Video steganography using motion vector and linear block codes

A novel video steganography scheme based on motion vectors and linear block codes has been proposed in this paper. Our method embed secret messages in the motion vectors of cover media during the process of H.264 compressing. Linear block codes has been used to reducing the modification rate of the...

Full description

Saved in:
Bibliographic Details
Published in2010 IEEE International Conference on Software Engineering and Service Sciences pp. 592 - 595
Main Authors Feng Pan, Li Xiang, Xiao-Yuan Yang, Yao Guo
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.07.2010
Subjects
Online AccessGet full text
ISBN1424460549
9781424460540
ISSN2327-0586
DOI10.1109/ICSESS.2010.5552283

Cover

Abstract A novel video steganography scheme based on motion vectors and linear block codes has been proposed in this paper. Our method embed secret messages in the motion vectors of cover media during the process of H.264 compressing. Linear block codes has been used to reducing the modification rate of the motion vectors. The proposed steganographic scheme is not only has lowly computational complexity, but also has highly imperceptible to human being. Furthermore, the secret information can be extracted directly without using the original video sequences. Experiments are designed to prove the feasibility of the proposed method. Experimental results show that our proposed scheme can embed large amounts of information and can maintain good video quality as well.
AbstractList A novel video steganography scheme based on motion vectors and linear block codes has been proposed in this paper. Our method embed secret messages in the motion vectors of cover media during the process of H.264 compressing. Linear block codes has been used to reducing the modification rate of the motion vectors. The proposed steganographic scheme is not only has lowly computational complexity, but also has highly imperceptible to human being. Furthermore, the secret information can be extracted directly without using the original video sequences. Experiments are designed to prove the feasibility of the proposed method. Experimental results show that our proposed scheme can embed large amounts of information and can maintain good video quality as well.
Author Feng Pan
Yao Guo
Xiao-Yuan Yang
Li Xiang
Author_xml – sequence: 1
  surname: Feng Pan
  fullname: Feng Pan
  email: panfeng224@126.com
  organization: Key Lab. of Network & Inf. Security of APF, Eng. Coll. of the Armed Police Force, Xi'an, China
– sequence: 2
  surname: Li Xiang
  fullname: Li Xiang
  email: xiangli905@sohu.com
  organization: Key Lab. of Network & Inf. Security of APF, Eng. Coll. of the Armed Police Force, Xi'an, China
– sequence: 3
  surname: Xiao-Yuan Yang
  fullname: Xiao-Yuan Yang
  email: xyyangwj@126.com
  organization: Key Lab. of Network & Inf. Security of APF, Eng. Coll. of the Armed Police Force, Xi'an, China
– sequence: 4
  surname: Yao Guo
  fullname: Yao Guo
  email: guoyaomc@163.com
  organization: Key Lab. of Network & Inf. Security of APF, Eng. Coll. of the Armed Police Force, Xi'an, China
BookMark eNpFj01LAzEYhCNWsK39Bb3kD2x987WbXAQpVQsFD1u8lny8XaPbpOyuQv-9FQueZuY5DDMTMko5ISFzBgvGwNyvl_WqrhcczkApxbkWV2TCJJeyBKWq6_8gzYiMueBVAUqXt2TW9x8AIJg2wMSYPLzFgJn2AzY25aazx_cT_epjaughDzEn-o1-yB21KdA2JrQddW32n9TngP0dudnbtsfZRadk-7TaLl-Kzevzevm4KaKBoSiRg7KoNUgujDPWodtLW3onhTFcOGYCGu1EdZ7swHMuhde_1spgMIgpmf_VRkTcHbt4sN1pd7kufgDnGU0a
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ICSESS.2010.5552283
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE/IET Electronic Library
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE/IET Electronic Library
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISBN 1424460557
9781424460533
9781424460557
1424460530
EndPage 595
ExternalDocumentID 5552283
Genre orig-research
GroupedDBID 6IE
6IF
6IK
6IL
6IN
AAJGR
AAWTH
ABLEC
ADZIZ
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
IEGSK
IPLJI
OCL
RIE
RIL
ID FETCH-LOGICAL-i90t-6e205ae8804239b9abebf4a6cb439923b19de98b37460b0c2243c860b0a4d9ed3
IEDL.DBID RIE
ISBN 1424460549
9781424460540
ISSN 2327-0586
IngestDate Wed Aug 27 02:56:46 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i90t-6e205ae8804239b9abebf4a6cb439923b19de98b37460b0c2243c860b0a4d9ed3
PageCount 4
ParticipantIDs ieee_primary_5552283
PublicationCentury 2000
PublicationDate 2010-July
PublicationDateYYYYMMDD 2010-07-01
PublicationDate_xml – month: 07
  year: 2010
  text: 2010-July
PublicationDecade 2010
PublicationTitle 2010 IEEE International Conference on Software Engineering and Service Sciences
PublicationTitleAbbrev ICSESS
PublicationYear 2010
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0003189013
ssj0000452665
Score 1.5094202
Snippet A novel video steganography scheme based on motion vectors and linear block codes has been proposed in this paper. Our method embed secret messages in the...
SourceID ieee
SourceType Publisher
StartPage 592
SubjectTerms Arrays
Block codes
Lead
linear block codes
motion vector
PSNR
Receivers
Vectors
Video sequences
video steganography
Title Video steganography using motion vector and linear block codes
URI https://ieeexplore.ieee.org/document/5552283
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwELbaTrDwaBFveWAkrZvYSbywVFQFCcRQULfKZx9VVSlFbcrAr8eXR3mIgc3OkuRyznf2ffcdY1foYgFAxTFhSGlGAX5JKRlY8PBuJG2cC5bvYzx6lvcTNWmw620tDCIW5DPs0rDI5bul3dBRWU8pRWotTdZM0ris1dqep5A0eC3dRnPvqx7qoqK3XJgEQqVxXdflI3ipa7mnai4qRaK-0L27Af3KStpXdcsfvVcK6BnusYf6oUvGyaK7yaFrP37pOf73rfZZ56vIjz9t4euANTA7ZLvf9Anb7OZl7nDJvSPMTFZpW3Niys942f2HvxeH_txkjlO8alYcPDouOFXKrztsPLwdD0ZB1XAhmGuRBzGGQhn0K5pUAUEbQHiVJrZAm5Yw8p_UoU4hSrzJQFiP_pFNaWik0-iiI9bKlhkeM55qH4mhTiKMUPZRpWlsZWIdgFGUhD5hbTLE9K2U1JhWNjj9-_IZ2ymT9sSSPWetfLXBCx8L5HBZOMEnvveqPQ
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT8JAEJ4gHtSLDzC-3YNHC6XdbbsXL0QCCsQDGm5kH6MhJMUgePDXu9MHPuLB224vbaez_WZ3vvkG4Apt5GtNxTFBQGlGX7slJbhntIN3xWnjnLF8h1H3kd-NxbgC1-taGETMyGfYoGGWy7dzs6KjsqYQgtRaNmBTcM5FXq21PlEhcfBSvI3mzlsd2IVZd7kg9nyRRGVll4vhuSwFn4q5X2gStXzZ7LXpZ5YTv4qb_ui-koFPZxcG5WPnnJNZY7XUDfPxS9Hxv--1B_WvMj_2sAawfahgegA73xQKa3DzNLU4Z84VXlRaqFsz4sq_sLz_D3vPjv2ZSi2jiFUtmHb4OGNUK_9Wh1HndtTuekXLBW8q_aUXYeALhW5Nky6glkqjfuYqMpq2LUHoPqpFmegwdibTvnH4H5qEhopbiTY8hGo6T_EIWCJdLIYyDjFE3kKRJJHhsbFaK0Fp6GOokSEmr7moxqSwwcnfly9hqzsa9Cf93vD-FLbzFD5xZs-gulys8NxFBkt9kTnEJ-J6rYo
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2010+IEEE+International+Conference+on+Software+Engineering+and+Service+Sciences&rft.atitle=Video+steganography+using+motion+vector+and+linear+block+codes&rft.au=Feng+Pan&rft.au=Li+Xiang&rft.au=Xiao-Yuan+Yang&rft.au=Yao+Guo&rft.date=2010-07-01&rft.pub=IEEE&rft.isbn=9781424460540&rft.issn=2327-0586&rft.spage=592&rft.epage=595&rft_id=info:doi/10.1109%2FICSESS.2010.5552283&rft.externalDocID=5552283
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2327-0586&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2327-0586&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2327-0586&client=summon