is N number of motion vector to have local optimality in them, wherein 0≤N≤4, then to motion vector MV0,0It is embedding to carry out steganography The disturbance cost entered are as follows:
Wherein, Ω={ MV-1,0,MV1,0,MV0,-1,MV0,1,Indicate motion vector MV0,0RDO functional value, JMVIndicate five The RDO functional value of a motion vector, MV ∈ { MV0,0,MV-1,0,MV1,0,MV0,-1,MV0,1, i.e. the disturbance cost of motion vector takes Certainly in the variation degree of the quantity of local optimum motion vector and RDO functional value in its contiguous range.
5. method as claimed in claim 4, which is characterized in that set and need the motion vector modified as MV0,0=(mvx, mvy), then the preset optimal candidate motion vector sought algorithm are as follows:
A) respectively to MV0,0Four motion vector MV in contiguous range-1,0=(mvx-1,mvy)、MV1,0=(mvx+1,mvy)、 MV0,-1=(mvx,mvy- 1) and MV0,1=(mvx,mvy+ 1) local optimum sex determination is carried out;
B) by MV-1,0, MV1,0, MV0,-1And MV0,1In local optimum motion vector composition candidate motion vector set close Ψ, if Ψ Non-empty then gos to step e), otherwise continues to execute step c);
C) region of search of a motion vector delimited, size and final search time are directly proportional, according to practical computing resource Or ability is chosen;For any candidate motion vector MV'=(mv in the regionx',mvy'), meet LSB (mvx+mvy) ≠LSB(mvx'+mvy');
D) for each candidate motion vector in the region of search, local optimum sex determination is carried out respectively, and determination is wherein owned The motion vector of local optimum, and by their composite set Ψ;
E) for each local optimum motion vector in Ψ, its RDO functional value is calculated, selection possesses minimum RDO functional value Local optimum motion vector is as final modification result.
6. method as claimed in claim 5, which is characterized in that the method for the local optimum sex determination are as follows:
For motion vector MV0,0=(mvx,mvy), if its prediction block being directed toward is Pred (MV0,0), by inter prediction encoding Obtained reconstructed block is Rec (MV0,0);Calculating matrix Pred (MV0,0) and Rec (MV0,0) between absolute error and, i.e. sad0,0 =SAD (Rec (MV0,0),Pred(MV0,0));Similarly, for MV0,08 adjacent motion vector MV of surroundingi,j=(mvx+i,mvy + j), wherein -1≤i, j≤1, respectively obtain the prediction block Pred (MV that they are directed towardi,j), and calculate sadi,j=SAD (Rec (MV0,0),Pred(MVi,j));If sadi,jIn minimum value be sad0,0, then claim motion vector MV0,0Has local optimality.
7. method as claimed in claim 6, which is characterized in that the telescopiny using the secret information of STC steganography code includes Following steps:
1) in current video frame, by each motion vector (mvx,mvy) horizontal and vertical component summation after take lowest bit Position, i.e. LSB (mvx+mvy), binary number 0 or 1 is obtained, and all calculated results are formed into binary system carrier vector x;
2) in current video frame, for each motion vector MV, cost computation model meter is disturbed according to preset motion vector Calculation obtains its steganography disturbance cost Cost (MV), and all calculated results are formed vector Γ;
3) according to the working principle of steganography code STC, first according to the preassigned load factor α of communicating pair and parameter matrixStructure Build parity matrix ΗSTC, reconstruct out and meet ΗSTCX'=m and make steganography insertion cost D (x, x', Γ) reach most Small x', wherein m indicates that secret information to be embedded in private communication channel, x' indicate to be repaired after being embedded in by private communication channel steganography The carrier vector changed;If the binary number on x and x' corresponding position is not identical, then it represents that corresponding original motion vector needs are repaired Change, then indicates not needing to modify if they are the same;
4) according to the modification of carrier vector in private communication channel as a result, for each motion vector for needing to modify, according to preset Optimal candidate motion vector sought algorithm be substituted for the smallest local optimum of RDO functional value in candidate motion vector move to Amount;
5) current video frame is encoded according to result obtained as above to complete the steganography of secret information and be embedded in;
6) according to the frame coded sequence of video file, step 1) is repeated to 5) until secret information is all embedding to remaining every frame Enter to finish, obtains final steganography video file.
8. the method for claim 7, which is characterized in that the extraction process using the secret information of STC steganography code includes Following steps:
1) current video frame is decoded, to each motion vector (mvx,mvy) calculate LSB (mvx+mvy) binary number 0 or 1 is obtained, and Write all calculated results as binary vector x;
2) secret information in private communication channel is extracted: according to the working principle of STC, according to the preassigned load factor of communicating pair α and parameter matrixConstruct parity matrix ΗSTC, calculate ΗSTCX, acquired results are the secret information ratio extracted It is special;
3) according to the frame decoding sequence of video file, step 1) is repeated to 2) until secret information is all mentioned to remaining every frame It takes complete.
CN201510184721.7A 2015-04-17 2015-04-17 The video steganography method kept based on motion vector local optimality Expired - Fee Related CN104853215B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510184721.7A CN104853215B (en) 2015-04-17 2015-04-17 The video steganography method kept based on motion vector local optimality

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510184721.7A CN104853215B (en) 2015-04-17 2015-04-17 The video steganography method kept based on motion vector local optimality

Publications (2)

Publication Number Publication Date
CN104853215A CN104853215A (en) 2015-08-19
CN104853215B true CN104853215B (en) 2018-12-28

Family

ID=53852514

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510184721.7A Expired - Fee Related CN104853215B (en) 2015-04-17 2015-04-17 The video steganography method kept based on motion vector local optimality

Country Status (1)

Country Link
CN (1) CN104853215B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105979269B (en) * 2016-06-03 2019-06-04 中国科学院信息工程研究所 Motion vector field video steganography method based on novel insertion cost
CN110149457B (en) * 2019-05-08 2021-05-04 中山大学 Multi-objective optimization H.264 video steganography method with constraint conditions
CN110502646A (en) * 2019-08-02 2019-11-26 广州多益网络股份有限公司 A kind of multimedia file purification method, device, storage medium and terminal device
CN112312138B (en) * 2020-08-17 2022-04-19 中国科学技术大学 Video steganography method for inhibiting inter-frame residual signal distortion propagation
CN112738355B (en) * 2020-12-24 2021-10-26 华南理工大学 Non-degraded HEVC video steganography method capable of resisting deep learning network detection

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101583033A (en) * 2009-06-05 2009-11-18 中山大学 Method for protecting H.264 video data by using robust watermarks
CN102685500A (en) * 2012-05-08 2012-09-19 合肥工业大学 H.264 large-capacity information hiding method based on information variable-length packet structure
US20130011004A1 (en) * 2011-07-08 2013-01-10 Frederic Lefebvre Method for watermark detection using reference blocks comparison
CN103108188A (en) * 2013-03-01 2013-05-15 武汉大学 Video steganalysis method based on partial cost non-optimal statistics

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101583033A (en) * 2009-06-05 2009-11-18 中山大学 Method for protecting H.264 video data by using robust watermarks
US20130011004A1 (en) * 2011-07-08 2013-01-10 Frederic Lefebvre Method for watermark detection using reference blocks comparison
CN102685500A (en) * 2012-05-08 2012-09-19 合肥工业大学 H.264 large-capacity information hiding method based on information variable-length packet structure
CN103108188A (en) * 2013-03-01 2013-05-15 武汉大学 Video steganalysis method based on partial cost non-optimal statistics

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
《一种隐写分析盲性的评价及提高方法》;孙磊等;《计算机应用与软件》;20120930;第29卷(第9期);7-9,36 *

Also Published As

Publication number Publication date
CN104853215A (en) 2015-08-19

Similar Documents

Publication Publication Date Title
CN104853215B (en) The video steganography method kept based on motion vector local optimality
Park Edge-based intramode selection for depth-map coding in 3D-HEVC
Yao et al. Defining embedding distortion for motion vector-based video steganography
Li et al. CNN based post-processing to improve HEVC
Egilmez et al. Graph-based transforms for inter predicted video coding
TW201220855A (en) Image encoding method and apparatus, image decoding method and apparatus, and programs therefor
CN107197297B (en) Video steganalysis method for detecting steganalysis based on DCT coefficient steganalysis
CN105933711B (en) Neighborhood optimum probability video steganalysis method and system based on segmentation
CN108965887B (en) Video information hiding method and device based on inter-block decoupling
CN106162195A (en) A kind of 3D HEVC deep video information concealing method based on single depth frame internal schema
CN106664411A (en) Motion-compensated partitioning
CN109819260A (en) Video steganography method and device based on the fusion of multi-embedding domain
CN105979269B (en) Motion vector field video steganography method based on novel insertion cost
CN105915916B (en) Video steganalysis method based on the estimation of motion vector distortion performance
Wang et al. A fast intra prediction algorithm for 360-degree equirectangular panoramic video
CN107155112A (en) A kind of compressed sensing method for processing video frequency for assuming prediction more
WO2015093909A1 (en) Method and apparatus for predicting video signal using predicted signal and transform-coded signal
CN106101714A (en) One and the tightly coupled H.264 video information hiding method of compression encoding process
Fang et al. 3dac: Learning attribute compression for point clouds
Fu et al. Efficient depth intra frame coding in 3D-HEVC by corner points
Saberi et al. An efficient data hiding method using the intra prediction modes in HEVC
CN108353193B (en) Method and apparatus for processing video data based on multiple graph-based models
CN107040786A (en) A kind of H.265/HEVC video steganalysis method adaptively selected based on space-time characteristic of field
Liu et al. Adaptive video data hiding with low bit-rate growth based on texture selection and ternary syndrome-trellis coding
Jia et al. A layered embedding-based scheme to cope with intra-frame distortion drift in IPM-based HEVC steganography

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
EXSB Decision made by sipo to initiate substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20181228

Termination date: 20190417

CF01 Termination of patent right due to non-payment of annual fee