Research article Special Issues

Data-Loss resilience video steganography using frame reference and data ensemble reconstruction

  • Received: 25 January 2019 Accepted: 09 May 2019 Published: 22 May 2019
  • In this paper, we propose a robust video steganographic method, which can efficiently hide confidential messages in video sequences, and ensure that these messages are perfectly reconstructed by recipient. To apply proposed scheme to video sequences, we must be faced with two nontrivial problems: (a) how to effectively minimize the total steganographic distortion for each video frame? (b) how to recover the hidden messages if some frames are lost or damaged? We tackle the first question by designing a new distortion function, which employs two continuous adjacent frames with the same scene as side-information. The second question is addressed by data sharing. In this mechanism, the original data is expanded and split into multiple shares by using multi-ary Vandermonde matrix. Since these shares contain a lot of data redundancy, the recipient can recover the hidden data even if some frames are damaged or lost during delivery. Extensive experiments show that proposed scheme outperforms the state-of-the-arts in terms of robustness and diverse attacks.

    Citation: Fengyong Li, Jiang Yu, Yanli Ren. Data-Loss resilience video steganography using frame reference and data ensemble reconstruction[J]. Mathematical Biosciences and Engineering, 2019, 16(5): 4559-4580. doi: 10.3934/mbe.2019228

    Related Papers:

  • In this paper, we propose a robust video steganographic method, which can efficiently hide confidential messages in video sequences, and ensure that these messages are perfectly reconstructed by recipient. To apply proposed scheme to video sequences, we must be faced with two nontrivial problems: (a) how to effectively minimize the total steganographic distortion for each video frame? (b) how to recover the hidden messages if some frames are lost or damaged? We tackle the first question by designing a new distortion function, which employs two continuous adjacent frames with the same scene as side-information. The second question is addressed by data sharing. In this mechanism, the original data is expanded and split into multiple shares by using multi-ary Vandermonde matrix. Since these shares contain a lot of data redundancy, the recipient can recover the hidden data even if some frames are damaged or lost during delivery. Extensive experiments show that proposed scheme outperforms the state-of-the-arts in terms of robustness and diverse attacks.


    加载中


    [1] J. Mielikainen, LSB matching revisited, IEEE. SPL., 13(2006), 285–287.
    [2] F. Li, X. Zhang, J. Yu, et al., Adaptive JPEG steganography with new distortion function, Ann. Telecommun., 69(2014), 431–440.
    [3] V. Holub, J. Fridrich and T. Denemark, Universal distortion function for steganography in an arbitrary domain, EURASIP JIS., Special Issue on Revised Selected Papers of the 1st ACM IH and MMS Workshop, (2014), 2014:1.
    [4] T. Pevný, T. Filler and P. Bas, Using high-dimensional image models to perform highly unde- tectable steganography, Proc. IH2010, Calgary, AB, Canada, June 28–30, 6387(2010), 161–177.
    [5] F. Li, X. Zhang, H. Cheng, et al., Digital image steganalysis based on local textural features and double dimensionality reduction, SCN, 9(2016), 729–736.
    [6] B. Chen, G. Feng, X. Zhang, et al., Mixing high-dimensional features for JPEG steganalysis with ensemble classifier, SIVP, 8(2014), 1475–1482.
    [7] X. Song, F. Liu, C. Yang, et al., Steganalysis of adaptive JPEG steganography using 2D Gabor filters, Proc. IH&MMSec2015 , Portland, OR, USA, June 17-19, (2015), 15–23.
    [8] F. Li, X. Zhang, B. Chen, et al., JPEG steganalysis with high- dimensional features and Bayesian ensemble classifier, IEEE SPL, 20(2013), 233–236.
    [9] Z. Zhao, Q. Guan, X. Zhao, et al., Universal embedding strategy for batch adaptive steganography in both spatial and JPEG domain, MTAP, 77(2018), 14093–14113.
    [10] R. Cogranne, V. Sedighi and J. Fridrich, Practical strategies for content-adaptive batch steganogra- phy and pooled steganalysis, Proc. ICASSP2017, New Orleans, USA, March 5–9, (2017), 2122– 2126.
    [11] F. Li, K. Wu, X. Zhang, et al., Robust batch steganography in social networks with non-uniform payload and data decomposition, IEEE Access, 6(2018), 29912–29925.
    [12] E. Franz, Embedding considering dependencies between pixels, Proc. SPIE, Electron. Imag., Se-cur., Forens., Steg., and Watermark. of Multimedia Contents X, 6819(2008), D 1–12.
    [13] T. Denemark and J. Fridrich, Steganography with multiple JPEG images of the same scene, IEEE TIFS, 12(2017), 2308–2319.
    [14] P. Chang, K. Chung, J. Chen, et al., A DCT/DST-based error propagation-free data hiding algo-rithm for HEVC intra-coded frames, JVCIR, 25(2014), 239–253.
    [15] Y. Liu, Z. Li, X. Ma, et al., A robust data hiding algorithm for H.264/AVC video streams. J. Sys. Sof., 86(2013), 2174–2183.
    [16] R. Mstafa, K. Elleithy and E. Abdelfattah, A robust and secure video steganography method in DWT-DCT domains based on multiple object tracking and ECC, IEEE Access, 5(2017), 5354–5367.
    [17] H. Aly, Data hiding in motion vectors of compressed video based on their associated prediction error, IEEE TIFS, 6(2011), 14–18.
    [18] H. Zhang, Y. Cao and X. Zhao, Motion vector-based video steganography with preserved local optimality, MTAP, 75(2016), 13503–13519.
    [19] H. Zhang, Y. Cao, X. Zhao, et al., Video steganography with perturbed macroblock partition, Proc. IH&MMSec2014, Salzburg, Austria, Jun. 11–13, (2014), 115–122.
    [20] I. Cox, J. Kilian, F. Leighton, et al., Secure spread spectrum watermarking for multimedia, IEEE TIP, 6(1997), 1673–1687.
    [21] V. Neagoe, Inversion of the Van der Monde matrix, IEEE SPL, 3(1996), 119–120.
    [22] YUV Video Sequences, Available from: http://trace.eas.asu.edu/yuv/index.html, [Accessed on 2018].
    [23] J. Kodovský, J. Fridrich and V. Holub, Ensemble classifier for steganalysis of digital media, IEEE TIFS, 7(2012), 432–444.
    [24] M. Dalal and M. Juneja, A robust and imperceptible steganography technique for SD and HD videos, MTAP, 2018, to appear. https://doi.org/10.1007/s11042-018-6093-3.
    [25] A. Ker and T. Pevný, A new paradigm for steganalysis via clustering, Proc. SPIE, Media Water-mark., Secur., Forens. III, 7880(2011), 78800U.
    [26] A. Ker and T. Pevný, The steganographer is the outlier: realistic large-scale steganalysis, IEEE TIFS, 9(2014), 1424–1435.
    [27] F. Li, K. Wu, J. Lei, et al., Steganalysis over large-scale social networks with high-order joint features and clustering ensembles, IEEE TIFS, 11(2016), 344–357.
  • Reader Comments
  • © 2019 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(4030) PDF downloads(491) Cited by(1)

Article outline

Figures and Tables

Figures(7)  /  Tables(9)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog