Research Article
Coverless Steganography Based on Motion Analysis of Video
Algorithm 1
Index database construction.
| | Input: video database , number of videos d, smoothing window size for optical flow calculation W, number of LK pyramid level L, and bin number N. | | | Output: video index database | | (1) | For i = 1: d | | (2) | Decompose video to pictures: P = VideoToFrame (Vi) | | (3) | For j = 1: FrameNum-1 | | (4) | Convert RGB to gray: Rj = Rgb2gray (Pj), Rj+1 = Rgb2gray (Pj+1) | | (5) | Median filtering: Mj = medfilt (Rj), Mj+1 = medfilt (Rj+1), | | (6) | Calculate the hierarchical optical flow matrixes between frame j and j + 1: (u, ) = HierarchicalLK (Mj,Mj+1, W, L) | | (7) | Calculate RHOOF and hash sequences in subblocks | | | For s = 1: subblock_num | | (8) | H s = RHOOF (u, , N) | | (9) | Hashs = HashCalc (Hs) | | (10) | Link MySQL and update index database: index item-> {index ID, video ID, frame ID, subblock ID} | | (11) | End for | | (12) | End for | | (13) | End for |
|