999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

Defining Embedding Distortion for Intra Prediction Mode-Based Video Steganography

2018-06-01 11:12:14QiankaiNieXubaXuBingwenFengandLeoYuZhang
Computers Materials&Continua 2018年4期
關鍵詞:肝功能肝癌意義

Qiankai Nie, Xuba Xu, Bingwen Feng, and Leo Yu Zhang

1 Introduction

Steganography is a technique on secret communication, where a sender embeds secrets into covers, such as videos, audios, images, etc. and does not allow the others to detect the embedding event, except for the recipient. For the steganalysis, the main task is to detect whether in the carrier a secret message is hidden or not. With the rapid popularity of multimedia, compressed video has become one of the most popular carriers for information hiding. Therefore, a series of video steganographic schemes have been proposed, which also buoys the development of video steganalytic methods.

In recent years, adaptive stego-coding technique such as wet paper codes (WPCs)[Fridrich, Goljan, Lisonek et al. (2005)] and Syndrome-trellis code (STC) [Filler, Judas and Fridrich (2011)] have been presented. STC is regarded as the most effective coding method for steganography, because it separates the distortion definition and the distortion minimization. Furthermore, the recipient can extract the secret data without the knowledge about the definition. By applying these mature coding techniques, video steganography can focus on defining the distortion function. Cao et al. [Cao, Zhang, Zhao et al. (2015)] defined the distortion function by considering the motion vector (MV)’s local optimality. Wang et al. [Wang, Zhang, Cao et al. (2016)] combined motion characteristics of video content, MV’s local optimality and statistical distribution together to define the distortion function.

Video steganographic methods can be studied according to different modification such as motion vectors, quantized DCT coefficients, variable length codes and intra prediction modes (IPMs). Intra prediction mode-based video steganographic method can preserve the video quality perfectly [Bouchama, Hamami and Aliane (2012)]. The early IPMsbased approaches [Hu, Zhang and Su (2007); Xu, Wang and Wang (2012)] only modulate the intra prediction modes of qualified intra 4×4 luminance blocks for data hiding. In order to improve the embedding capacity, Yang et al. [Yang, Li, He et al.(2011)] introduced matrix coding to hiding two bits information by modifying one IPM.Bouchama et al. [Bouchama, Hamami and Aliane (2012)] increased the capacity by grouping the IPMs and modifying them within the same group. However, in these methods, non-optimal selection rules destroy the optimalities of IPMs seriously, which was easily detected by Zhao et al.’s [Zhao, Zhang, Cao et al. (2015)] IPMs calibration(IPMC) steganalytic method. Machine learning has been widely used as an effective detection method [Chang and Lin (2011); Gurusamy and Subramaniam (2017)],especially in steganalysis.

This paper proposes a video steganographic scheme by embedding message bits into intra predictions of video encoding. Inspired by the prediction mode reversion phenomenon caused by increasing the SAD value, the SAD prediction deviation (SPD) is considered in defining the distortion function. Moreover, mapping rule is introduced to expand the range of selectable modes for each block. In this way, we can preserve the optimality of IPMs is maximally preserved at a given embedding rate during the embedding process,which can effectively resist the detect by Zhao et al. [Zhao, Zhang, Cao et al. (2015)].

The rest of this paper is organized as follows. In Section 2, we describe the framework of the distortion minimization for IPMs-based steganograpy. The proposed distortion function and mapping rule are elaborated in Section 3. The practical implementation is presented in Section 4. The experimental evaluation is shown in Section 5. In the end,conclusions and future works are given in Section 6.

2 Framework of distortion minimization for steganography

The minimal-distortion steganographic schemes focuse on the definition of distortion function and the choice of cover. The following is a common framework.

In the coding process, the cover sequence is denoted by, and theis an integer, such as the mode value of an intra-block. What is more, non-negative additive distortionsare defined for each cover element in advance, whereis the i-th element in the stego vector. Assuming thatbits secret binary message e is to be embedded with the payload, STCs (Syndrome-Trellis Codes)[Filler, Judas and Fridrich (2011)] perform the embedding operation as the kernel of this framework:

s.t.

whereis the stego embeded with secret message, φ(e)is the coset corresponding to syndrome e and the overall distortion. At the extractor, the operation is simply computing.

3 Proposed approach

3.1 Mode prediction

Video compression can effectively compress a raw video into a smaller compressed one by using coding techniques, which facilitates the transmission on the network as well as storage on hardware [Wiegand, Sullivan, Bjontegaard et al. (2003)]. The compression technique mainly uses the redundancy of a video frame and the high similarity between adjacent intra-macroblocks. In this paper, intra-44 blocks (intra-4B) are used as carriers for the data embedding, while those intra-1616 blocks are not changed because they are used for coding smooth regions that are not suitable for modification. H.264, a state-ofthe-art video coding standards, contains 9 intra prediction modes based on prediction direction shown as Fig. 1.

Figure 1: Intra 44 prediction modes

Since the SAD is determined by the original pixels of the macroblock and the reconstruction pixels, choosing the mode of the minimum SAD (Sum of Absolute Difference) [Kim and Jeong (2012)] to code can minimize the bit rate and ensure the quality of video compression. The SAD of i-th intra-4B in t-th intra-frame is given by:

where B is the current intra-4B. Oi,t(x, y) respents the original value of the pixel (x, y) and Ri,t(x, y) is the reconstruction pixels associated with prediction mode.

3.2 SAD prediction deviation

Calibration-based steganalysis [Fridrich and Kodovsky (2012)] reconstructs an estimation of the cover from the stego object and draws features based on the difference between the two, which can achieve a high detection accuracy. Zhao et al. [Zhao, Zhang, Cao et al.(2015)] proposed the IPMC features based on the calibration method, which is sensitive to the non-optimal IPMs. During the intra-frame coding process, intra-4B will select the minimum SAD mode to code, so the intra-4B’s SAD will also be changed when we modify the intra-frame optimal prediction mode for the embedding target. After the calibration process, the non-optimal prediction modes will tend to restore the original optimal value, implying that the block is not coded according to the optimal prediction mode. In addition, based on the prediction mode reversion phenomenon, our study has observed the fact that different degrees of changing the prediction SAD lead to different reversal probabilities.

An example is illustrated as in Fig. 2. In order to take a look at the reversion phenomenon of modified intra-4Bs, a test sequence “Coastguard.yuv” (CIF, 352288) from video database [YUV (2008)] is used to calibrate with a customized H.264 codec named x264[x264 (2010)]. Modifying rate (MR) 0.35 and 0.5 represent modifying 35 percent and 50 percent of the total number of blocks, respectively. At the encoder, these specified original blocks are first coded with the optimal prediction mode with minimum SAD.Then, the second and third best modes are used instead of the optimal one for comparison.At the decoder, these modified blocks are reconstructed and then undergo recompression with the standard prediction method. It can be seen from Fig. 2 that a lower level mode,which yields a larger change on SAD, makes the reversion phenomenon more frequent.

Figure 2: Reversion phenomenon of (a) 0.35 modifying rate and (b) 0.5 modifying rate on different mode level

Fig. 2 indicates that the SAD change of prediction mode is a key factor to construct the distortion function. If a candidate modeis given during intra predition, the SAD prediction deviation (SPD) is formulated as

whereis the prediction SAD of the optimal modeassociated with the ith prediction block in the t-th key frame.

When steganalyzer utilizes calibration to determine whether a sequence is stego object,the SAD prediction deviation (SPD) indeed increase the probability of reversion phenomenon. Through the above analysis, the smaller SPD the reselected mode has, the more suitable it can be used for modification.

3.3 Mapping rule

We use STC as the practical steganographic method. Seeking for an appropriate pattern should traverse the entire pattern space as shown in Fig. 1 as much as possible. Thus we herein introduce a mapping rule between prediction modes and groups of modes to complete the traverse. Many state-of-the-art schemes use mapping rules to represent the secret information [Cao, Zhou and Sun (2018)], which indeed improves coding efficiency.

Table 1: Average SPD caused by replacement of optimal mode m and candidate mode m’

Since a mode will not change to those modes in the same group, we divide the modes with large SPD into the same group to reduce the probability of selecting a large distortion mode. We observe the SPD generated when the optimal modes is replaced with the other 8 candidate modes, respectively. Assuming that the total number of intra-4Bs with the optimal mode 0 is K, then the average SPD for each intra-4B is. The experimental results of three video sequences, i.e. “akiyo.yuv”, “Mobile.yuv” and“Waterfall.yuv” are shown in Tab. 1. It can be seen that 9×8=72 replacement results, in which the maximum SPD is bolded to indicate that this pair of modes is more suitable to be placed in the same group. These groups of modes can be defined as follows:

If the block uses the 4×4 prediction:

Group 1: Modes 0, 1 and 4.

Group 2: Modes 3, 5 and 8.

Group 3: Modes 2, 6 and 7.

本次數據顯示,肝硬化組、肝癌組、慢性肝炎組、急性肝炎組對比參照組,肝硬化組對比肝癌組、慢性肝炎組、急性肝炎組,統計學具有數據分析意義。表示,肝硬化患者的血清膽堿酯酶活性最低,其次為肝癌。A級和C級比較、A級和B級比較、B級和C級比較,差異具有統計學意義(P<0.05)。證實肝功能Child分級和血清膽堿酯酶水平之間呈現出正相關性。

The block uses the 1616 prediction:

Group 0:Modes 0, 1, 2 and 3.

Here, the group 0 belonging to 1616 block does not make any changes. The original group gi,tcontains the original modemi,t, wheregi,t∈{0,1,2,3}. In candidate group g′i,t,the mode of the minimum SAD is stored as m'i,tand before the STC embedding is executed, each group’s m'i,tis known. At this point, we get the mapping table MT,which records the optimal mode for each group in all blocks. As shown in (Fig. 3), the modes 1, 5 and 6 are the minimum SAD modes of the groups 1, 2 and 3 in an intra-4B,respectively.

Figure 3: An example of mapping rule

From this point of rule, the SAD prediction deviation of different candidate groups(SPDG) can be denoted by

whererepresents the prediction SAD change of candidate mode in the group. Andis chosen from the candidate group setusing STCs-basedembedding.

Applying the mapping rule can effectively expand the search range because these 3 groups are handled as an input set instead of 9 prediction modes. In Section 4, we would describe the implementation of mapping rule in detail.

3.4 The definition of distortion function

As introduced in Section 2, accumulating the non-negative additive distortions introduced by independent modifications can obtain the overall embedding impact. Therefore the overall distortion sumDtof all intra-4Bs in t-th key frame should be minimized by steganographic codes, which Dtcan be calculated by following formulas.

4 Practical implementation

±1 STC is used as the practical steganographic method for the secret message embedding and extraction. In addition, both the sender and the receiver should know the mapping rule. The proposed steganographic method is divided into the following three phases.

Embedding Distortion Definition:Before embedding the data, we measure the distortion value of each intra-4B using the distortion function in key frames. Firstly, each key frame uses the mapping rule to obtain the original group matrix Gtand the mapping table. For each intra-4B, the distortionis defined in Eq.8. Secondly, save all the defined distortion in. Assuming that group 1 is suitable as a modification group, the appropriate mode m′i,twithin group 1 can be obtained by mapping table MTt.

Data Embedding:In this step, after obtaining, the original group matrixis applied inSTC for embedding to get the modified group matrix, and then the suitable mode matchingis found in the mapping table. Suppose that T is the total number of key frame in the cover sequence anddenotes the binary length of cover sequence. Then we use STC to embed anbits message e with a given embedding raterepresenting the average embedded bits per prediction mode (bppm), and make the overall embedding impact minimal:

whereis the group vector, and D is the distortion vector

After executing STC, the modified group vectoris obtained to find the appropriate modes for modifying according to the. Finally, the stego sequence can be generated by H.264 codec.

Data Extraction:For the recipient, all prediction mode values is obtained by using a customized decoder, and then the G′is reconstructed by MT easily. Now the secret messages can be extracted by using STC, which can be denoted as

where H is parity-check matrix employed by both the sender and recipient.

5 Evaluation

5.1 Experiment setup

The video database [(Yuv (2008)] containing 25 standard 4:2:0 YUV sequences in CIF format (CIF, 352×288) is used to test, as shown in Fig. 4. The number of frame ranges from 100 fps to 400 with 30 fps frame rate. The 25 standard sequences are divided into 120 subsequences without overlapping, and each subsequence contains 60 frames. In order to obtain sufficient samples, the maximum interval of the intra frame is set 10,which does not degrade the compression quality. Besides, x264 executes the embedding scheme and the LibSVM toolbox [Chang and Lin (2011)] with the polynomial kernel is employed for classiflcation. For performance comparison, Yang et al.’s [Yang, Li, He et al. (2011)] method and Bouchama et al.’s [Bouchama, Hamami and Aliane (2012)]method are also implemented.

In this experiment, two bit-rates(BR) of the compressed sequences, 0.5 Mbit/s and 1 Mbit/s, with various embedding rates(ER) ranging from 0.125 to 0.5 are considered, in which the embedding rate(ER) indicates the average embedding bit length of available intra-4Bs and it can be calculated as

where L denotes the length of the binary message embedded in the t-th frame, and theis the total number of intra-4Bs in t-th key frame.

According to the difference in the embedding rate(ER), the theoretic value of embedding capacity can be calculated as

where Inrepresents the number of intra-frames, h and w represent the height and width of the video sequence, respectively. If the embedding rate(ER) is set to 0.5 and the number of intra-frames is 20, the theoretic embedding capacity will be 63360 bits.

5.2 Steganalysis result

Steganalysis is the most important measure of the security of steganography. The recently proposed IPMC [Zhao, Zhang, Cao et al. (2015)] feature has achieved the most effective detection performance against the IPMs-based Video steganography scheme. IPMC extracts a 13-dimension feature from each intra-frame according to the recovery phenomenon of the intra prediction modes.

In our test, 80 video subsequences are randomly selected for training, and the remaining 40 video subsequences are used for classification. The experiment was repeated 10 times to calculate the average detection performance evaluated by the minimum average classification error probability [Kodovsky, Fridrich and Holub (2012)]. Three different steganographic schemes are shown in Fig. 5 and Tab. 2. All schemes have a slightly worse performance at bit-rate 1.0 Mbit/s than at 0.5 Mbit/s, because higher bitrate leads to lower loss and the greater difference between the stego and the cover. In addition, our method is much better than Yang et al.’s method [Yang, Li, He et al. (2011)]and Bouchama et al.’s [Bouchama, Hamami and Aliane (2012)] method at low embedding rates. As the embedding rate increases, the performance gap becomes smaller,but our method is still best, which indicates higher steganographic security level.

Figure 5: Reversion phenomenon in case of (a) BR=0.5 Mbit/s and (b) BR=1.0 Mbit/s on different mode levels

Table 2: Comparison of different method against IPMC features

5.3 Steganalysis result

The measurement PSNR (dB) is commonly adopted to measure video quality in steganographic scheme. Here, the video quality results of the three video sequences“Coastguard.yuv”, “Mobile.yuv” and “Waterfall.yuv” are shown in Tab. 3 where NO-E(no-embedding) represent the compression without any data embedding. It is observed that our method does not lead to great errors and is closer to the PSNR of NO-E than Yang et al.’s [Yang, Li, He et al. (2011)] methods and Bouchama et al.’s [Bouchama,Hamami and Aliane (2012)] methods. Because our scheme is based on the choice of the smallest SAD block to be embedded, which ensures that the embedded perturbation is slight. Referring to NO-E, we can see that the impact of these three embedding schemes on video quality is slight, with the least impact being our methods.

Table 3: Comparison of PSNR values (dB) using four steganographic schemes at two bit-rates(Mbit/s)

6 Conclusion

In this paper, we present a novel intra prediction mode-based video steganography by minimizing the embedding distortion defined according to SAD. We introduce STC as the practical embedding method, and SAD can be regarded as an important factor to establish the distortion function. Then, we introduce the mapping rule to expand the range of selective modes for each block. The experimental results show that our proposed steganographic scheme outperforms other intra prediction mode-based steganographic schemes in resisting steganalysis and video quality.

In the future work, we will combine SAD and the statistical distribution of frame to construct more effective distortion functions. In addition, the mapping rule is also to be improved to further increase the range of selection. For video steganography, we have to further reduce the computational complexity to accommodate the fast growing of video data.

Acknowledgements:This work was supported by National Key R&D Plan of China(Grant No. 2017YFB0802203), National Natural Science Foundation of China (Grant No.U173620045, 61732021, 61472165 and 61373158), Natural Science Foundation of Guangdong Province, China (Grant No. 2017A030313390), Science and Technology Program of Guangzhou, China (Grant No. 201804010428), Guangdong Provincial Engineering Technology Research Center on Network Security Detection and Defence(Grant No. 2014B090904067), Guangdong Provincial Special Funds for Applied Technology Research and Development and Transformation of Important Scientific and Technological Achieve (Grant No. 2016B010124009), the Zhuhai Top Discipline-Information Security, Guangzhou Key Laboratory of Data Security and Privacy Preserving, Guangdong Key Laboratory of Data Security and Privacy Preserving, the Fundamental Research Funds for the Central Universities.

Bouchama, S.; Hamami, L.; Aliane, H.(2012): H.264/avc data hiding based on intra prediction modes for real-time applications. Lecture Notes in Engineering and ComputerScience, vol. 1.

Cao, Y.; Zhang, H.; Zhao, X.; Yu, H.(2015): Video steganography based on optimized motion estimation perturbation. ACM Workshop on Information Hiding and Multimedia Security, pp. 25-31.

Cao, Y.; Zhou, Z.; Sun, X.(2018): Coverless information hiding based on the molecular structure images of material. Computers, Materials & Continua, vol. 54, no. 2, pp. 197- 207.Chang, C. C.; Lin, C. J.(2011): Libsvm: A library for support vector machines. ACM Transactions on Intelligent Systems and Technology, vol. 2, no. 3, pp. 1-27.

Filler, T.; Judas, J.; Fridrich, J.(2011): Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Transactions on Information Forensics and Security, vol.6, no. 3, pp. 920-935.

Fridrich, J.; Goljan, M.; Lisonek, P.; Soukal, D.(2005): Writing on wet paper. IEEE Transactions on Signal Processing, vol. 53, no. 10, pp. 3923-3935.

Fridrich, J.; Kodovsky, J.(2012): Rich models for steganalysis of digital images. IEEE Transactions on Information Forensics and Security, vol. 7, no. 3, pp. 868-882.

Gurusamy, R.; Subramaniam, V.(2017): A machine learning approach for mri brain tumor classification. Computers, Materials & Continua, vol. 53, no. 2, pp. 91-109.

Hu, Y.; Zhang, C.; Su, Y.(2007): Information hiding based on intra prediction modes for h.264/avc. IEEE International Conference on Multimedia and Expo, pp. 1231-1234.

Kim, J.; Jeong, J.(2012): Fast intra mode decision algorithm using the sum of absolute transformed differences. International Conference on Digital Image Computing Techniques and Applications, pp. 655-659.

Kodovsky, J.; Fridrich, J.; Holub, V.(2012): Ensemble classifiers for steganalysis of digital media. IEEE Transactions on Information Forensics and Security, vol. 7, no. 2, pp.432-444.

Wang, P.; Zhang, H.; Cao, Y.; Zhao, X.(2016): A novel embedding distortion for motion vector-based steganography considering motion characteristic, local optimality and statistical distribution. ACM Workshop on Information Hiding and Multimedia Security,pp.127-137.

Wiegand, T.; Sullivan, G. J.; Bjontegaard, G.; Luthra, A.(2003): Overview of the h.264/avc video coding standard. IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, no. 7, pp. 560-576.

x264(2010): Videolan. x264. http://www.videolan.org/ developers/x264.html.

Xu, D.; Wang, R.; Wang, J.(2012): Prediction mode modulated data-hiding algorithm for h.264/avc. Journal of Real-Time Image Processing, vol. 7, no. 4, pp. 205-214.

Yang, G.; Li, J.; He, Y.; Kang, Z.(2011): An information hiding algorithm based on intra-prediction modes and matrix coding for h.264/avc video stream. International Journal of Electronics and Communications, vol. 65, no. 4, pp. 331-337.

YUV(2008): Yuv video sequences. http://trace.eas.asu.edu/ yuv/index.html.

Zhao, Y.; Zhang, H.; Cao, Y.; Wang, P.; Zhao, X.(2015): Video steganalysis based on intra prediction mode calibration. 2015 International Workshop on Digital-forensics and Watermarking.

猜你喜歡
肝功能肝癌意義
重視肝功能正常的慢性HBV感染者
肝博士(2024年1期)2024-03-12 08:38:08
一件有意義的事
新少年(2022年9期)2022-09-17 07:10:54
肝功能報告單解讀
肝博士(2022年3期)2022-06-30 02:48:58
有意義的一天
LCMT1在肝癌中的表達和預后的意義
microRNA在肝癌發生發展及診治中的作用
詩里有你
北極光(2014年8期)2015-03-30 02:50:51
Rab27A和Rab27B在4種不同人肝癌細胞株中的表達
microRNA在肝癌診斷、治療和預后中的作用研究進展
拉米夫定在乳腺癌化療期間對肝功能的作用
主站蜘蛛池模板: 日本一本在线视频| 美女毛片在线| 国产精品黑色丝袜的老师| 久久婷婷六月| 色综合激情网| 福利国产在线| 99视频免费观看| 亚洲AⅤ波多系列中文字幕| 性视频久久| 在线观看国产精品第一区免费 | 欧美中文字幕一区二区三区| 精品福利国产| 久草中文网| 国产AV毛片| 91成人免费观看在线观看| 国产精品尤物在线| 欧美精品v| 亚洲专区一区二区在线观看| 丁香五月亚洲综合在线| 日韩欧美国产精品| 国产精品福利社| 波多野结衣在线一区二区| 国产日本欧美亚洲精品视| 老司机久久精品视频| 国产自产视频一区二区三区| 国产色伊人| 国产精品不卡永久免费| 91精品国产麻豆国产自产在线| 国产免费a级片| 久久一色本道亚洲| 三上悠亚在线精品二区| 国产毛片片精品天天看视频| 中文字幕色站| 久久久久亚洲av成人网人人软件| 国产成人亚洲无码淙合青草| 国产精品浪潮Av| 欧美激情综合| 欧美一区二区人人喊爽| 亚洲三级网站| 一级全黄毛片| 国产精品污污在线观看网站| 亚洲第一香蕉视频| 亚洲天堂首页| 日韩欧美亚洲国产成人综合| 亚洲无限乱码一二三四区| 国产成人亚洲欧美激情| 免费高清毛片| 欧美一区二区福利视频| 成人国产小视频| 999精品免费视频| 欧美日韩福利| 国产美女在线免费观看| 99中文字幕亚洲一区二区| 亚洲精品国偷自产在线91正片| 日本精品视频| 国产欧美日韩免费| 狠狠色噜噜狠狠狠狠色综合久| 九九九国产| 国产喷水视频| 伊人色在线视频| 色天天综合久久久久综合片| 久久久亚洲色| 永久免费av网站可以直接看的 | 国产成人免费高清AⅤ| 国产女人18毛片水真多1| 老司机午夜精品视频你懂的| 亚洲三级网站| 玩两个丰满老熟女久久网| 69国产精品视频免费| 国产区免费| 亚洲av无码人妻| 国产污视频在线观看| 日韩视频福利| 国产精品尤物铁牛tv | 国产在线观看一区二区三区| 亚洲欧美一区二区三区图片| 精品久久高清| 国产成人做受免费视频| 国产一在线| 色综合久久88| 92午夜福利影院一区二区三区| 国产欧美日韩另类|