CN111263165B - Embedding method and extracting method of HEVC video steganography information - Google Patents

Embedding method and extracting method of HEVC video steganography information Download PDF

Info

Publication number
CN111263165B
CN111263165B CN201911379386.0A CN201911379386A CN111263165B CN 111263165 B CN111263165 B CN 111263165B CN 201911379386 A CN201911379386 A CN 201911379386A CN 111263165 B CN111263165 B CN 111263165B
Authority
CN
China
Prior art keywords
data
information
video
embedding
current
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911379386.0A
Other languages
Chinese (zh)
Other versions
CN111263165A (en
Inventor
刘云霞
刘思
冯聪
王永浩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhengzhou Normal University
Original Assignee
Zhengzhou Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengzhou Normal University filed Critical Zhengzhou Normal University
Priority to CN201911379386.0A priority Critical patent/CN111263165B/en
Publication of CN111263165A publication Critical patent/CN111263165A/en
Application granted granted Critical
Publication of CN111263165B publication Critical patent/CN111263165B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/46Embedding additional information in the video signal during the compression process
    • H04N19/467Embedding additional information in the video signal during the compression process characterised by the embedded information being invisible, e.g. watermarking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage

Abstract

The invention discloses an embedding method and an extracting method of HEVC video steganography information. When embedding: HEVC video is used as a steganography carrier, and secret information which needs to be embedded by a user is received; distributing processing operations using a multiple secret sharing technique on secret information; the carrier video is decoded and distributed secret information is steganographically using an embedding method that controls intra-frame distortion drift until all information is completely embedded in the video. During extraction: acquiring a carrier video which is transmitted through a network and the like and can cause partial data loss; decoding the video and extracting the embedded secret information; and recovering the extracted information to obtain the original secret information by using a multi-secret sharing technology. The invention has less redundancy and better visual concealment.

Description

Embedding method and extracting method of HEVC video steganography information
Technical Field
The invention belongs to the technical field of information, and particularly relates to an embedding method and an extracting method of HEVC video steganography information.
Background
In order to realize the covert communication in the network video transmission process, researchers at home and abroad propose a plurality of steganographic algorithms for carrying out the covert communication by using network data streams (videos, texts, images and the like) in the existing network. The steganographic algorithms can be divided into two major parts according to the robust performance, wherein the first part is mainly a specific video steganographic algorithm without considering the robust performance, and focuses on the specific video carrier embedding position and the influence of the embedding performance and the visual effect brought by the selected embedding position. And during extraction, the position of a proper condition is selected according to an embedding algorithm to extract the secret information. The second part is information hiding related to robustness, but the carrier of hiding is usually image, text, audio, etc. and is commonly used in the field of digital watermarking for property protection of digital works. The method aims to emphasize that carrier works containing secret information are not modified or deleted, and the detectability of the secret information is emphasized, namely the embedded secret information can be used for property right protection as long as the embedded secret information is detected at a detection end, and the method has a large robustness research space, so that the method can well resist shearing, rotation, compression and the like at present.
The two current schemes respectively consider a specific video steganography algorithm and an information hiding scheme of digital watermarks mainly taking images, texts and audio as carriers. Various video steganography algorithms in the former are applied to an HEVC video, but the robustness problem in an actual steganography system is not fully considered, so that the video steganography algorithm also has the defect in the aspect of robustness, and if secret information is embedded in an HEVC video carrier by utilizing the video steganography algorithm, and when the problems of data loss, recoding and the like possibly occur due to intentional or unintentional attacks on a carrier video in the transmission process, the received video carrier is not completely lossless at an extraction end, so that the secret information is difficult to be successfully extracted at a receiving end, and communication failure is possibly caused. Therefore, with regard to the proposed numerous video steganography algorithms, although the embedding method of HEVC video steganography in information hiding is enriched, the requirements of practical covert communication on robustness are not yet satisfied. The carrier used by the latter is mainly an image, a text and an audio, and the carrier mainly focuses on the aspects of copyright protection of digital works and the like, and is not suitable for video steganography, and the purposes of the digital watermark and robust video steganography are different, the digital watermark is more important than whether the carrier can detect embedded information, the robust video steganography requires that normal secret communication can be realized at the transmitting end and the receiving end, although the robustness research of the former is developed, the former cannot be directly applied to the video steganography, and further research and development are needed for the robustness of the video steganography.
Disclosure of Invention
In view of at least one defect or improvement requirement of the prior art, the present invention provides an embedding method and an extraction method for HEVC video steganography information, which have less redundancy and better visual concealment.
To achieve the above object, according to a first aspect of the present invention, there is provided an embedding method for HEVC video steganography information, including:
s1, obtaining an HEVC video source to be used as a carrier, and receiving secret information which needs to be embedded by a user;
s2, configuring multiple secret shared parameters n, p and t, wherein n represents that one secret distribution is n pieces of data, p represents that one secret distribution can distribute p pieces of data, t represents that at least t pieces of data are required to recover original secret information during extraction, segmenting the secret information to be embedded according to each p pieces of data, and supplementing 0 if the number of the last segmented data is less than p to obtain a plurality of data segments;
s3, carrying out multi-secret sharing distribution on p data of each data segment in sequence, wherein the p data are distributed into n pieces of data at one time;
s4, carrying out binarization on the data of each piece of distributed n pieces of data in sequence to obtain the number num of bits in each bit string after binarization;
s5, decoding the q frame of the carrier video, and judging whether the current 4 multiplied by 4 sub-block of the decoded q frame accords with the distortion drift control embedding condition, wherein q is more than or equal to 0; if the distortion drift control embedding condition is met, embedding the data in the step S7 in the current 4 x 4 subblock; if the distortion drift control embedding condition is not met, carrying out condition judgment on the next 4 multiplied by 4 subblock of the current frame until the current frame is decoded, and turning to the step S6;
s6, judging whether the frame of the current embedded information is the last frame of the video, if yes, turning to S9, if not, adding 1 to the current frame serial number q, and turning to S5;
s7, calculating i-qmodn, where q is the current frame number, and determining whether the number My _ Count [ i ] of the i-th slice of embedded information is smaller than num according to num obtained in step S4, if yes, embedding bits in the i-th slice of information into the current block, and adding 1 to each bit counter My _ Count [ i ] at the same time, otherwise, turning to step S8; wherein the initial value of My _ Count [ i ] is 0;
s8, judging whether the information in each binary bit string obtained in the step S4 is completely embedded, if not, turning to the step S6, and if yes, turning to the step S9;
s9, judging whether all My _ Count [ i ] are equal to num, if yes, ending the embedding process.
According to a second aspect of the present invention, there is provided an extraction method of HEVC video steganography information, including:
s1, obtaining a video carrying secret information, and configuring the same parameters n, p, t of multi-secret sharing reconstruction as embedded, wherein n represents that one secret distribution is n pieces of data, p represents that one secret distribution can distribute p pieces of data, and t represents that at least t pieces of data are needed to recover the original secret information during extraction;
s2, starting from frame 0, decoding the q frame of the carrier video in sequence, and determining whether the current 4 × 4 sub-block of the q frame after decoding meets the extraction condition, if the current 4 × 4 sub-block meets the extraction condition, extracting the embedded information in the 4 × 4 sub-block, and putting the information into the data of the i slice, where i is qmodn, where q is the current frame number, if the extraction condition is not met, continuing to determine the next adjacent block, and if the current frame is decoded, going to step S3;
s3, judging whether the q frame is the last frame of the carrier video, if yes, turning to S4, and if not, adding 1 to q, and turning to S2;
s4, obtaining the extracted data of n1 pieces, counting the number of each piece of data of n1 pieces, selecting t pieces of data with the most complete stored information, if the number of the selected pieces is less than t, switching to the step S8, and if t pieces of data are selected, switching to the step S5;
s5, decimal digitizing the binary data of each of the t pieces to obtain the values of the t pieces;
s6, sequentially selecting a piece of data from t pieces to form t pieces of data, reading parameters shared by multiple secrets, obtaining secret information by solving a matrix equation, reconstructing the shared multiple secrets according to the obtained secret information, recovering the original secret information of p bytes at one time, if the data in the pieces are not used up, continuing the operation of the step S6, and if the data in the pieces are used up, going to the step S7;
s7, obtaining the data of multi-secret sharing reconstruction, and finishing secret information extraction;
s8, the user is prompted that the video data are lost too much, t pieces of data cannot be effectively extracted, the secret information cannot be recovered, and the secret information needs to be embedded again.
According to a third aspect of the present invention, there is provided an electronic device comprising a processor and a memory, wherein the processor runs a program corresponding to an executable program code stored in the memory by reading the executable program code for implementing any one of the above methods.
According to a fourth aspect of the invention, there is provided a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the method of any of the above.
Generally, compared with the prior art, the technical scheme conceived by the invention has the beneficial effects that: the invention discloses an HEVC video robustness steganography method which comprises an embedding part and an extracting part. In the embedded portion: HEVC video is used as a steganography carrier, and secret information which needs to be embedded by a user is received; distributing processing operations using a multiple secret sharing technique on secret information; the carrier video is decoded and distributed secret information is steganographically using an embedding method that controls intra-frame distortion drift until all information is completely embedded in the video. In the extraction section: acquiring a carrier video which is transmitted through a network and the like and can cause partial data loss; decoding the video and extracting the embedded secret information; and recovering the extracted information to obtain the original secret information by using a multi-secret sharing technology. The embedded hidden information is not increased rapidly when the HEVC video steganography robustness is improved, so that the method has low redundancy, and the occurrence of intra-frame distortion drift is controlled, so that the method has high visual concealment. The invention can provide theoretical basis and technical method for video steganography, and has extremely wide application environment.
Drawings
Fig. 1 is a flowchart of an embedding method of steganographic information in video according to an embodiment of the present invention;
fig. 2 is a flowchart of a method for extracting video steganography information according to an embodiment of the present invention;
fig. 3 is a diagram illustrating the definition of a neighbor block mode according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention. In addition, the technical features involved in the respective embodiments of the present invention described below may be combined with each other as long as they do not conflict with each other.
An embedding method for HEVC video steganography information according to an embodiment of the present invention, as shown in fig. 1, includes the following steps:
(1) the method comprises the steps of acquiring an HEVC video source to be used as a carrier and receiving secret information which needs to be embedded by a user. Specifically, the capacity of the secret information to be embedded is closely related to the HEVC video carrier and the selected steganography algorithm, although the invention needs to sacrifice the embedding capacity of the secret information to ensure robustness, the increased data amount is very small, and the increased amount in the embodiment of the invention is 0.36 times of the original secret information, so that the general video steganography communication requirement is met.
(2) And configuring parameters (n, p, t) of multi-secret sharing, wherein n represents that one secret distribution is n pieces of data, p represents that one secret distribution can distribute p pieces of data, and t represents that at least t pieces of data are required to recover the original secret information during extraction. In one embodiment, (n, p, t) may be chosen to be (8,6, 3). And segmenting the secret information to be embedded according to p data, and if the number of the last segmented data is less than p, complementing 0.
(3) And then, carrying out multi-secret sharing distribution on every p data in sequence, wherein the data are distributed into n pieces of data at one time. And (4) repeating the step (3) until the divided data segments in the step (2) are processed, and switching to the step (4). In one embodiment, the distribution of multiple secret sharing is carried out by utilizing a one-way function and a p-1 degree polynomial, wherein the key points of the distribution process are that a proper one-way function is selected for ensuring the safety performance of information, and the one-way function f (r, x) is ensuredi) Any two function values of i e (1, n) are not equal to each other two by two, wherein r, xiIs a random number. The distribution process is as follows:
setting s1,s2,......,spP pieces of secret information to be shared are used to construct a p-1 th-order polynomial:
h(x)=s1+s2x+s3x2+......+spxp-1
for all xiI belongs to (1, n), calculating one-way function value f (r, x)i)。
With f (r, x)1),f(r,x2),......,f(r,xn) Substituting the argument into a polynomial h (x), calculating n y values: y isi=h(f(r,xi)),i∈(1,n)。
In order to extract information at the extraction end, j is selected to be 1,2, and p-t according to the parameter t, h (j) is calculated, and h (j) and y are calculated respectivelyiSending the video to a video receiver so that the video receiver can obtain the video according to h (j) and yiTo extract video steganographic information; specifically, the above-mentioned h (j) and yiThe transmission to the video receiver can be realized by unicast of a trusted channel, a broadcast mode or embedded in other positions of the carrier video, such as a motion vector and the like. And combining the above n xiAnd distributing the values of i epsilon (1, n) into n pieces of data respectively until the distribution process is finished.
Examples are as follows: assume that the secret information is s1,s2,......,s p1,2, …,6, then the polynomial constructed using the secret information is:
h(x)=1+2x+3x2+4x3+5x4+6x5assume that the one-way function f (r, x) is: f (r, x) ═ r + x (modp), r ═ 3, p ═ 12; randomly selected xiI ∈ (1, n) is {1, 2...., 8}, then the calculation yields x for that xiI ∈ (1, n), 8 f (r, x)i) In turn {4,5,6,7,8,9,10,11}, with 8 f (r, x)i) As arguments into the polynomial:
h(x)=s1+s2x+s3x2+......+spxp-1
i.e. get n y after distributioniI ∈ (1,8) value:
Y={7737,22461,54121,114381,219345,390277,654321,1045221}
for j ═ 1,2,3, also substituted in h (x), the calculation h (j) is: {21,321,2005}, until distribution is complete.
(4) And sequentially carrying out binarization on the data of each of the n pieces of distributed data to obtain the number num of bits in each bit string.
(5) And (3) decoding the q (q is more than or equal to 0) th frame of the carrier video, and judging whether the current 4 multiplied by 4 subblock of the decoded q frame accords with the embedding algorithm for controlling the intra-frame distortion drift. In one embodiment, the determination condition is whether the prediction mode of the peripheral neighboring blocks of the block to be embedded in the decoded video carrier satisfies the first condition or the second condition of the prediction mode:
1) judging whether the current block accords with a first condition according to an intra-frame prediction mode of a neighboring block of the current block to be embedded, if so, embedding 1-bit information into each line of the current block from the horizontal direction in a (1,0, -1,1) mode so as to prevent embedding distortion from drifting to the neighboring block, and entering a step (7); if not, carrying out condition judgment on the next 4 multiplied by 4 sub-block of the current frame until the current frame is decoded, and turning to the step (6);
wherein the first condition refers to Right-mode being {2-25}, under-Right-mode being {11-25}, top-Right-mode being {2-9 }; right-mode is the intra prediction mode of the right neighbor of the current candidate embedded block; under-right-mode is the intra prediction mode of the next right neighbor of the current candidate embedded block; top-right-mode is the intra prediction mode of the upper right neighbor block of the current candidate embedded block;
2) judging whether the current block meets a second condition according to the intra-frame prediction mode of the adjacent block of the current block to be embedded, if so, embedding 1-bit information into each line of the current block from the vertical direction according to the mode of (1,0, -1,1) so as to prevent the embedding distortion from drifting to the adjacent block, and entering the step (7); if not, carrying out condition judgment on the next 4 multiplied by 4 sub-block of the current frame until the current frame is decoded, and turning to the step (6);
wherein the second condition refers to under-left-mode being in the state of {27-34}, under-mode being in the state of {11-34 }; under-mode is the intra prediction mode of the next neighbor block of the current candidate embedded block; under-left-mode is the intra prediction mode of the left-lower neighbor block of the current candidate embedded block;
(6) and (4) judging whether the frame of the current embedded information is the last frame of the video, if so, turning to the step (9), and if not, adding 1 to the sequence number q of the current frame, and turning to the step (5).
(7) And (4) assuming that the current frame number qmodn is i, judging whether the number My _ Count [ i ] of the i-th piece of embedded information is smaller than num according to num obtained in the step (4), if so, sequentially embedding bits in the information of the i-th piece into the current block, adding 1 to each bit counter My _ Count [ i ], and if not, turning to the step (8).
(8) Judging whether the information of each piece obtained in the step (4) is completely embedded (the judgment standard is My _ Count [ i ], i belongs to (1, n) and is equal to num), if not, turning to the step (6), and if yes, turning to the step (9);
(9) and judging whether all My _ Count [ i ] are equal to num or not, if yes, finishing the embedding process, if not, the video carrier is too little, the secret information is not completely embedded, and the video needs to be replaced and embedded again.
The method for extracting the HEVC video steganography information according to the embodiment of the present invention, as shown in fig. 2, includes the following steps:
(1) HEVC video carrying secret information is acquired and parameters (n, p, t) of multi-secret sharing reconstruction are configured, where (n, p, t) is the same as (n, p, t) embedded. If (n, p, t) is (8,6,3) during the embedding, then (n, p, t) is (8,6,3) during the extraction.
(2) And (5) decoding the q frame (q is from 0) of the carrier video, and if the current block meets the extraction condition in the steganographic algorithm, namely the judgment condition of the step (5) in the process of embedding the information is met. And (4) correspondingly extracting information, if the current frame number qmoden is equal to i, classifying the extracted information into the data of the ith slice, if the extraction condition is not met, continuing to judge the next adjacent block, and if the current frame is decoded, turning to the step (3).
The extraction condition used in the embodiment of the present invention corresponds to the embedding condition when embedding, that is, whether the prediction mode of the neighboring block of the current 4 × 4 block after decoding satisfies the condition: judging whether the adjacent blocks of the block to be extracted meet a first condition or not; if yes, 1 bit of information is extracted from the first coefficient in each row of the current 4 x 4 block according to parity; if not, the extraction is not carried out. Wherein the first condition refers to Right-mode being {2-25}, under-Right-mode being {11-25}, top-Right-mode being {2-9 }; judging whether the adjacent blocks of the block to be extracted meet a second condition or not; if yes, extracting 1 bit information from the first coefficient in each column of the current 4 multiplied by 4 block according to parity; if not, not extracting; wherein the second condition is under-left-mode e {27-34}, under-mode e {11-34 }.
(3) And (4) judging whether the q frame is the last frame of the carrier video, if so, transferring to the step (4), and if not, adding 1 to q, and transferring to the step (2).
(4) The data of n1 extracted pieces is obtained, and the extracted pieces may not be complete n pieces of data for possible loss of the video carrier, so the extracted pieces are represented by n1, n1< ═ n, the number of each piece of data of n1 pieces is counted, the data of t pieces of which the stored information is the most complete is selected, namely the piece with the largest statistical number is selected, if the number of the selected pieces is less than t, the step (8) is carried out, and if the data of t pieces is selected, the step (5) is carried out.
(5) And carrying out decimal numeralization on the binary data of each piece to obtain the numerical values of the selected t pieces.
(6) And sequentially selecting a part of data from the t pieces to form t parts of data, reading the parameter shared by multiple secrets, and solving a matrix equation to obtain secret information, thereby completing reconstruction of the shared multiple secrets and recovering the original p bytes of secret information at one time. If the data in the slice is not used up, continuing the operation of the step (6); if the data in the slice is used up, go to step (7).
Selecting a piece of data from the t pieces in sequence means that if each piece has 10 pieces of data, the first piece of data in each piece is taken out and recombined, then the second piece of data in each piece is taken out, and the like.
The reconstruction process is as follows:
suppose that the t pieces of information extracted are { x }1,x2,...,xtThen put into a one-way function f (r, x) can be obtained f (r)r,x1),f(r,x2),...,f(r,xt)。
According to 1,2, …, p-t and f (r, x)1),f(r,x2),...,f(r,xt) The powers of 0 to p-1, and the coefficient matrix A is constructed by arranging in sequence:
Figure GDA0002474948400000081
read Y ═ h (1), h (2),.., h (p-t), Y1,y2,...,yt}. Assuming the secret information s sought1,s2,......,spIs a p-dimensional vector X. Then there is the relation:
AX=Y
i.e. by solving the matrix equation X ═ a-1Y may recover the original secret information.
Examples are as follows: assuming that the extracted secret information is {1,2,3}, substituting {1,2,3} into the corresponding one-way function results in 3 f (r, x)i) The value is 4,5,6, based on these 3 f (r, x)i) And {1,2,3} constructing coefficient matrix A
Figure GDA0002474948400000082
Reading the vector Y ═ {21,321,2005,7737,22461,54121}, and solving the matrix equation X ═ A-1Y, secret information X is obtained as {1,2,3,4,5,6 }.
(7) And obtaining the data of multi-secret sharing reconstruction, finishing extracting the secret information, and simultaneously playing the carrier video after the extraction is finished.
(8) The user is prompted that the video data is lost too much, t pieces of data cannot be extracted effectively, the secret information cannot be recovered, and the secret information needs to be embedded again.
It should be understood that although the method steps are listed as sequence numbers, the steps may be performed in other sequences unless explicitly stated herein, and the performance of the steps is not strictly limited by the order of the sequence numbers.
In order to implement the foregoing embodiment, an embodiment of the present invention further provides an electronic device, including: a processor and a memory. Wherein the memory and the processor are electrically connected, directly or indirectly, to enable transmission or interaction of data. The memory stores a computer program, and the computer program can implement any of the technical solutions of the embodiments of the embedding method or the extracting method when being executed by the processor. The processor executes various functional applications and data processing by executing software programs and modules stored in the memory. The processor may be an integrated circuit chip having signal processing capabilities. And the processor executes the program after receiving the execution instruction. Optionally, the software programs and modules within the above-described memory may also include an operating system, which may include various software components and/or drivers for managing system tasks and may communicate with various hardware or software components to provide an operating environment for other software components. The implementation principle and technical effect of the electronic device provided by this embodiment are similar to those of the above method, and are not described herein again.
The embodiment of the present invention further provides a computer-readable storage medium, on which a computer program is stored, where the computer program is executed by a processor to implement the technical solution of any one of the embodiments of the embedding method or the extracting method. The implementation principle and technical effect are similar to those of the above method, and are not described herein again.
It will be understood by those skilled in the art that the foregoing is only an exemplary embodiment of the present invention, and is not intended to limit the invention to the particular forms disclosed, since various modifications, substitutions and improvements within the spirit and scope of the invention are possible and within the scope of the appended claims.

Claims (5)

1. An embedding method of HEVC video steganography information is characterized by comprising the following steps:
s1, obtaining an HEVC video source to be used as a carrier, and receiving secret information which needs to be embedded by a user;
s2, configuring multiple secret shared parameters n, p and t, wherein n represents that one secret distribution is n pieces of data, p represents that one secret distribution can distribute p pieces of data, t represents that at least t pieces of data are required to recover original secret information during extraction, segmenting the secret information to be embedded according to each p pieces of data, and supplementing 0 if the number of the last segmented data is less than p to obtain a plurality of data segments;
s3, carrying out multi-secret sharing distribution on p data of each data segment in sequence, wherein the p data are distributed into n pieces of data at one time;
s4, sequentially binarizing the data of each of the n distributed pieces of data to obtain the number num of bits in each bit string after binarization;
s5, decoding the q frame of the carrier video, and judging whether the current 4 x 4 sub-block of the decoded q frame meets the distortion drift control embedding condition, wherein q is more than or equal to 0; if the distortion drift control embedding condition is met, embedding the data in the step S7 in the current 4 x 4 subblock; if the distortion drift control embedding condition is not met, carrying out condition judgment on the next 4 multiplied by 4 subblock of the current frame until the current frame is decoded, and turning to the step S6;
s6, judging whether the frame of the current embedded information is the last frame of the video, if yes, going to step S9, if not, adding 1 to the current frame serial number q, going to step S5;
s7, calculating i ═ q mod n, where q is the current frame number, and determining whether the number My _ Count [ i ] of the i-th slice of embedded information is smaller than num according to num obtained in step S4, if yes, embedding bits in the i-th slice of information into the current block, and adding 1 to each bit counter My _ Count [ i ] at the same time, otherwise, going to step S8; wherein the initial value of My _ Count [ i ] is 0;
s8, judging whether the information in each binary bit string obtained in the step S4 is completely embedded, if not, going to the step S6, and if yes, going to the step S9;
s9, judging whether all My _ Count [ i ] are equal to num, if yes, ending the embedding process;
the distortion drift control embedding condition comprises a first condition and a second condition,
wherein the first condition refers to Right-mode being {2-25}, under-Right-mode being {11-25}, top-Right-mode being {2-9 }; right-mode is the intra prediction mode of the right neighbor of the current candidate embedded block; under-right-mode is the intra prediction mode of the next right neighbor of the current candidate embedded block; top-right-mode is the intra prediction mode of the upper right neighbor of the current candidate embedded block,
wherein the second condition refers to under-left-mode being in the state of {27-34}, under-mode being in the state of {11-34 }; under-mode is the intra prediction mode of the next neighbor block of the current candidate embedded block; under-left-mode is the intra prediction mode of the lower left neighbor of the current candidate embedded block,
if the distortion drift control embedding condition is met, the step S7 embedding data in the current 4 × 4 sub-block specifically includes:
1) if the current block is judged to accord with the first condition according to the intra-frame prediction mode of the adjacent block of the current block to be embedded, embedding 1-bit information into each line of the current block from the horizontal direction according to the mode of (1,0, -1, 1);
2) and if the current block is judged to accord with the second condition according to the intra-frame prediction mode of the adjacent block of the current block to be embedded, embedding 1-bit information into each line of the current block from the vertical direction in a (1,0, -1,1) mode.
2. The method as claimed in claim 1, wherein in S3, the distribution of multiple secret sharing is performed by using a one-way function and a p-1 degree polynomial.
3. The method as claimed in claim 2, wherein the distributing of multiple secrets by using one-way function and p-1 degree polynomial includes:
using p pieces of secret information s to be shared1,s2,......,spConstructing a p-1 degree polynomial: h (x) s1+s2x+s3x2+......+spxp-1
For all xiI belongs to (1, n), and calculating one-way function value f (r, x)i) Wherein the one-way function f (r, x)i) Any two function values of i ∈ (1, n) are pairwiseAre not equal to each other, r, xiIs a random number;
with f (r, x)1),f(r,x2),......,f(r,xn) Substituting the argument into a polynomial h (x), calculating n y values: y isi=h(f(r,xi)),i∈(1,n);
According to the parameter t, j is selected to be 1,2iSending the video to a video receiver so that the video receiver can obtain the video according to h (j) and yiTo extract video steganographic information;
and combining the above n xiAnd i ∈ (1, n) values are respectively distributed into n pieces of data.
4. An electronic device comprising a processor and a memory, wherein the processor runs a program corresponding to an executable program code stored in the memory by reading the executable program code for implementing the method according to any one of claims 1 to 3.
5. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the method according to any one of claims 1 to 3.
CN201911379386.0A 2019-12-27 2019-12-27 Embedding method and extracting method of HEVC video steganography information Active CN111263165B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911379386.0A CN111263165B (en) 2019-12-27 2019-12-27 Embedding method and extracting method of HEVC video steganography information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911379386.0A CN111263165B (en) 2019-12-27 2019-12-27 Embedding method and extracting method of HEVC video steganography information

Publications (2)

Publication Number Publication Date
CN111263165A CN111263165A (en) 2020-06-09
CN111263165B true CN111263165B (en) 2022-07-01

Family

ID=70953976

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911379386.0A Active CN111263165B (en) 2019-12-27 2019-12-27 Embedding method and extracting method of HEVC video steganography information

Country Status (1)

Country Link
CN (1) CN111263165B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113965659B (en) * 2021-10-18 2022-07-26 上海交通大学 HEVC (high efficiency video coding) video steganalysis training method and system based on network-to-network

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104125467A (en) * 2014-08-01 2014-10-29 郑州师范学院 Embedding and extracting methods for video steganography information
CN107172434A (en) * 2017-06-27 2017-09-15 郑州师范学院 A kind of method that built-in steganography is carried out to H.265 video
CN108769700A (en) * 2018-05-31 2018-11-06 西安理工大学 Reduce the robustness video steganography method of H.264 interframe drift distortion
CN110334805A (en) * 2019-05-05 2019-10-15 中山大学 A kind of JPEG domain image latent writing method and system based on generation confrontation network

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150006390A1 (en) * 2013-06-26 2015-01-01 Visa International Service Association Using steganography to perform payment transactions through insecure channels

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104125467A (en) * 2014-08-01 2014-10-29 郑州师范学院 Embedding and extracting methods for video steganography information
CN107172434A (en) * 2017-06-27 2017-09-15 郑州师范学院 A kind of method that built-in steganography is carried out to H.265 video
CN108769700A (en) * 2018-05-31 2018-11-06 西安理工大学 Reduce the robustness video steganography method of H.264 interframe drift distortion
CN110334805A (en) * 2019-05-05 2019-10-15 中山大学 A kind of JPEG domain image latent writing method and system based on generation confrontation network

Also Published As

Publication number Publication date
CN111263165A (en) 2020-06-09

Similar Documents

Publication Publication Date Title
Qin et al. Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy
Singh et al. Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability
CA2264625C (en) Data hiding and extraction methods
TWI439135B (en) Watermarking encoded content
Chang et al. Reversible data-embedding scheme using differences between original and predicted pixel values
Weng et al. Reversible data hiding based on flexible block-partition and adaptive block-modification strategy
Pan et al. Video steganography using motion vector and linear block codes
JP2004173237A (en) Apparatus and method for embedding electronic watermark, and apparatus and method for extracting electronic watermark
CN104125467B (en) Embedding and extracting methods for video steganography information
JP2000174628A (en) Information processing unit and method, and computer readable storage medium
JP2010514325A (en) Video coding and decoding method and apparatus using texture synthesis
CN114930835A (en) Use of transform coefficients to provide embedded signaling for watermarking
CN107749990B (en) Video copyright protection method and device based on digital watermark
CN113538197B (en) Watermark extraction method, watermark extraction device, storage medium and electronic equipment
CN111263165B (en) Embedding method and extracting method of HEVC video steganography information
JP2009540644A (en) Encoding device and detection device
CN110971910A (en) Embedding method and extracting method for HEVC video information hiding
CN102315931B (en) Method for hiding running coding of confidential information
EP2451182B1 (en) Robust watermark
CN116437019A (en) Ciphertext domain reversible information hiding method of all-0 row and all-0 column codes
JP2010041710A (en) Apparatus, method for detecting embedded information,program, and recording medium
Hirata et al. Image watermarking method satisfying IHC by using PEG LDPC code
Rodrigues et al. Reversible image steganography using cyclic codes and dynamic cover pixel selection
Fallahpour et al. Reversible data hiding based on H. 264/AVC intra prediction
Zhao et al. Reversible Data Hiding Based on Two-Dimensional Histogram Shifting

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant