Skip to main content
Top

2015 | OriginalPaper | Chapter

A Steganography Algorithm Using Multidimensional Coefficient Matching for H.264/AVC

Authors : Liyun Qian, Zhitang Li, Bing Feng

Published in: Intelligent Computing Theories and Methodologies

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Diamond encoding (DE) and adaptive pixel pair matching (APPM) are two data-hiding methods recently proposed. The APPM offers lower distortion than DE by providing more compact neighborhood sets and allowing embedded digits in any notational system. This paper proposes a new data-hiding method based on multidimensional coefficient matching (MCM). The proposed algorithm increases the dimension of coefficient, but reduces the magnitude of the coefficient modification. So it can provide better performance and Security than APPM. The proposed method also embeds more messages per modification and thus increases the embedding efficiency and the visual quality of the video.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Hong, W., Chen, T.S.: A novel data embedding method using adaptive pixel pair matching. IEEE Trans. Inf. Forensics Secur. 7(1), 176–184 (2012)CrossRef Hong, W., Chen, T.S.: A novel data embedding method using adaptive pixel pair matching. IEEE Trans. Inf. Forensics Secur. 7(1), 176–184 (2012)CrossRef
2.
go back to reference Chao, R.M., Wu, H.C., Lee, C.C., Chu, Y.P: A novel image data hiding scheme with diamond encoding. EURASIP J. Inf. Security 2009, doi: 10.1155/2009/658047, Article ID 658047 (2009) Chao, R.M., Wu, H.C., Lee, C.C., Chu, Y.P: A novel image data hiding scheme with diamond encoding. EURASIP J. Inf. Security 2009, doi: 10.1155/2009/658047, Article ID 658047 (2009)
3.
go back to reference MA, X.J., Li, Z.T., Tu, H., Zhang, B.C.: A data hiding algorithm for H.264/AVC video streams without intra-frame distortion drift. IEEE Trans. Circ. Syst. Video Technol. 20(4), 1320–1330 (2010). (A SCI-indexed journals, signed by: Huazhong University of Science and Technology)CrossRef MA, X.J., Li, Z.T., Tu, H., Zhang, B.C.: A data hiding algorithm for H.264/AVC video streams without intra-frame distortion drift. IEEE Trans. Circ. Syst. Video Technol. 20(4), 1320–1330 (2010). (A SCI-indexed journals, signed by: Huazhong University of Science and Technology)CrossRef
4.
go back to reference Ma, X.J., Li, Z.T., Lv, J., Wang, W.D.: Data hiding in H.264/AVC streams with limited intra-frame distortion drift. (EI included,signed by: Huazhong University of Science and Technology) Ma, X.J., Li, Z.T., Lv, J., Wang, W.D.: Data hiding in H.264/AVC streams with limited intra-frame distortion drift. (EI included,signed by: Huazhong University of Science and Technology)
5.
go back to reference Song, G.H., Li, Z.T., Zhao, J., Tu, H., Cheng, J.X.: A video steganography algorithm for MVC without distortion drift. In: 4th International Conference on Audio, Language and Image Processing (ICALIP). (EI included,signed by: Huazhong University of Science and Technology) Song, G.H., Li, Z.T., Zhao, J., Tu, H., Cheng, J.X.: A video steganography algorithm for MVC without distortion drift. In: 4th International Conference on Audio, Language and Image Processing (ICALIP). (EI included,signed by: Huazhong University of Science and Technology)
6.
go back to reference Song, G.H., Li, Z.T., Zhao, J., Zou, M.G.: A data hiding algorithm for 3D videos based on inter-MBs. In: 2014 Tenth International Conference on Intelligent Computing (ICIC2014). (EI included,signed by: Huazhong University of Science and Technology) Song, G.H., Li, Z.T., Zhao, J., Zou, M.G.: A data hiding algorithm for 3D videos based on inter-MBs. In: 2014 Tenth International Conference on Intelligent Computing (ICIC2014). (EI included,signed by: Huazhong University of Science and Technology)
7.
go back to reference Tew, Y., Wong, K.: An overview of information hiding in H.264/AVC compressed video. IEEE Trans. Circ. Syst. Video Technol. 24, 305–319 (2014)CrossRef Tew, Y., Wong, K.: An overview of information hiding in H.264/AVC compressed video. IEEE Trans. Circ. Syst. Video Technol. 24, 305–319 (2014)CrossRef
8.
go back to reference Kim, S.-M., Kim, S.B., Hong, Y., Won, C.S.: Data hiding on H.264/AVC compressed video. In: Kamel, M.S., Campilho, A. (eds.) ICIAR 2007. LNCS, vol. 4633, pp. 698–707. Springer, Heidelberg (2007)CrossRef Kim, S.-M., Kim, S.B., Hong, Y., Won, C.S.: Data hiding on H.264/AVC compressed video. In: Kamel, M.S., Campilho, A. (eds.) ICIAR 2007. LNCS, vol. 4633, pp. 698–707. Springer, Heidelberg (2007)CrossRef
9.
go back to reference Cheddad, A., Condell, J., Curran, K., McKevitt, P.: Digital image steganography: Survey and analysis of current methods. Signal Process. 90, 727–752 (2010)CrossRefMATH Cheddad, A., Condell, J., Curran, K., McKevitt, P.: Digital image steganography: Survey and analysis of current methods. Signal Process. 90, 727–752 (2010)CrossRefMATH
10.
go back to reference Filler, T., Judas, J., Fridrich, J.: Minimizing embedding impact in steganography using trellis-coded quantization. In: Proceedings SPIE Media Forensics and Security, vol. 7541, doi: 10.1117/12.838002 (2010) Filler, T., Judas, J., Fridrich, J.: Minimizing embedding impact in steganography using trellis-coded quantization. In: Proceedings SPIE Media Forensics and Security, vol. 7541, doi: 10.​1117/​12.​838002 (2010)
11.
go back to reference Lee, C.F., Chang, C.C., Wang, K.H.: An improvement of EMD embedding method for large payloads by pixel segmentation strategy. Image Vis. Comput. 26(12), 1670–1676 (2008)CrossRef Lee, C.F., Chang, C.C., Wang, K.H.: An improvement of EMD embedding method for large payloads by pixel segmentation strategy. Image Vis. Comput. 26(12), 1670–1676 (2008)CrossRef
12.
go back to reference Wu, D.C., Tsai, W.H.: A steganographic method for images by pixel value differencing. Pattern Recogn. Lett. 24(9), 1613–1626 (2003)CrossRefMATH Wu, D.C., Tsai, W.H.: A steganographic method for images by pixel value differencing. Pattern Recogn. Lett. 24(9), 1613–1626 (2003)CrossRefMATH
13.
go back to reference Wang, C.M.: A high quality steganographic method with pixel value differencing and modulus function. J. Syst. Softw. 81(1), 150–158 (2008)CrossRef Wang, C.M.: A high quality steganographic method with pixel value differencing and modulus function. J. Syst. Softw. 81(1), 150–158 (2008)CrossRef
14.
go back to reference Hong, W., Chen, T.S., Luo, C.W.: Data embedding using pixel value differencing and diamond encoding with multiple base notational system. J. Syst. Softw. 85(5), 1166–1175 (2012)CrossRef Hong, W., Chen, T.S., Luo, C.W.: Data embedding using pixel value differencing and diamond encoding with multiple base notational system. J. Syst. Softw. 85(5), 1166–1175 (2012)CrossRef
15.
go back to reference Miller, M.L., Doërr, G.J., Cox, I.J.: Applying informed coding and embedding to design a robust high-capacity watermark. IEEE Trans. Image Process. 13(6), 792–807 (2004)CrossRef Miller, M.L., Doërr, G.J., Cox, I.J.: Applying informed coding and embedding to design a robust high-capacity watermark. IEEE Trans. Image Process. 13(6), 792–807 (2004)CrossRef
16.
go back to reference Chen, C., Ni, J., Huang, J.: Temporal statistic based video watermarking scheme robust against geometric attacks and frame dropping. In: Ho, A.T., Shi, Y.Q., Kim, H.J., Barni, M. (eds.) IWDW 2009. LNCS, vol. 5703, pp. 81–95. Springer, Heidelberg (2009)CrossRef Chen, C., Ni, J., Huang, J.: Temporal statistic based video watermarking scheme robust against geometric attacks and frame dropping. In: Ho, A.T., Shi, Y.Q., Kim, H.J., Barni, M. (eds.) IWDW 2009. LNCS, vol. 5703, pp. 81–95. Springer, Heidelberg (2009)CrossRef
17.
go back to reference Lin, C.C., Shiu, P.F.: DCT-based reversible data hiding scheme. J. Softw. 5(2), 214–224 (2010)CrossRef Lin, C.C., Shiu, P.F.: DCT-based reversible data hiding scheme. J. Softw. 5(2), 214–224 (2010)CrossRef
18.
go back to reference Lin, Y.K.: A data hiding scheme based upon DCT coefficient modification. Comput. Stand. Interfaces 36, 855–858 (2014)CrossRef Lin, Y.K.: A data hiding scheme based upon DCT coefficient modification. Comput. Stand. Interfaces 36, 855–858 (2014)CrossRef
Metadata
Title
A Steganography Algorithm Using Multidimensional Coefficient Matching for H.264/AVC
Authors
Liyun Qian
Zhitang Li
Bing Feng
Copyright Year
2015
DOI
https://doi.org/10.1007/978-3-319-22186-1_22

Premium Partner