CN108322757B - Video steganography method based on intra-frame prediction coding - Google Patents
Video steganography method based on intra-frame prediction coding Download PDFInfo
- Publication number
- CN108322757B CN108322757B CN201810039694.8A CN201810039694A CN108322757B CN 108322757 B CN108322757 B CN 108322757B CN 201810039694 A CN201810039694 A CN 201810039694A CN 108322757 B CN108322757 B CN 108322757B
- Authority
- CN
- China
- Prior art keywords
- secret
- prediction
- embedding
- message
- video
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/46—Embedding additional information in the video signal during the compression process
- H04N19/467—Embedding additional information in the video signal during the compression process characterised by the embedded information being invisible, e.g. watermarking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/50—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using predictive coding
- H04N19/593—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using predictive coding involving spatial prediction techniques
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Compression Or Coding Systems Of Tv Signals (AREA)
Abstract
The invention provides a video steganography method based on intra-frame prediction coding, which can ensure to correct by constructing a proper distortion function and then utilizing STC to carry out actual embeddingThe distortion caused by changing the prediction mode is nearly minimal. When the sender embeds the message, the invention starts from the first key frame I1Starting embedding, and obtaining an optimal group set according to a mapping ruleSet the optimal groupsSecret message sequence m1,1And embedding the disturbance set into a first layer embedder to obtain a secret group-containing setWill contain secret group setSecret message sequence m1,2And embedding the disturbance set into a second layer embedder to obtain a secret group-containing setAccording to secret group containingSelecting a final prediction mode to generate video coding; finally generating a video X' containing the secret code; when a receiver extracts a message, acquiring a key frame after intra-frame prediction coding from a coded video containing a secret; extracting a message from the first key frame, and obtaining a prediction mode by using a decoder; and obtaining a secret group set according to the mapping rule, and extracting to obtain the private message.
Description
Technical Field
The invention belongs to a video information hiding technology, in particular to a video hiding method based on intra-frame prediction coding.
Background
Steganography is an important means of ensuring the privacy of message transmission. Although the message encryption can ensure the privacy of the message, the message transmission behavior can be known by an attacker, and the encrypted messy code form ciphertext can arouse the interest of the attacker; in contrast, steganography can guarantee that the message transmission behavior is invisible, and an attacker cannot distinguish whether the transmission is a normal transmission or a secret transmission, so steganography is an important supplement to encryption technology. The steganography can be applied to the field of various message transmission with high security level, and attack of attackers is effectively prevented.
The video steganography technology can modify different coding links such as motion vectors, quantized DCT coefficients, variable length coding and intra-frame prediction modes (IPM) and the like during video coding, so as to realize the hiding of secret messages. The sender hides the secret message into the video carrier by using a video steganography technology, so that the receiver can smoothly obtain the secret, and meanwhile, a third party cannot discover the existence of the secret.
In the current video steganography scheme based on intra-frame prediction, the influence caused by modifying each 4x4 prediction block is generally assumed to be the same, the modification times are reduced as far as possible, and video distortion can be effectively reduced; however, this approach tends to result in an under-description of the impact of the actual modification. It is therefore necessary to better describe the overall embedding effect in conjunction with new schemes to achieve minimally perturbed secret embedding.
Disclosure of Invention
In order to solve the problems of the existing video steganography technology, the invention provides a video steganography method based on intra-frame prediction coding, which constructs a proper distortion function and then utilizes the adaptive Steganography (STC) technology to carry out actual embedding, thus ensuring that the distortion caused by modifying a prediction mode is nearly minimum.
The invention is realized by adopting the following technical scheme: the video steganography method based on the intra-frame prediction coding comprises the following steps:
before steganographic transmission, a sender and a receiver negotiate a mapping rule together, and the mapping rule divides prediction modes possibly used by all 4x4 blocks into 3 groups;
the sender embeds the message: selecting carrier video X, and solving itCoding an original video frame sequence to obtain a key frame I1,I2,...;
From the first key frame I1Start of embedding, set I1The embedded secret message is m1,1And m1,2(ii) a To I1Obtaining all pixel blocks to be encoded by intra 4x4 block prediction by using intra prediction encoding, and the optimal prediction mode of the pixel blocks by using intra prediction encoding; further obtaining an optimal group set according to the mapping rule
Utilizing optimal set of groupsCalculating the plus 1 embedding disturbance and the minus 1 embedding disturbance of each 4x4 block and a prediction mode used in calculation;
set the optimal groupsAs a carrier vector, a sequence of secret messages m1,1And the corresponding 4x4 block embedding disturbance set is sent into a first layer embedder of the self-adaptive coding to obtain a secret group containing set
Will contain secret group setAs a carrier vector, a sequence of secret messages m1,2And the corresponding 4x4 block embedding disturbance set is sent into a second layer embedder of the self-adaptive coding to obtain a secret group-containing set
According to secret group containingSelecting the final prediction mode of each 4x4 block to generate viewsFrequency coding;
embedding the message into the next key frame until all the secret messages are embedded or all the key frames are used up; finishing the rest of video coding by using a standard encoder to finally generate a video X' containing secret codes;
the receiving party extracts the message: intra-prediction encoded key frame I ' is obtained from a dense coded video X ' by a decoder '1,I′2,...;
From the first Key frame I'1Starting message extraction, obtaining I with a decoder1The prediction mode of each 4x4 block; further obtaining a dense group set according to the mapping rule
Will contain dense groupsAs a secret vector, sending the secret vector into a first layer extractor of the adaptive coding to obtain a secret message sequence m1,1Sending the message into a second layer extractor of the adaptive coding to obtain a secret message sequence m1,2;
And extracting the next key frame until all secret messages are extracted or all the key frames are used up.
Preferably, the prediction mode is mdπ(1),mdπ(2),...,Pi (i) belongs to {0, 1,. eta., 8 }; the optimal set of groupsSecret-containing set obtained by first-layer embedderSecret-containing set obtained by second-layer embedder
Preferably, in the first layer embedder, the embedding perturbation of each 4x4 block is:
Preferably, in the second layer embedder, the embedding perturbation of each 4x4 block is:
Compared with the prior art, the invention has the following advantages and beneficial effects:
1. the invention designs a steganography scheme by utilizing self-adaptive Steganography (STC), and defines a distortion function based on an intra-frame prediction mode; by constructing a suitable distortion function, the actual embedding is performed by using adaptive steganographic coding (STC) technique, which ensures that the distortion caused by modifying the prediction mode is nearly minimal.
The video steganography technology based on the internal prediction mode can better preserve the video quality, but the existing IPM-based method only embeds information into a proper 4x4 intra-frame prediction mode, and the non-optimal selection rule seriously destroys the statistical property of IPM, so that the steganography method based on IPM calibration (IPMC) is easy to detect by a steganography analysis tool.
2. Mapping rules are introduced to extend the range of selectable modes for each block to increase the range of choices for modifying the prediction mode, further reducing the distortion caused by the modification. This ensures that the IPM is kept at its maximum optimality at a given embedding rate during the embedding process, thus effectively resisting detection by the IPM calibration (IPMC) -based steganalysis method.
3. The method embeds the information into the intra-frame prediction link, so that the embedding capacity is higher, and more information can be transmitted. The method designs the embedding position by utilizing the video compression quality and combines the mainstream steganography encoding method, thereby having higher safety. The method can provide a high-capacity and high-security-level video steganography function, is applied to stego information communication disguised as video application, can be applied to environments such as video on demand, video recording, video cloud storage, video recommendation and the like, embeds important information into video data, realizes reliable and imperceptible transmission of the stego information, and has a good practical application value.
Drawings
FIG. 1 is a diagram illustrating 9 intra prediction modes selected by an embedding scheme;
FIG. 2 is a message embedding flow diagram;
fig. 3 is a message extraction flow diagram.
Detailed Description
The present invention will be described in further detail with reference to examples and drawings, but the present invention is not limited thereto.
Examples
The invention designs the steganography scheme by combining the adaptive Steganography (STC) and the mapping rule, describes the embedding influence by constructing a disturbance function, realizes the embedding by adopting the adaptive Steganography (STC), and further reduces the disturbance influence by combining the mapping rule. Since increasing the Sum of Absolute Differences (SAD) leads to more frequent occurrences of prediction mode restoration phenomena, we consider SAD prediction bias (SPD) when defining the perturbation function. Constructing a perturbation function by using the Sum of Absolute Differences (SAD) of the prediction modes as a key factor, wherein the embedding scheme should traverse the whole mode space as much as possible to find a proper embedding mode, so that a mapping rule between the prediction modes and the mode groups is introduced to complete the traversal; and finally, STC is adopted to realize actual embedding. Furthermore, mapping rules are constructed using the prediction modes and prediction groups to extend the range of alternative modes for each 4x4 block. The invention can effectively keep the optimal prediction characteristic of the video to prevent the secret from being discovered by a steganalysis method based on calibration.
The invention is provided with a sender and a receiver, which negotiate a mapping rule together before steganographic transmission. The mapping rules are as follows: intra prediction coding of h.264 partitions the key frame into blocks of 4x4 and 16x16, and the mapping rules group the prediction modes that all 4x4 blocks may use into 3 groups, as follows:
gp0={md0,md1,md4}
gp1={md3,md5,md8}
gp2={md2,md6,md7}
wherein md isiThe prediction modes i are shown, and the prediction scanning order corresponding to each prediction mode is shown in fig. 1. The mapping rule is a better grouping method obtained on the basis of analysis of a large number of video frame sequences.
As shown in fig. 1, in 9 prediction modes, a gray portion represents a 4x4 prediction block, in the intra prediction process, the 4x4 prediction block performs prediction values according to the left and upper adjacent luminance units, and the prediction mode determines the direction of the prediction block values, and the meaning of each prediction mode is shown in table 1.
TABLE 1 9 prediction modes used in the scheme
In the diagram 0 of fig. 1, when the prediction mode 0(Vertical) is used for value selection, 4 × 4 predicts the luminance unit of each column in the block to be equal to the adjacent side luminance value in the Vertical direction of the column. And the more special prediction mode is mean prediction (DC) in graph No. 2, and the prediction block has a value equal to adjacent side (a + B + C + D + I + J + K + L + M)/7.
If during intra prediction, the originally optimal prediction mode is mdiHowever, we use the mode mdjThen the SAD prediction bias (SPD) generated by this mode substitution is:
SPDi,j=|SAD(mdi)-SAD(mdj)|
SAD(mdi) Is a usage pattern mdiThe resulting prediction SAD.
We chose several video sequences as experimental sequences and observe the SPDs generated when the optimal prediction mode is replaced by the other 8 modes. Suppose there is the best mode md0K, the average SPD per 4x4 prediction mode isThe experimental results are shown in table 2, which shows the SPDs generated by replacing the optimal pattern with different candidate patterns.
Since patterns in the same group are not mutually replaced during steganography, the patterns with larger SPD values are divided into the same group to reduce the overall embedded disturbance value. For example, as can be seen from Table 2, the prediction mode md in the sequence I frame is set0The remaining 8 candidate prediction modes are replaced separately, resulting in an average SPD as shown in the first row, where md is0By md substitution1The average SPD value generated is the largest, so md is0And md1Are divided into the same group. By analogy, final gp0={md0,md1,md4}。
TABLE 2 average SPD for each 4x4 prediction mode
The message embedding flow of the sender is shown in fig. 2, and the specific flow is as follows:
step 1: selecting a carrier video X, decoding it into a sequence of original video framesObtaining a key frame I therein1,I2,...。
Step 2: from the first key frame I1The embedding is started. Let I1The embedded secret message is m1,1And m1,2. To I1Using intra prediction encoding of H.264, we get all pixel blocks x to be predictive encoded with intra 4x4 blocks (I4B)1,...,And the optimal prediction mode md obtained by the intra-frame prediction coding of these pixel blocks using the standard H.264π(1),mdπ(2),...,Pi (i) is e {0, 1, …, 8 }. Further obtaining an optimal group set according to the mapping rule
And step 3: utilizing optimal set of groupsCalculate the plus 1 embedding perturbation and the minus 1 embedding perturbation of each I4B block And prediction mode used in calculation
subject tomdj∈gpk,k=[g(i)+1]mod 3
subject tomdj∈gpk,k=[g(i)-1]mod 3
Wherein SAD (md)i) Presentation prediction mode mdiThe sum of absolute errors that occur.
And 4, step 4: the embedded perturbation for each I4B block is set to:
set the optimal groupsAs a carrier vector, a sequence of secret messages m1,1And corresponding set of embedded perturbations { ρi,,i=1,...,N1Sending the data into a first layer embedder of adaptive coding +/-1 STC to obtain a secret group-containing set
And 5: the embedded perturbation for each I4B block is set to:
will contain secret group setAs a carrier vector, a sequence of secret messages m1,2And corresponding set of embedded perturbations { ρi,,i=1,...,N1Sending the data into a second layer embedder of adaptive coding +/-1 STC to obtain a secret group-containing set
Step 6: according to secret group containingThe final prediction mode of each I4B block is selected to generate the h.264 code. The selection rule is as follows:
and 7: and repeating the steps 2-6, and embedding the message for the next key frame until all the secret messages are embedded or all the key frames are used up. The remainder of the video encoding is done with a standard h.264 encoder. Finally, the dense H.264 coding video X' is generated.
The message extraction flow of the receiver is shown in fig. 3, and the detailed steps are as follows:
step 1: intra-prediction encoded key frame I ' is obtained from a dense H.264-containing encoded video X ' using an H.264 decoder '1,I′2,...。
Step 2: from the first Key frame I'1Message extraction is started. Obtaining I by H.264 decoder1Prediction mode md of each I4B block in the blockπ(1),mdπ(2),...,Pi (i) is e {0, 1, …, 8 }. Further obtaining a dense group set according to the mapping rule
And step 3: will contain dense groupsAs a secret-containing vector, sending into adaptive coding of + -1SFirst layer extractor of TC, obtaining secret message sequence m1,1Sending the message into a second layer extractor of adaptive coding +/-1 STC to obtain a secret message sequence m1,2。
And 4, step 4: and repeating the step 2-3, and extracting the message from the next key frame until all secret messages are extracted or all key frames are used up.
The above embodiments are preferred embodiments of the present invention, but the present invention is not limited to the above embodiments, and any other changes, modifications, substitutions, combinations, and simplifications which do not depart from the spirit and principle of the present invention should be construed as equivalents thereof, and all such changes, modifications, substitutions, combinations, and simplifications are intended to be included in the scope of the present invention.
Claims (1)
1. The video steganography method based on intra-frame prediction coding is characterized by comprising the following steps of:
before steganographic transmission, a sender and a receiver negotiate a mapping rule together, and the mapping rule divides prediction modes possibly used by all 4x4 blocks into 3 groups;
the sender embeds the message: selecting carrier video X, decoding it into original video frame sequence, obtaining key frame I1,I2,...;
From the first key frame I1Start of embedding, set I1The embedded secret message is m1,1And m1,2(ii) a To I1Obtaining all pixel blocks to be encoded by intra 4x4 block prediction by using intra prediction encoding, and the optimal prediction mode of the pixel blocks by using intra prediction encoding; further obtaining an optimal group set according to the mapping rule
Utilizing optimal set of groupsCalculating the plus 1 embedding disturbance and the minus 1 embedding disturbance of each 4x4 block and a prediction mode used in calculation;
set the optimal groupsAs a carrier vector, a sequence of secret messages m1,1And the corresponding 4x4 block embedding disturbance set is sent into a first layer embedder of the self-adaptive coding to obtain a secret group containing set
Will contain secret group setAs a carrier vector, a sequence of secret messages m1,2And the corresponding 4x4 block embedding disturbance set is sent into a second layer embedder of the self-adaptive coding to obtain a secret group-containing set
According to secret group containingSelecting a final prediction mode of each 4x4 block to generate video coding;
embedding the message into the next key frame until all the secret messages are embedded or all the key frames are used up; finishing the rest of video coding by using a standard encoder to finally generate a video X' containing secret codes;
the receiving party extracts the message: intra-prediction encoded key frame I ' is obtained from a dense coded video X ' by a decoder '1,I′2,...;
From the first Key frame I'1Starting message extraction, obtaining I with a decoder1The prediction mode of each 4x4 block; further obtaining a dense group set according to the mapping rule
Will contain dense groupsCollectionAs a secret vector, sending the secret vector into a first layer extractor of the adaptive coding to obtain a secret message sequence m1,1Sending the message into a second layer extractor of the adaptive coding to obtain a secret message sequence m1,2;
Extracting the next key frame until all secret messages are extracted or all the key frames are used up;
subject tomdj∈gpk,k=[g(i)+1]mod 3
subject tomdj∈gpk,k=[g(i)-1]mod 3
wherein SAD (md)i) Presentation prediction mode mdiThe sum of absolute errors generated in time;
the prediction mode ismdπ(i)The optimal prediction mode obtained by using the intra-frame prediction coding of the standard H.264 for the ith I4B block, wherein pi (I) belongs to {0, 1,..., 8 }; the optimal set of groupsSecret-containing set obtained by first-layer embedderSecret-containing set obtained by second-layer embedderAccording to secret group containing Selecting the final prediction mode of each I4B block to generate H.264 codes; the selection rule is as follows:
in the first layer embedder, the embedding perturbation of each 4x4 block is:
in the second layer embedder, the embedding perturbation for each 4 × 4 block is:
the 3 sets of prediction modes are:
gp0={md0,md1,md4}
gp1={md3,md5,md8}
gp2={md2,md6,md7}
wherein md is0For vertical prediction, md1For horizontal prediction, md2For mean prediction, md3For lower left directional diagonal prediction, md4For lower right directional diagonal prediction, md5For vertical right-biased prediction, md6For horizontal downward prediction, md7For vertical left-hand prediction, md8Predicting for horizontal deviation;
if during intra prediction, the originally optimal prediction mode is mdiBut using the mode mdjThen the SAD prediction bias (SPD) generated by this mode substitution is:
SPDi,j=|SAD(mdi)-SAD(mdj)|
SAD(mdi) Is a usage pattern mdiThe resulting prediction SAD; selecting a plurality of video sequences as experimental sequences, and observing SPDs generated when the optimal prediction mode is replaced by other 8 modes; the modes with larger SPD values are divided into the same group to reduce the overall embedded disturbance value.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810039694.8A CN108322757B (en) | 2018-01-16 | 2018-01-16 | Video steganography method based on intra-frame prediction coding |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810039694.8A CN108322757B (en) | 2018-01-16 | 2018-01-16 | Video steganography method based on intra-frame prediction coding |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108322757A CN108322757A (en) | 2018-07-24 |
CN108322757B true CN108322757B (en) | 2020-12-11 |
Family
ID=62893578
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810039694.8A Active CN108322757B (en) | 2018-01-16 | 2018-01-16 | Video steganography method based on intra-frame prediction coding |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108322757B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111064859B (en) * | 2020-01-09 | 2021-11-05 | 暨南大学 | Image information embedding method |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104010193A (en) * | 2014-05-29 | 2014-08-27 | 中国科学院信息工程研究所 | Video steganographic method based on macro block partition mode disturbance |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030009670A1 (en) * | 2001-04-02 | 2003-01-09 | Digimarc Corporation | Background watermark processing |
US8457346B2 (en) * | 2001-04-24 | 2013-06-04 | Digimarc Corporation | Digital watermarking image signals on-chip |
CN101610405A (en) * | 2008-06-20 | 2009-12-23 | 刘镔 | A kind of is the information steganography method of carrier with the compressed video |
CN102223540B (en) * | 2011-07-01 | 2012-12-05 | 宁波大学 | Information hiding method facing to H.264/AVC (automatic volume control) video |
CN102685500B (en) * | 2012-05-08 | 2014-11-12 | 合肥工业大学 | H.264 large-capacity information hiding method based on information variable-length packet structure |
US20150006390A1 (en) * | 2013-06-26 | 2015-01-01 | Visa International Service Association | Using steganography to perform payment transactions through insecure channels |
-
2018
- 2018-01-16 CN CN201810039694.8A patent/CN108322757B/en active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104010193A (en) * | 2014-05-29 | 2014-08-27 | 中国科学院信息工程研究所 | Video steganographic method based on macro block partition mode disturbance |
Also Published As
Publication number | Publication date |
---|---|
CN108322757A (en) | 2018-07-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Lee et al. | High-payload image hiding with quality recovery using tri-way pixel-value differencing | |
US10368051B2 (en) | 3D-HEVC inter-frame information hiding method based on visual perception | |
CN106162195B (en) | A kind of 3D HEVC deep video information concealing methods based on single depth frame mode | |
CN110677694B (en) | Video encryption method for resisting contour attack | |
CN104159117B (en) | Method for hiding HEVC video information | |
Chang et al. | A reversible data hiding scheme with modified side match vector quantization | |
CN104602016A (en) | HEVC video information hiding method based on intra-frame prediction mode difference | |
Chang et al. | A sudoku-based secret image sharing scheme with reversibility | |
Zhao et al. | A novel two-dimensional histogram modification for reversible data embedding into stereo H. 264 video | |
CN105162686A (en) | Multi-form instant information hiding communication method and system based on image medium | |
CN105979269B (en) | Motion vector field video steganography method based on novel insertion cost | |
Srinivasan et al. | A novel approach for color image, steganography using nubasi and randomized, secret sharing algorithm | |
CN109819260A (en) | Video steganography method and device based on the fusion of multi-embedding domain | |
Ghamsarian et al. | Undetectable video steganography by considering spatio-temporal steganalytic features in the embedding cost function | |
CN110971910A (en) | Embedding method and extracting method for HEVC video information hiding | |
CN109525845B (en) | Built-in information hiding verification method suitable for video | |
CN108322757B (en) | Video steganography method based on intra-frame prediction coding | |
Wang et al. | Motion vector reversion-based steganalysis revisited | |
CN101409830B (en) | Method and apparatus for judging DCT coefficient block similarity, and encrypting and deciphering image | |
Jia et al. | A layered embedding-based scheme to cope with intra-frame distortion drift in IPM-based HEVC steganography | |
Luo et al. | Security of MVD-based 3D video in 3D-HEVC using data hiding and encryption | |
Wang et al. | Joint source-channel coding for wireless object-based video communications utilizing data hiding | |
Maugey et al. | Side information enhancement using an adaptive hash-based genetic algorithm in a Wyner-Ziv context | |
CN108683921A (en) | A kind of video reversible information hidden method based on zero quantization DCT coefficient group | |
Tew et al. | HEVC video authentication using data embedding technique |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |