Video steganography using motion vector and linear block codes
A novel video steganography scheme based on motion vectors and linear block codes has been proposed in this paper. Our method embed secret messages in the motion vectors of cover media during the process of H.264 compressing. Linear block codes has been used to reducing the modification rate of the...
        Saved in:
      
    
          | Published in | 2010 IEEE International Conference on Software Engineering and Service Sciences pp. 592 - 595 | 
|---|---|
| Main Authors | , , , | 
| Format | Conference Proceeding | 
| Language | English | 
| Published | 
            IEEE
    
        01.07.2010
     | 
| Subjects | |
| Online Access | Get full text | 
| ISBN | 1424460549 9781424460540  | 
| ISSN | 2327-0586 | 
| DOI | 10.1109/ICSESS.2010.5552283 | 
Cover
| Abstract | A novel video steganography scheme based on motion vectors and linear block codes has been proposed in this paper. Our method embed secret messages in the motion vectors of cover media during the process of H.264 compressing. Linear block codes has been used to reducing the modification rate of the motion vectors. The proposed steganographic scheme is not only has lowly computational complexity, but also has highly imperceptible to human being. Furthermore, the secret information can be extracted directly without using the original video sequences. Experiments are designed to prove the feasibility of the proposed method. Experimental results show that our proposed scheme can embed large amounts of information and can maintain good video quality as well. | 
    
|---|---|
| AbstractList | A novel video steganography scheme based on motion vectors and linear block codes has been proposed in this paper. Our method embed secret messages in the motion vectors of cover media during the process of H.264 compressing. Linear block codes has been used to reducing the modification rate of the motion vectors. The proposed steganographic scheme is not only has lowly computational complexity, but also has highly imperceptible to human being. Furthermore, the secret information can be extracted directly without using the original video sequences. Experiments are designed to prove the feasibility of the proposed method. Experimental results show that our proposed scheme can embed large amounts of information and can maintain good video quality as well. | 
    
| Author | Feng Pan Yao Guo Xiao-Yuan Yang Li Xiang  | 
    
| Author_xml | – sequence: 1 surname: Feng Pan fullname: Feng Pan email: panfeng224@126.com organization: Key Lab. of Network & Inf. Security of APF, Eng. Coll. of the Armed Police Force, Xi'an, China – sequence: 2 surname: Li Xiang fullname: Li Xiang email: xiangli905@sohu.com organization: Key Lab. of Network & Inf. Security of APF, Eng. Coll. of the Armed Police Force, Xi'an, China – sequence: 3 surname: Xiao-Yuan Yang fullname: Xiao-Yuan Yang email: xyyangwj@126.com organization: Key Lab. of Network & Inf. Security of APF, Eng. Coll. of the Armed Police Force, Xi'an, China – sequence: 4 surname: Yao Guo fullname: Yao Guo email: guoyaomc@163.com organization: Key Lab. of Network & Inf. Security of APF, Eng. Coll. of the Armed Police Force, Xi'an, China  | 
    
| BookMark | eNpFj01LAzEYhCNWsK39Bb3kD2x987WbXAQpVQsFD1u8lny8XaPbpOyuQv-9FQueZuY5DDMTMko5ISFzBgvGwNyvl_WqrhcczkApxbkWV2TCJJeyBKWq6_8gzYiMueBVAUqXt2TW9x8AIJg2wMSYPLzFgJn2AzY25aazx_cT_epjaughDzEn-o1-yB21KdA2JrQddW32n9TngP0dudnbtsfZRadk-7TaLl-Kzevzevm4KaKBoSiRg7KoNUgujDPWodtLW3onhTFcOGYCGu1EdZ7swHMuhde_1spgMIgpmf_VRkTcHbt4sN1pd7kufgDnGU0a | 
    
| ContentType | Conference Proceeding | 
    
| DBID | 6IE 6IL CBEJK RIE RIL  | 
    
| DOI | 10.1109/ICSESS.2010.5552283 | 
    
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE/IET Electronic Library IEEE Proceedings Order Plans (POP All) 1998-Present  | 
    
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE/IET Electronic Library url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher  | 
    
| DeliveryMethod | fulltext_linktorsrc | 
    
| Discipline | Engineering | 
    
| EISBN | 1424460557 9781424460533 9781424460557 1424460530  | 
    
| EndPage | 595 | 
    
| ExternalDocumentID | 5552283 | 
    
| Genre | orig-research | 
    
| GroupedDBID | 6IE 6IF 6IK 6IL 6IN AAJGR AAWTH ABLEC ADZIZ ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IEGSK IPLJI OCL RIE RIL  | 
    
| ID | FETCH-LOGICAL-i90t-6e205ae8804239b9abebf4a6cb439923b19de98b37460b0c2243c860b0a4d9ed3 | 
    
| IEDL.DBID | RIE | 
    
| ISBN | 1424460549 9781424460540  | 
    
| ISSN | 2327-0586 | 
    
| IngestDate | Wed Aug 27 02:56:46 EDT 2025 | 
    
| IsPeerReviewed | false | 
    
| IsScholarly | false | 
    
| Language | English | 
    
| LinkModel | DirectLink | 
    
| MergedId | FETCHMERGED-LOGICAL-i90t-6e205ae8804239b9abebf4a6cb439923b19de98b37460b0c2243c860b0a4d9ed3 | 
    
| PageCount | 4 | 
    
| ParticipantIDs | ieee_primary_5552283 | 
    
| PublicationCentury | 2000 | 
    
| PublicationDate | 2010-July | 
    
| PublicationDateYYYYMMDD | 2010-07-01 | 
    
| PublicationDate_xml | – month: 07 year: 2010 text: 2010-July  | 
    
| PublicationDecade | 2010 | 
    
| PublicationTitle | 2010 IEEE International Conference on Software Engineering and Service Sciences | 
    
| PublicationTitleAbbrev | ICSESS | 
    
| PublicationYear | 2010 | 
    
| Publisher | IEEE | 
    
| Publisher_xml | – name: IEEE | 
    
| SSID | ssj0003189013 ssj0000452665  | 
    
| Score | 1.5094202 | 
    
| Snippet | A novel video steganography scheme based on motion vectors and linear block codes has been proposed in this paper. Our method embed secret messages in the... | 
    
| SourceID | ieee | 
    
| SourceType | Publisher | 
    
| StartPage | 592 | 
    
| SubjectTerms | Arrays Block codes Lead linear block codes motion vector PSNR Receivers Vectors Video sequences video steganography  | 
    
| Title | Video steganography using motion vector and linear block codes | 
    
| URI | https://ieeexplore.ieee.org/document/5552283 | 
    
| hasFullText | 1 | 
    
| inHoldings | 1 | 
    
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwELbaTrDwaBFveWAkrZvYSbywVFQFCcRQULfKZx9VVSlFbcrAr8eXR3mIgc3OkuRyznf2ffcdY1foYgFAxTFhSGlGAX5JKRlY8PBuJG2cC5bvYzx6lvcTNWmw620tDCIW5DPs0rDI5bul3dBRWU8pRWotTdZM0ris1dqep5A0eC3dRnPvqx7qoqK3XJgEQqVxXdflI3ipa7mnai4qRaK-0L27Af3KStpXdcsfvVcK6BnusYf6oUvGyaK7yaFrP37pOf73rfZZ56vIjz9t4euANTA7ZLvf9Anb7OZl7nDJvSPMTFZpW3Niys942f2HvxeH_txkjlO8alYcPDouOFXKrztsPLwdD0ZB1XAhmGuRBzGGQhn0K5pUAUEbQHiVJrZAm5Yw8p_UoU4hSrzJQFiP_pFNaWik0-iiI9bKlhkeM55qH4mhTiKMUPZRpWlsZWIdgFGUhD5hbTLE9K2U1JhWNjj9-_IZ2ymT9sSSPWetfLXBCx8L5HBZOMEnvveqPQ | 
    
| linkProvider | IEEE | 
    
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT8JAEJ4gHtSLDzC-3YNHC6XdbbsXL0QCCsQDGm5kH6MhJMUgePDXu9MHPuLB224vbaez_WZ3vvkG4Apt5GtNxTFBQGlGX7slJbhntIN3xWnjnLF8h1H3kd-NxbgC1-taGETMyGfYoGGWy7dzs6KjsqYQgtRaNmBTcM5FXq21PlEhcfBSvI3mzlsd2IVZd7kg9nyRRGVll4vhuSwFn4q5X2gStXzZ7LXpZ5YTv4qb_ui-koFPZxcG5WPnnJNZY7XUDfPxS9Hxv--1B_WvMj_2sAawfahgegA73xQKa3DzNLU4Z84VXlRaqFsz4sq_sLz_D3vPjv2ZSi2jiFUtmHb4OGNUK_9Wh1HndtTuekXLBW8q_aUXYeALhW5Nky6glkqjfuYqMpq2LUHoPqpFmegwdibTvnH4H5qEhopbiTY8hGo6T_EIWCJdLIYyDjFE3kKRJJHhsbFaK0Fp6GOokSEmr7moxqSwwcnfly9hqzsa9Cf93vD-FLbzFD5xZs-gulys8NxFBkt9kTnEJ-J6rYo | 
    
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2010+IEEE+International+Conference+on+Software+Engineering+and+Service+Sciences&rft.atitle=Video+steganography+using+motion+vector+and+linear+block+codes&rft.au=Feng+Pan&rft.au=Li+Xiang&rft.au=Xiao-Yuan+Yang&rft.au=Yao+Guo&rft.date=2010-07-01&rft.pub=IEEE&rft.isbn=9781424460540&rft.issn=2327-0586&rft.spage=592&rft.epage=595&rft_id=info:doi/10.1109%2FICSESS.2010.5552283&rft.externalDocID=5552283 | 
    
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2327-0586&client=summon | 
    
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2327-0586&client=summon | 
    
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2327-0586&client=summon |