scispace - formally typeset
Search or ask a question
Author

Yao Yuanzhi

Bio: Yao Yuanzhi is an academic researcher from University of Science and Technology of China. The author has contributed to research in topics: Steganography & Motion vector. The author has an hindex of 8, co-authored 17 publications receiving 165 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: Experimental results show that the proposed method can enhance the security performance significantly compared with other existing motion vector-based video steganographic approaches, while obtaining the higher video coding quality as well.
Abstract: This paper presents an effective methodology for motion vector-based video steganography The main principle is to design a suitable distortion function expressing the embedding impact on motion vectors by exploiting the spatial-temporal correlation based on the framework of minimal-distortion steganography Two factors are considered in the proposed distortion function, which are the statistical distribution change (SDC) of motion vectors in spatial-temporal domain and the prediction error change (PEC) caused by modifying the motion vectors The practical embedding algorithm is implemented using syndrome-trellis codes (STCs) Experimental results show that the proposed method can enhance the security performance significantly compared with other existing motion vector-based video steganographic approaches, while obtaining the higher video coding quality as well

65 citations

Journal ArticleDOI
TL;DR: This paper proposes an effective scheme for reversible data hiding in encrypted H.264/AVC video bitstreams and presents a theoretical analysis of the picture distortion caused by data embedding and the subsequent inter-frame distortion drift.

57 citations

Journal ArticleDOI
TL;DR: A novel technique for steganography on 3-D meshes so as to resist steganalysis, which relies on some effective steganalytic features such as variation of vertex normal and outperforms the current state of the art.
Abstract: We propose a novel technique for steganography on 3-D meshes so as to resist steganalysis. The majority of existing methods modulate vertex coordinates to embed messages in a nonadaptive way. We take account of complexity of local regions as joint distortion of a triple unit (vertice) and coding method such as syndrome trellis codes to adaptively embed messages, which owns stronger security with respect to existing steganalysis. Key to the distortion is a novel formulation of adaptive steganography, which relies on some effective steganalytic features such as variation of vertex normal. We provide quantitative and qualitative comparisons of our method with several baselines against steganalytic features LFS64, LFS76, and ensemble classifiers, and show that it outperforms the current state of the art. Meanwhile, we proposed an attacking method on steganography proposed by Chao et al. (2009) with a high detection rate.

30 citations

Journal ArticleDOI
TL;DR: Experimental results demonstrate the merits of the proposed scheme in terms of marked image quality, watermark visibility and watermark robustness.

21 citations

Patent
17 Sep 2014
TL;DR: In this article, a privacy protection system and method based on a social network is described. But the authors do not specify the steps that an information sender and an information receiver obtain the function of information interaction between the privacy protection scheme and a microblog based on the social network, and the information sender logs in the system and uses a self-adaptive JPEG image steganography for embedding information needing to be transmitted into an image needed to be published in the microblog.
Abstract: The invention discloses a privacy protection system and method based on a social network. The privacy protection method includes the steps that an information sender and an information receiver obtain the function of information interaction between the privacy protection system and a microblog based on the social network; the information sender logs in the privacy protection system and uses a self-adaptive JPEG image steganography for embedding information needing to be transmitted into an image needing to be published in the microblog after encrypting the information; the privacy protection system publishes the microblog containing the encrypted image and updates a microblog head portrait image of the information sender to finish sending the information; the information receiver logs in the privacy protection system and extracts and decrypts the encrypted information in the microblog image published by the information sender, and the information is pushed to the information receiver to finish receiving the information. By the adoption of the privacy protection system and method, it can be guaranteed that a safe and private communication channel is set up between the information sender and the information receiver which communicate in the Internet, and the privacy data of a user are effectively protected from illegal monitoring and stealing.

14 citations


Cited by
More filters
Journal Article
TL;DR: This paper presents EC feature implemented by the authors in the test model of the draft ITUT video coding standard H.26L, adopted and now included in the latest H. 26L reference software TML9.0.
Abstract: This paper presents EC feature implemented by the authors in the test model of the draft ITUT video coding standard H.26L.The selected EC algorithms are based on weighted pixel value averaging for INTRA pictures and boundarymatchingbased motion vector recovery for INTER pictures. The specific concealment strategy and some special methods, including handling of Bpictures, multiple reference frames and entire frame losses, are described. Both subjective and objective results are given based on simulations under Internet conditions. The feature was adopted and is now included in the latest H.26L reference software TML9.0.

121 citations

Journal ArticleDOI
TL;DR: Wang et al. as mentioned in this paper proposed a high-capacity reversible data hiding in encrypted images (RDHEI) algorithm based on multi-MSB prediction and Huffman coding, which achieved higher embedding capacity while comparing with the state-of-the-art methods.
Abstract: With the development of cloud storage and privacy protection, reversible data hiding in encrypted images (RDHEI) has attracted increasing attention as a technology that can: embed additional data in the image encryption domain, ensure that the embedded data can be extracted error-free, and the original image can be restored losslessly. In this paper, a high-capacity RDHEI algorithm based on multi-MSB (most significant bit) prediction and Huffman coding is proposed. At first, multi-MSB of each pixel was predicted adaptively and marked by Huffman coding in the original image. Then, the image was encrypted by a stream cipher method. At last, the vacated space can be used to embed additional data by multi-MSB substitution. Experimental results show that our method achieved higher embedding capacity while comparing with the state-of-the-art methods.

104 citations

Journal ArticleDOI
TL;DR: The performance assessment for video Steganography and the future popular video steganography including H.265 video stegansography, robust video steGANography and reversible video steaganography are introduced.

81 citations

Journal ArticleDOI
TL;DR: Experimental results and analysis show that the proposed scheme can obtain a good security performance and keep the HEVC video stream format compliant.
Abstract: A separable reversible data hiding and encryption for high efficiency video coding (HEVC) video is proposed in this paper. In the encoding phase, one can encrypt the signs and amplitudes of motion vector differences and the signs of residual coefficients with an encryption key by using RC4, while another can hide data into nonzero AC residual coefficients with a hiding key. For the decoding phase, one can decrypt the HEVC video and obtain a HEVC video similar to the original one if he only has the encryption key; he can extract the hiding data, but he does not know the HEVC video content if he only has the hiding key; he can extract the hiding data and recover the original HEVC video if he has both the encryption key and hiding key. Experimental results and analysis show that the proposed scheme can obtain a good security performance and keep the HEVC video stream format compliant.

68 citations

Journal ArticleDOI
TL;DR: This paper proposes a secure, lightweight, robust, and efficient scheme for data exchange between the mobile users and the media clouds, and considers High Efficiency Video Coding Intra-encoded video streams in unsliced mode as a source for data hiding.

60 citations