Video Steganography with Perturbed Motion Estimation
240 likes | 307 Vues
Explore how perturbed motion estimation improves video steganography security with adaptive selection rules, wet paper code, and motion embedding. Evaluate through preliminary security assessments.
Video Steganography with Perturbed Motion Estimation
E N D
Presentation Transcript
Video Steganography with Perturbed Motion Estimation Yun CAO Xianfeng ZHAO Dengguo FENG Rennong SHENG
Outline Introduction Motivation Perturbed Motion Estimation Performance
Video Steganography • Adequate payloads • Multiple applications • Advanced technologies
Video Steganography • Conventional methods • Domain utilized • --Intra frame • --Spatial domain (pixels) • --Transformed domain (DCT) • Disadvantages • --Derived from image schemes • --Vulnerable to certain existing steganalysis
Video Steganography • Joint Compression-Embedding • Using motion information • Adopting adaptive selection rules • --Amplitude • --Prediction errors
Motivation Known/Week Selection rule Degradation in Steganographic Security Arbitrary Modification
Motivation • How to improve? • Using side information • --Information reduction process • --Only known to the encoder • --Leveraging wet paper code • Mitigate the embedding effects • --Design pointed selection rules • --Merge motion estimation & embedding
MB PARTITION Inter-MB Coding DCT & QUANTIZATION EntropyCoding Typical Inter-frame Coding 01011100…
Perturbed Motion Estimation Cis applicable
Capacity • Number of applicable MBs • Free to choose criteria • SAD, MSE, Coding efficiency, etc
Wet Paper Code • Applicable MBs (Dry Spot) • Confine modification to them using wet paper code
Video Demo • Sequence:“WALK.cif” • Duration: 14 s • Message Embedded: 2.33KB • PSNR Degradation: 0.63dB
Experimental Date • 20 CIF standard test sequence • 352×288, 396 MBs • Embedding strength: 50 bit/frame
Preliminary Security Evaluation • Traditional Steganalysis • A 39-d feature vector formed by statistical moments of wavelet characteristic functions (Xuan05) • A 686-d feature vector derived from the second-order subtractive pixel adjacency (Pevny10) • SVM with the polynomial kernel
Preliminary Security Evaluation • Motion vector map • Vertical and horizontal components as two images • A 39-d feature vector formed by statistical moments of wavelet characteristic functions (Xuan05) • SVM with the polynomial kernel
Preliminary Security Evaluation • Target Steganalysis • A 12-d feature vector derived from the changes in MV statistical characteristics (Zhang08) • SVM with the polynomial kernel
Summary • Joint Compression-Embedding • Using side information • Improved security
Future works • Minimize embedding impacts • Different parity functions • Different selection rule designing criteria • Further Steganalysis • Larger and more diversified database