Sei sulla pagina 1di 24

Video Steganography with Perturbed Motion Estimation

Yun CAO Xianfeng ZHAO Dengguo FENG Rennong SHENG

Outline

Introduction Motivation Perturbed Motion Estimation Performance

Video Steganography

Adequate payloads Multiple applications Advanced technologies

Video Steganography

Conventional methods
Domain utilized
--Intra frame --Spatial domain (pixels) --Transformed domain (DCT)

Disadvantages
--Derived from image schemes --Vulnerable to certain existing steganalysis

Video Steganography

Joint Compression-Embedding
Using motion information Adopting adaptive selection rules
--Amplitude --Prediction errors

Motivation

Known/Week Selection rule Arbitrary Modification

Degradation in Steganographic Security

Motivation

How to improve?
Using side information
--Information reduction process --Only known to the encoder --Leveraging wet paper code

Mitigate the embedding effects


--Design pointed selection rules --Merge motion estimation & embedding

Typical Inter-frame Coding

MB PARTITION

Inter-MB Coding

DCT & QUANTIZATION

Entropy Coding

01011100

Regular Motion Estimation


MB COORDINATE

R C

8,12 4,4

MOTION VECTOR

SimilarityC , R SimilarityC , Others

v 4,8

Perturbed Motion Estimation


MB COORDINATE

R R C
SimilarityC , R SimilarityC , R' P v P v ' 1

8,12 7,14 4,4

MOTION VECTOR

C is applicable

v 4,8 v ' 3,10

Capacity

Number of applicable MBs


Free to choose criteria SAD, MSE, Coding efficiency, etc

Wet Paper Code

Applicable MBs (Dry Spot) Confine modification to them using wet paper code

Embedding Procedure

Determine Applicable MBs

Wet Paper Coding

Perturb Motion Estimation

Video Demo

Sequence:WALK.cif
Duration: 14 s Message Embedded: 2.33KB PSNR Degradation: 0.63dB

Experimental Date 20 CIF standard test sequence 352288 396 MBs Embedding strength: 50 bit/frame

Preliminary Security Evaluation

Traditional Steganalysis
A 39-d feature vector formed by statistical moments of wavelet characteristic functions (Xuan05) A 686-d feature vector derived from the second-order subtractive pixel adjacency (Pevny10) SVM with the polynomial kernel

Preliminary Security Evaluation

Xuans TN 59.7 TP 39.2 AR 49.5 TN 48.3

Pevnys TP 53.5 AR 50.9

Preliminary Security Evaluation

Motion vector map


Vertical and horizontal components as two images A 39-d feature vector formed by statistical moments of wavelet characteristic functions (Xuan05) SVM with the polynomial kernel

Preliminary Security Evaluation


1 0.9 0.8
1 0.9 0.8 0.7

True Positives

0.7 0.6 0.5 0.4 0.3 0.2 0.1 0 0 0.2 0.4 0.6 0.8 1
True Positives

0.6 0.5 0.4 0.3 0.2 0.1 0 0 0.2 0.4 0.6 0.8 1

False Positives

False Positives

Horizontal Component TN 91.5 TP 10.8 AR 51.2 TN 53.5

Vertical Component TP 46.9 AR 50.2

Preliminary Security Evaluation

Target Steganalysis
A 12-d feature vector derived from the changes in MV statistical characteristics (Zhang08) SVM with the polynomial kernel

Preliminary Security Evaluation

Zhangs TN 50.5 TP 51.8 AR 51.2

Summary

Joint Compression-Embedding Using side information Improved security

Future works

Minimize embedding impacts


Different parity functions Different selection rule designing criteria

Further Steganalysis
Larger and more diversified database

Potrebbero piacerti anche