An Adaptive Video Steganography Based on Intra-prediction Mode and Cost Assignment

  • Lingyu ZhangEmail author
  • Xianfeng Zhao
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10082)


In this paper, we proposed an adaptive video steganography algorithm based on intra-prediction mode. Unlike traditional approaches locating the embedding position referring to the changed mode selection of I4-blocks which are randomly distributed across the whole I frame, our approach applies modifications in an adaptive way. Inspired by Fridrich et al.’s STC, costs assignment of candidate blocks are introduced to perform adaptive embedding perturbations within the optimal cost area which has the characteristic of complex texture. The perturbations are optimized with the hope that these perturbations will be confused with normal mode assignments that cannot be detected by state-of-art steganalytic methods. Experimental results have validated the feasibility of the proposed method.


Adaptive video steganography Intra-prediction mode Costs assignment Complex texture 



This work was supported by the NSFC under 61303259 and U1536105, National Key Technology R&D Program under 2014BAH41B01, Strategic Priority Research Program of CAS under XDA06030600, and Key Project of Institute of Information Engineering, CAS, under Y5Z0131201.


  1. 1.
    Wu, M., Liu, B.: Data hiding in image and video. I. Fundamental issues and solutions. IEEE Trans. Image Process. 12(6), 685–695 (2003)CrossRefGoogle Scholar
  2. 2.
    Jordan, F., Kutter, M., Ebrahimi, T.: Proposal of a watermarking technique for hiding/retrieving data in compressed and decompressed video. ISO/IEC Doc. JTC1/SC 29/QWG 11 MPEG 97/M 2281 (1997)Google Scholar
  3. 3.
    Liu, Z., Liang, H., Niu, X.: A robust video watermarking in motion vectors. In: Proceedings of the 2004 7th International Conference on Signal Processing, ICSP 2004, vol. 3, pp. 2358–2361. IEEE, Beijing, 31 August–4 September 2004Google Scholar
  4. 4.
    Ma, X., Li, Z., Tu, H.: A data hiding algorithm for H.264/AVC video stream without intra-frame distortion drift. IEEE Trans. Circuits Syst. Video Technol. 20(10), 1320–1330 (2010)CrossRefGoogle Scholar
  5. 5.
    Neufeld, A., Ker, A.: A study of embedding operation and locations for steganography in H.264 video. In: Proceedings of IS&T/SPIE Electronic Imaging, vol. 8665, pp. 86650J:1–86650J:14. International Society for Optics and Photonics (2013)Google Scholar
  6. 6.
    Lu, C., Chen, J., Fan, K.: Real-time frame-dependent video watermarking in VLC domain. Sig. Process. Image Commun. 20(7), 624–642 (2005)CrossRefGoogle Scholar
  7. 7.
    Seo, Y., Choi, H., Lee, C.: Low-complexity watermarking based on entropy coding in H.264/AVC. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91(8), 2130–2137 (2008)CrossRefGoogle Scholar
  8. 8.
    Wiegand, T., Sullivan, G.J., Bjntegaard, G., Luthra, A.: Overview of the H.264/AVC video coding standard. IEEE Trans. Circ. Syst. Video Technol. 13(7), 560–576 (2003)CrossRefGoogle Scholar
  9. 9.
    Hu, Y., Zhang, C., Su, Y.: Information hiding based on intra prediction modes for H.264/AVC. In: Proceedings of 2007 IEEE International Conference on Multimedia and Expo, ICME 2007, pp. 1231–1234. IEEE, Beijing, 2–5 July 2007Google Scholar
  10. 10.
    Xu, D., Wang, R., Wang, J.: Prediction mode modulated data-hiding algorithm for H.264/AVC. J. Real-Time Image Proc. 7(4), 205–214 (2012)CrossRefGoogle Scholar
  11. 11.
    Yang, G., Li, J., He, Y.: An information hiding algorithm based on intra-prediction modes and matrix coding for H.264/AVC video stream. Int. J. Electron. Commun. 65(4), 331–337 (2011)CrossRefGoogle Scholar
  12. 12.
    Bouchama, S., Hamami, L., Aliane, H.: H.264/AVC Data hiding based on intra prediction modes for real-time application. In: Proceedings of the World Congress on Engineering and Computer Science, vol. 1, pp. 655–658 (2012)Google Scholar
  13. 13.
    Fridrich, J., Filler, T.: Practical methods for minimizing embedding impact is steganography. In: Proceedings SPIE, EI, Security, Steganography, and Watermarking of Multimedia Contents IX, San Jose, CA, vol. 6505, pp. 2–3, 29 January–1 February 2007Google Scholar
  14. 14.
    Filler, T., Fridrich, J., Judas, J.: Minimizing embedding impact in steganography using Trellis-Coded quantization. In: Proceedings SPIE, EI, Media Forensics and Security XII, San Jose, CA, pp. 05-1–05-14, 18–20 January 2010Google Scholar
  15. 15.
    Kim, J., Jeong, J.: Fast intra mode decision algorithm using the sum of absolute transformed differences. In: Proceedings of 2011 International Conference on Digital Image Computing: Techniques and Applications, DICTA 2011, pp. 655–659. IEEE (2011)Google Scholar
  16. 16.
    Haralick, R.M., Shanmugam, K., Dinstein, I.: Texture features for image classification. IEEE Trans. Syst. Man Cybern. 3(6), 610–621 (1973)CrossRefGoogle Scholar
  17. 17.
    Equitz, W., Niblack, W.: Retrieving images from a database using texture-algorithms from the QBIC system. In: Technical Report. RJ 9805, Computer Science, IBM Research Report (1994)Google Scholar
  18. 18.
    Hong, J.G.: The texture analysis based on gary-gradient co-occurrence matrix. Acta Automatica Sinica 10(1), 22–25 (1984)MathSciNetGoogle Scholar
  19. 19.
    Li, S., Deng, H., Tian, H.: Steganalytic of prediction mode modulated data-hiding algorithms in H.264/AVC video stream. Annals of telecommunications-annales des télécommunications, 69(7–8), 461–473 (2014)Google Scholar
  20. 20.
    Zhao, Y., Zhang, H., Cao, Y., Wang, P., Zhao, X.: Video steganalysis based on intra prediction mode calibration. In: Shi, Y.-Q., Kim, H.J., Pérez-González, F., Echizen, I. (eds.) IWDW 2015. LNCS, vol. 9569, pp. 119–133. Springer, Heidelberg (2016). doi: 10.1007/978-3-319-31960-5_11 CrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  1. 1.State Key Laboratory of Information Security, Institute of Information EngineeringChinese Academy of SciencesBeijingChina
  2. 2.University of Chinese Academy of SciencesBeijingChina

Personalised recommendations