Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Outline
Video Steganography
Video Steganography
Conventional methods
Domain utilized
--Intra frame --Spatial domain (pixels) --Transformed domain (DCT)
Disadvantages
--Derived from image schemes --Vulnerable to certain existing steganalysis
Video Steganography
Joint Compression-Embedding
Using motion information Adopting adaptive selection rules
--Amplitude --Prediction errors
Motivation
Motivation
How to improve?
Using side information
--Information reduction process --Only known to the encoder --Leveraging wet paper code
MB PARTITION
Inter-MB Coding
Entropy Coding
01011100
R C
8,12 4,4
MOTION VECTOR
v 4,8
R R C
SimilarityC , R SimilarityC , R' P v P v ' 1
MOTION VECTOR
C is applicable
Capacity
Applicable MBs (Dry Spot) Confine modification to them using wet paper code
Embedding Procedure
Video Demo
Sequence:WALK.cif
Duration: 14 s Message Embedded: 2.33KB PSNR Degradation: 0.63dB
Experimental Date 20 CIF standard test sequence 352288 396 MBs Embedding strength: 50 bit/frame
Traditional Steganalysis
A 39-d feature vector formed by statistical moments of wavelet characteristic functions (Xuan05) A 686-d feature vector derived from the second-order subtractive pixel adjacency (Pevny10) SVM with the polynomial kernel
True Positives
0.7 0.6 0.5 0.4 0.3 0.2 0.1 0 0 0.2 0.4 0.6 0.8 1
True Positives
0.6 0.5 0.4 0.3 0.2 0.1 0 0 0.2 0.4 0.6 0.8 1
False Positives
False Positives
Target Steganalysis
A 12-d feature vector derived from the changes in MV statistical characteristics (Zhang08) SVM with the polynomial kernel
Summary
Future works
Further Steganalysis
Larger and more diversified database