Top Banner
Yun CAO Xianfeng ZHAO Dengguo FENG Rennong SHENG Video Steganography with Perturbed Motion Estimation
24

Video Steganography With Perturbed Motion Estimation

Jun 04, 2018

Download

Documents

krishnithyan
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Video Steganography With Perturbed Motion Estimation

8/13/2019 Video Steganography With Perturbed Motion Estimation

http://slidepdf.com/reader/full/video-steganography-with-perturbed-motion-estimation 1/24

Yun CAO

Xianfeng ZHAO

Dengguo FENG

Rennong SHENG

Video Steganography withPerturbed Motion Estimation

Page 2: Video Steganography With Perturbed Motion Estimation

8/13/2019 Video Steganography With Perturbed Motion Estimation

http://slidepdf.com/reader/full/video-steganography-with-perturbed-motion-estimation 2/24

Outline

Performance

Perturbed Motion Estimation

Motivation

Introduction

Page 3: Video Steganography With Perturbed Motion Estimation

8/13/2019 Video Steganography With Perturbed Motion Estimation

http://slidepdf.com/reader/full/video-steganography-with-perturbed-motion-estimation 3/24

Video Steganography

• Adequate payloads

• Multiple applications

• Advanced technologies

Page 4: Video Steganography With Perturbed Motion Estimation

8/13/2019 Video Steganography With Perturbed Motion Estimation

http://slidepdf.com/reader/full/video-steganography-with-perturbed-motion-estimation 4/24

Video Steganography

Conventional methodsDomain utilized

--Intra frame

--Spatial domain (pixels)--Transformed domain (DCT)

Disadvantages

--Derived from image schemes

--Vulnerable to certain existing steganalysis

Page 5: Video Steganography With Perturbed Motion Estimation

8/13/2019 Video Steganography With Perturbed Motion Estimation

http://slidepdf.com/reader/full/video-steganography-with-perturbed-motion-estimation 5/24

Video Steganography

Joint Compression-EmbeddingUsing motion information

Adopting adaptive selection rules

--Amplitude--Prediction errors

Page 6: Video Steganography With Perturbed Motion Estimation

8/13/2019 Video Steganography With Perturbed Motion Estimation

http://slidepdf.com/reader/full/video-steganography-with-perturbed-motion-estimation 6/24

Motivation

Arbitrary

Modification

Degradation in

SteganographicSecurity

Known/Week

Selection rule

Page 7: Video Steganography With Perturbed Motion Estimation

8/13/2019 Video Steganography With Perturbed Motion Estimation

http://slidepdf.com/reader/full/video-steganography-with-perturbed-motion-estimation 7/24

Motivation

How to improve?Using side information

--Information reduction process

--Only known to the encoder--Leveraging wet paper code

Mitigate the embedding effects

--Design pointed selection rules--Merge motion estimation & embedding

Page 8: Video Steganography With Perturbed Motion Estimation

8/13/2019 Video Steganography With Perturbed Motion Estimation

http://slidepdf.com/reader/full/video-steganography-with-perturbed-motion-estimation 8/24

Typical Inter-frame Coding

01011100… 

Entropy Coding

DCT &

QUANTIZATION

Inter-MB Coding

MB PARTITION

Page 9: Video Steganography With Perturbed Motion Estimation

8/13/2019 Video Steganography With Perturbed Motion Estimation

http://slidepdf.com/reader/full/video-steganography-with-perturbed-motion-estimation 9/24

Regular Motion Estimation

MB COORDINATE

R

C

12,8

4,4

MOTION VECTOR

8,4

v

OthersC Similarity RC Similarity   ,,  

Page 10: Video Steganography With Perturbed Motion Estimation

8/13/2019 Video Steganography With Perturbed Motion Estimation

http://slidepdf.com/reader/full/video-steganography-with-perturbed-motion-estimation 10/24

Perturbed Motion Estimation

MB COORDINATE

R

R’  

C

12,8

14,7

MOTION VECTOR

8,4v

4,4

10,3'v

',,   RC Similarity RC Similarity  

  1'     v P v P 

 

C   is applicable

Page 11: Video Steganography With Perturbed Motion Estimation

8/13/2019 Video Steganography With Perturbed Motion Estimation

http://slidepdf.com/reader/full/video-steganography-with-perturbed-motion-estimation 11/24

Capacity

Number of applicable MBsFree to choose criteria

SAD, MSE, Coding efficiency, etc

Page 12: Video Steganography With Perturbed Motion Estimation

8/13/2019 Video Steganography With Perturbed Motion Estimation

http://slidepdf.com/reader/full/video-steganography-with-perturbed-motion-estimation 12/24

Wet Paper Code

Applicable MBs

(Dry Spot)

Confinemodification to

them using wet

paper code

Page 13: Video Steganography With Perturbed Motion Estimation

8/13/2019 Video Steganography With Perturbed Motion Estimation

http://slidepdf.com/reader/full/video-steganography-with-perturbed-motion-estimation 13/24

Embedding Procedure

Determine Applicable MBs

Wet Paper Coding

Perturb Motion Estimation

Page 14: Video Steganography With Perturbed Motion Estimation

8/13/2019 Video Steganography With Perturbed Motion Estimation

http://slidepdf.com/reader/full/video-steganography-with-perturbed-motion-estimation 14/24

Video Demo

Sequence:“WALK.cif ” Duration: 14 s

Message Embedded: 2.33KB

PSNR Degradation: 0.63dB

Page 15: Video Steganography With Perturbed Motion Estimation

8/13/2019 Video Steganography With Perturbed Motion Estimation

http://slidepdf.com/reader/full/video-steganography-with-perturbed-motion-estimation 15/24

Experimental Date

20 CIF standard test sequence

352×288, 396 MBs

Embedding strength: 50 bit/frame

Page 16: Video Steganography With Perturbed Motion Estimation

8/13/2019 Video Steganography With Perturbed Motion Estimation

http://slidepdf.com/reader/full/video-steganography-with-perturbed-motion-estimation 16/24

Preliminary Security Evaluation

Traditional SteganalysisA 39-d feature vector formed by statistical

moments of wavelet characteristic

functions (Xuan05)A 686-d feature vector derived from the

second-order subtractive pixel adjacency

(Pevny10)SVM with the polynomial kernel

Page 17: Video Steganography With Perturbed Motion Estimation

8/13/2019 Video Steganography With Perturbed Motion Estimation

http://slidepdf.com/reader/full/video-steganography-with-perturbed-motion-estimation 17/24

Preliminary Security Evaluation

Xuan’s  Pevny’s 

TN TP AR TN TP AR

59.7 39.2 49.5 48.3 53.5 50.9

Page 18: Video Steganography With Perturbed Motion Estimation

8/13/2019 Video Steganography With Perturbed Motion Estimation

http://slidepdf.com/reader/full/video-steganography-with-perturbed-motion-estimation 18/24

Preliminary Security Evaluation

Motion vector mapVertical and horizontal components as

two images

A 39-d feature vector formed by statisticalmoments of wavelet characteristic

functions (Xuan05)

SVM with the polynomial kernel

Page 19: Video Steganography With Perturbed Motion Estimation

8/13/2019 Video Steganography With Perturbed Motion Estimation

http://slidepdf.com/reader/full/video-steganography-with-perturbed-motion-estimation 19/24

Preliminary Security Evaluation

Horizontal Component Vertical Component

TN TP AR TN TP AR

91.5 10.8 51.2 53.5 46.9 50.2

0 0.2 0.4 0.6 0.8 10

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

False Positives

   T  r  u  e

   P  o  s   i   t   i  v  e  s

0 0.2 0.4 0.6 0.8 10

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

False Positives

   T

  r  u  e

   P  o  s   i   t   i  v  e  s

Page 20: Video Steganography With Perturbed Motion Estimation

8/13/2019 Video Steganography With Perturbed Motion Estimation

http://slidepdf.com/reader/full/video-steganography-with-perturbed-motion-estimation 20/24

Preliminary Security Evaluation

Target SteganalysisA 12-d feature vector derived from the

changes in MV statistical characteristics

(Zhang08)SVM with the polynomial kernel

Page 21: Video Steganography With Perturbed Motion Estimation

8/13/2019 Video Steganography With Perturbed Motion Estimation

http://slidepdf.com/reader/full/video-steganography-with-perturbed-motion-estimation 21/24

Preliminary Security Evaluation

Zhang’s 

TN TP AR

50.5 51.8 51.2

Page 22: Video Steganography With Perturbed Motion Estimation

8/13/2019 Video Steganography With Perturbed Motion Estimation

http://slidepdf.com/reader/full/video-steganography-with-perturbed-motion-estimation 22/24

Summary

• Joint Compression-Embedding

• Using side information

• Improved security

Page 23: Video Steganography With Perturbed Motion Estimation

8/13/2019 Video Steganography With Perturbed Motion Estimation

http://slidepdf.com/reader/full/video-steganography-with-perturbed-motion-estimation 23/24

Future works

Minimize embedding impacts

Different parity functions

Different selection rule designing criteria

Further Steganalysis

Larger and more diversified database

Page 24: Video Steganography With Perturbed Motion Estimation

8/13/2019 Video Steganography With Perturbed Motion Estimation

http://slidepdf.com/reader/full/video-steganography-with-perturbed-motion-estimation 24/24