AI Chat Paper
Note: Please note that the following content is generated by AMiner AI. SciOpen does not take any responsibility related to this content.
{{lang === 'zh_CN' ? '文章概述' : 'Summary'}}
{{lang === 'en_US' ? '中' : 'Eng'}}
Chat more with AI
PDF (775 KB)
Collect
Submit Manuscript AI Chat Paper
Show Outline
Outline
Show full outline
Hide outline
Outline
Show full outline
Hide outline
Open Access

Novel Video Steganography Algorithm Based on Secret Sharing and Error-Correcting Code for H.264/AVC

Yingnan Zhang( )Minqing ZhangXiaoyuan YangDuntao GuoLongfei Liu
Key Laboratory of Network & Information Security of PAP, Engineering College of PAP, Xi’an 710086, China.
Show Author Information

Abstract

In this paper, we analyze the video steganography technique, which is used to ensure national security and the confidentiality of the information of governmental agencies and enterprises. Videos may be used to transmit secrets and conduct covert communication. As such, we present an algorithm based on a secret sharing scheme and an Error-Correcting Code (ECC), which combines Grey Relational Analysis (GRA) with a partition mode in video compression standard H.264/AVC. First, we process secret information by secret sharing, and then use an ECC to process the obtained information. Moreover, we choose the Discrete Cosine Transform (DCT) blocks using GRA, and then use rules to hide the pretreated information in DCT coefficients of the video frames. Experimental results indicate that our algorithm has good invisibility, better robustness, good anti-steganalysis ability, and little influence on the bit rate of the video carrier. In addition, the bit error rate is low after attacks such as noise, filtering, or frame loss in the simulation environment.

References

[1]
Filler T., Judas J., and Fridrich J., Minimizing additive distortion in steganography using syndrome-trellis codes, IEEE Trans. on Information Forensics and Security, vol. 6, no. 3, pp. 169-174, 2011.
[2]
Lee Y. and Chen L., An adaptive image steganographic model based on minimum-error LSB replacement, in Proc.of the Ninth National Conference on Information Security, Taichung, China, 1999, pp. 8-15.
[3]
Mielikainen J., LSB matching revisited, IEEE Signal Processing Letters, vol. 13, no. 5, pp. 285-287, 2006.
[4]
Kawaguchi E. and Eason R., Principles and applications of BPCS steganography, in Proceedings of SPIE—the International Society for Optics and Photonics East, 1999, pp. 464-473.
[5]
Westfeld A., F5-a steganographic algorithm, Lecture Notes in Computer Science, vol. 2137, pp. 289-302, 2001.
[6]
Fridrich J., Pevny T., and Kodovsky J., Statistically undetectable jpeg steganography: Dead ends challenges, and opportunities, in Proc. of the 9th Workshop on Multimedia & Security, Dallas, TX, USA, 2007, p. 3-14.
[7]
Kim Y., Duric Z., and Richards D., Modified matrix encoding technique for minimal distortion steganography, Lecture Notes in Computer Science, vol. 4437, pp. 314-327, 2007.
[8]
Provos N., Defending against statistical steganalysis, in SSYM’01 Proceedings of the 10th Conference on USENIX Security Symposium, Washington DC, USA, 2001, pp. 323-336.
[9]
Pevny T., Filler T., and Bas P., Using high-dimensional image models to perform highly undetectable steganography, Lecture Notes in Computer Science, vol. 6387, pp. 161-177, 2010.
[10]
Holub V. and Fridrich J., Designing steganographic distortion using directional filters, in IEEE International Workshop on Information Forensics and Security, Tenerife, Spain, 2012, pp. 234-239.
[11]
Fridrich J. and Kodovsky J., Multivariate Gaussian model for designing additive distortion for steganography, in 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing, Vancouver, Canada, 2013, pp. 2949-2953.
[12]
Guo L., Ni J., and Shi Y., Uniform embedding for efficient JPEG steganography, IEEE Transactions on Information Forensics and Security, vol. 9, no. 5, pp. 814-525, 2014.
[13]
Mstafa R. and Elleithy K., A highly secure video steganography using Hamming code (7, 4), in IEEE Long Island Systems, Applications and Technology Conf., New York, NY, USA, 2014, pp. 1-6.
[14]
Sadek M., Khalifa A., and Mostafa M., Video steganography: A comprehensive review, Multimedia Tools & Applications, vol. 74, no. 17, pp. 1-32, 2014.
[15]
Divya K. and Mahesh K., Random image embedded in videos using LSB insertion algorithm, International Journal of Engineering Trends & Technology, vol. 13, no. 8, pp. 381-385, 2014.
[16]
Churin K., Preechasuk J., and Chantrapornchai C., Exploring video steganography for hiding images based on similar lifting wavelet coefficients, in Advances in Information Technology. Springer, 2013.
[17]
Richardson I., H. 264 and MPEG-4 Video Compression: Video Coding for Next-Generation Multimedia. John Wiley & Sons, 2004.
[18]
Zhang J., Ho A., and Qiu G., Robust video watermarking of H. 264/AVC, IEEE Transactions on Circuits and Systems II: Express Briefs, vol. 54, no. 2, pp. 205-209, 2007
[19]
Singh S. and Siddiqui T., A security enhanced robust steganography algorithm for data hiding, International Journal of Computer Science Issues, vol. 9, no. 1, pp. 131-139, 2012.
[20]
Liu Y., Li Z., and Ma X., A robust without intra-frame distortion drift data hiding algorithm based on H. 264/AVC, Multimedia Tools and Applications, vol. 72, no. 1, pp. 613-636, 2014.
[21]
Zhang Y., Zhang M., and Wang J., A novel information hiding algorithm based on grey relational analysis for H. 264/AVC, in 2015 International Conference on Intelligent Networking and Collaborative Systems, Taipei, China, 2015 pp. 365-369.
[22]
Guizani S. and Nasser N., An audio/video crypto— Adaptive optical steganography technique, in 2012 8th International Wireless Communications and Mobile Computing Conference, Limassol, Cyprus, 2012, pp. 1057-1062.
[23]
Geetha C. and Puttamadappa C., Enhanced stego-crypto techniques of data hiding through geometrical figures in an image, in 2015 2nd International Conference on Electronics and Communication Systems, Cairo, Egypt, 2015, pp. 116-122.
[24]
Chai Y., An improved secret image sharing scheme with steganography, in 2011 International Conference on Mechatronic Science, Electric Engineering and Computer, Jilin, China, 2011, pp. 1335-1338.
[25]
Li L., El-Latif A., and Yan X., A lossless secret image sharing scheme based on steganography, in 2012 2nd International Conference on Instrumentation, Measurement, Computer, Communication and Control, Hangzhou, China, 2012, pp. 1247-1250.
[26]
Li X., Hu K., and Zhang G., An adaptive video watermarking based on secret image sharing, in 2012 5th International Symposium on Computational Intelligence and Design, Hangzhou, China, 2012, pp. 359-362.
[27]
Surekha B. and Swamy G., A semi-blind image watermarking based on discrete wavelet transform and secret sharing, in 2012 International Conference on Communication, Information & Computing Technology, Mumbai, India, 2012, pp. 1-5.
[28]
Patil S. and Deshmukh P., Verifiable image secret sharing in matrix projection using watermarking, in 2014 International Conference on Circuits, Systems, Communication and Information Technology Applications, 2014, pp. 225-229.
[29]
Sullivan G. and Wiegand T., Rate-distortion optimization for video compression, Signal Processing Magazine, vol. 15, no. 6, pp. 74-90, 1998.
[30]
Shamir A., How to share a secret, Communications of the ACM, vol. 22, no. 11, pp. 612-613, 1979.
[31]
Bjorck A. and Pereyra V., Solution of Vandermonde systems of equations, Mathematics of Computation, vol. 24, no. 112, pp. 893-903, 1970.
[32]
Ben-Israel A., A Cramer rule for least-norm solutions of consistent linear equations, Linear Algebra and Its Applications, vol. 43, pp. 223-226, 1982.
[33]
Moon T. K., Error Correction Coding: Mathematical Methods and Algorithms. Wiley, 2005.
[34]
Kasami T., Weight distributions of Bose-Chaudhuri- Hocquenghem codes, Report no. R-317, Coordinated Science Laboratory, University of Illinois at Urbana-Champaign, USA, Aug. 1966.
[35]
Liveris A., Xiong Z., and Georghiades C., Compression of binary sources with side information at the decoder using LDPC codes, IEEE Communications Letters, vol. 6, no. 10, pp. 440-442, 2002.
[36]
Gaborit P., Murat G., Ruatta O., Zémor G., Low rank parity check codes and their application to cryptography, in the International Workshop on Coding and Cryptography, Bergen, Norway, 2013, pp. 168-180.
[37]
Berlekamp E., Goppa codes, IEEE Transactions on Information Theory, vol. 19, no. 5, pp. 590-592, 1973.
[38]
Hamming R., Error detecting and error correcting codes, Bell System Technical Journal, vol. 29, no. 2, pp. 147-160, 1950.
[39]
Hu G., Zhang H., and Wang L., A class of the hamming weight hierarchy of linear codes with dimension 5, Tsinghua Science and Technology, vol. 19, no. 5, pp. 442-451, 2014.
[40]
Deng J., Basic Method of Grey System Theory, (in Chinese). Wuhan, China: Huazhong University of Science and Technology Press, 2005.
[41]
Heidari M. and Gaemmaghami S., Universal image steganalysis using singular values of dct coefficients, in 2013 10th International ISC Conference on Information Security and Cryptology, Yazd, Iran, 2013, pp. 1-5.
[42]
Gonzalez R. C. and Woods R. E., Digital Image Processing, (in Chinese), Beijing, China: Publishing House of Electronics Industry, 2000.
Tsinghua Science and Technology
Pages 198-209
Cite this article:
Zhang Y, Zhang M, Yang X, et al. Novel Video Steganography Algorithm Based on Secret Sharing and Error-Correcting Code for H.264/AVC. Tsinghua Science and Technology, 2017, 22(2): 198-209. https://doi.org/10.23919/TST.2017.7889641

746

Views

30

Downloads

20

Crossref

N/A

Web of Science

25

Scopus

0

CSCD

Altmetrics

Received: 20 April 2016
Revised: 23 May 2016
Accepted: 30 June 2016
Published: 06 April 2017
© The author(s) 2017
Return