240 likes | 292 Views
Explore how perturbed motion estimation improves video steganography security with adaptive selection rules, wet paper code, and motion embedding. Evaluate through preliminary security assessments.
E N D
Video Steganography with Perturbed Motion Estimation Yun CAO Xianfeng ZHAO Dengguo FENG Rennong SHENG
Outline Introduction Motivation Perturbed Motion Estimation Performance
Video Steganography • Adequate payloads • Multiple applications • Advanced technologies
Video Steganography • Conventional methods • Domain utilized • --Intra frame • --Spatial domain (pixels) • --Transformed domain (DCT) • Disadvantages • --Derived from image schemes • --Vulnerable to certain existing steganalysis
Video Steganography • Joint Compression-Embedding • Using motion information • Adopting adaptive selection rules • --Amplitude • --Prediction errors
Motivation Known/Week Selection rule Degradation in Steganographic Security Arbitrary Modification
Motivation • How to improve? • Using side information • --Information reduction process • --Only known to the encoder • --Leveraging wet paper code • Mitigate the embedding effects • --Design pointed selection rules • --Merge motion estimation & embedding
MB PARTITION Inter-MB Coding DCT & QUANTIZATION EntropyCoding Typical Inter-frame Coding 01011100…
Perturbed Motion Estimation Cis applicable
Capacity • Number of applicable MBs • Free to choose criteria • SAD, MSE, Coding efficiency, etc
Wet Paper Code • Applicable MBs (Dry Spot) • Confine modification to them using wet paper code
Video Demo • Sequence:“WALK.cif” • Duration: 14 s • Message Embedded: 2.33KB • PSNR Degradation: 0.63dB
Experimental Date • 20 CIF standard test sequence • 352×288, 396 MBs • Embedding strength: 50 bit/frame
Preliminary Security Evaluation • Traditional Steganalysis • A 39-d feature vector formed by statistical moments of wavelet characteristic functions (Xuan05) • A 686-d feature vector derived from the second-order subtractive pixel adjacency (Pevny10) • SVM with the polynomial kernel
Preliminary Security Evaluation • Motion vector map • Vertical and horizontal components as two images • A 39-d feature vector formed by statistical moments of wavelet characteristic functions (Xuan05) • SVM with the polynomial kernel
Preliminary Security Evaluation • Target Steganalysis • A 12-d feature vector derived from the changes in MV statistical characteristics (Zhang08) • SVM with the polynomial kernel
Summary • Joint Compression-Embedding • Using side information • Improved security
Future works • Minimize embedding impacts • Different parity functions • Different selection rule designing criteria • Further Steganalysis • Larger and more diversified database