Yun CAO Xianfeng ZHAO Dengguo FENG Rennong SHENG Video Steganography with Perturbed Motion Estimation.

Slides:



Advertisements
Similar presentations
Introduction to H.264 / AVC Video Coding Standard Multimedia Systems Sharif University of Technology November 2008.
Advertisements

CHEN XIAOYU HUANG. Introduction of Steganography A group of data hiding technique,which hides data in undetectable way. Features extracted from modified.
MPEG4 Natural Video Coding Functionalities: –Coding of arbitrary shaped objects –Efficient compression of video and images over wide range of bit rates.
Technion - IIT Dept. of Electrical Engineering Signal and Image Processing lab Transrating and Transcoding of Coded Video Signals David Malah Ran Bar-Sella.
Reversible Data Hiding ECE643 Digital Image Processing (I) Course Project Professor: Yun Q. Shi Su Yu 12/02/2011.
S HORT D ISTANCE I NTRA C ODING S CHEME FOR H IGH E FFICIENCY V IDEO C ODING IEEE Transaction on Image Processing, Vol. 22, No. 2, February 2013 Xiaoran.
Presented by Yehuda Dar Advanced Topics in Computer Vision ( )Winter
1 A Markov Process Based Approach to Effective Attacking JPEG Steganography By Y. Q. Shi, Chunhua Chen, Wen Chen NJIT Presented by Hanlin Hu and Xiao Zhang.
ECE643 DIGITAL IMAGE PROCESSING Steganalysis versus Splicing detection Paper by: Yun Q. Shi, Chunhua Chen, Guorong Xuan and Wei Su By: Nehal Patel Siddharth.
H.264/AVC Baseline Profile Decoder Complexity Analysis Michael Horowitz, Anthony Joch, Faouzi Kossentini, and Antti Hallapuro IEEE TRANSACTIONS ON CIRCUITS.
SCHOOL OF COMPUTING SCIENCE SIMON FRASER UNIVERSITY CMPT 820 : Error Mitigation Schaar and Chou, Multimedia over IP and Wireless Networks: Compression,
Evaluation of Data-Parallel Splitting Approaches for H.264 Decoding
Outline Introduction Introduction Fast Inter Prediction Mode Decision for H.264 – –Pre-encoding An Efficient Inter Mode Decision Approach for H.264 Video.
1 Static Sprite Generation Prof ︰ David, Lin Student ︰ Jang-Ta, Jiang
An Efficient Low Bit-Rate Video-coding Algorithm Focusing on Moving Regions Kwok-Wai Wong, Kin-Man Lam, Wan-Chi Siu IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS.
H.264 / MPEG-4 Part 10 Nimrod Peleg March 2003.
Scalable Wavelet Video Coding Using Aliasing- Reduced Hierarchical Motion Compensation Xuguang Yang, Member, IEEE, and Kannan Ramchandran, Member, IEEE.
Error Concealment For Fine Granularity Scalable Video Transmission Hua Cai; Guobin Shen; Feng Wu; Shipeng Li; Bing Zeng; Multimedia and Expo, Proceedings.
FAST MULTI-BLOCK SELECTION FOR H.264 VIDEO CODING Chang, A.; Wong, P.H.W.; Yeung, Y.M.; Au, O.C.; Circuits and Systems, ISCAS '04. Proceedings of.
Communication & Multimedia C. -Y. Tsai 2005/8/17 1 MCTF in Current Scalable Video Coding Schemes Student: Chia-Yang Tsai Advisor: Prof. Hsueh-Ming Hang.
Wyner-Ziv Residual Coding of Video Anne Aaron, David Varodayan and Bernd Girod Information Systems Laboratory Stanford University.
Source-Channel Prediction in Error Resilient Video Coding Hua Yang and Kenneth Rose Signal Compression Laboratory ECE Department University of California,
Scalable Rate Control for MPEG-4 Video Hung-Ju Lee, Member, IEEE, Tihao Chiang, Senior Member, IEEE, and Ya-Qin Zhang, Fellow, IEEE IEEE TRANSACTIONS ON.
Further Study on YASS: Steganography Based on Randomized Embedding to Resists Blind Steganalysis A. Sarkar +, K. Solanki*, and B. Manjunath Vision.
Error Resilience of Video Transmission By Rate-Distortion Optimization and Adaptive Packetization Yuxin Liu, Paul Salama and Edwad Delp ICME 2002.
An Introduction to H.264/AVC and 3D Video Coding.
1 Thread-Parallel MPEG-2, MPEG4 and H.264 Video Encoders for SoC Multi- Processor Architecture Tom R. Jacobs, Vassilios A. Chouliars, and David J. Mulvaney.
Electrical Engineering National Central University Video-Audio Processing Laboratory Data Error in (Networked) Video M.K.Tsai 04 / 08 / 2003.
1 Efficient Reference Frame Selector for H.264 Tien-Ying Kuo, Hsin-Ju Lu IEEE CSVT 2008.
Adaptive Multi-path Prediction for Error Resilient H.264 Coding Xiaosong Zhou, C.-C. Jay Kuo University of Southern California Multimedia Signal Processing.
TM Paramvir Bahl Microsoft Corporation Adaptive Region-Based Multi-Scaled Motion- Compensated Video Coding for Error Prone Communication.
Low-Power H.264 Video Compression Architecture for Mobile Communication Student: Tai-Jung Huang Advisor: Jar-Ferr Yang Teacher: Jenn-Jier Lien.
A Novel steganographic method for JPEG images by Vasiliy Sachnev - Introduction  JPEG compression  Steganography - Block based steganography method (F5)
Compression video overview 演講者:林崇元. Outline Introduction Fundamentals of video compression Picture type Signal quality measure Video encoder and decoder.
1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.
Guillaume Laroche, Joel Jung, Beatrice Pesquet-Popescu CSVT
Benchmarking steganographic and steganalysis techniques Electronic Imaging of SPIE 2005 Authors:Kharrazi, Mehdi, Husrev T. Sencar, and Nasir Memon Department.
Wyner-Ziv Coding of Motion Video Presented by fakewen.
Unified Loop Filter for High-performance Video Coding Yu Liu and Yan Huo ICME2010, July 19-23, Singapore.
Page 11/28/2016 CSE 40373/60373: Multimedia Systems Quantization  F(u, v) represents a DCT coefficient, Q(u, v) is a “quantization matrix” entry, and.
Block-based coding Multimedia Systems and Standards S2 IF Telkom University.
3-D Direction Aligned Wavelet Transform for Scalable Video Coding Yu Liu 1, King Ngi Ngan 1, and Feng Wu 2 1 Department of Electronic Engineering The Chinese.
Speaker: Po-Kai Shen Advisor: Tsai-Rong Chang Date: 2010/11/16 1 Steganalysis of LSB matching based on statistical modeling of pixel difference distributions.
COMPARATIVE STUDY OF HEVC and H.264 INTRA FRAME CODING AND JPEG2000 BY Under the Guidance of Harshdeep Brahmasury Jain Dr. K. R. RAO ID MS Electrical.
1 Yu Liu 1, Feng Wu 2 and King Ngi Ngan 1 1 Department of Electronic Engineering, The Chinese University of Hong Kong 2 Microsoft Research Asia, Beijing,
(B1) What are the advantages and disadvantages of digital TV systems? Hint: Consider factors on noise, data security, VOD etc. 1.
1 A Markov Process Based Approach to Effective Attacking JPEG Steganography By Y. Q. Shi, Chunhua Chen, Wen Chen NJIT Presented by Ashish Ratnakar and.
Motion Estimation Multimedia Systems and Standards S2 IF Telkom University.
A Frame-Level Rate Control Scheme Based on Texture and Nontexture Rate Models for HEVC IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY,
Outline  Introduction  Observations and analysis  Proposed algorithm  Experimental results 2.
YASS Yet Another Steganographic Scheme that Resists Blind Steganalysis K. Solanki*, A. Sarkar +, and B. Manjunath Vision Research Laboratory Department.
基於 (7,4) 漢明碼的隱寫技術 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University National Chung Cheng University Feng Chia University
Fast disparity motion estimation in MVC based on range prediction Xiao Zhong Xu, Yun He ICIP 2008.
Multi-Frame Motion Estimation and Mode Decision in H.264 Codec Shauli Rozen Amit Yedidia Supervised by Dr. Shlomo Greenberg Communication Systems Engineering.
CMPT365 Multimedia Systems 1 Media Compression - Video Spring 2015 CMPT 365 Multimedia Systems.
H. 261 Video Compression Techniques 1. H.261  H.261: An earlier digital video compression standard, its principle of MC-based compression is retained.
Complexity varying intra prediction in H.264 Supervisors: Dr. Ofer Hadar, Mr. Evgeny Kaminsky Students: Amit David, Yoav Galon.
Introduction to H.264 / AVC Video Coding Standard Multimedia Systems Sharif University of Technology November 2008.
基於(7,4)漢明碼的隱寫技術 Chair Professor Chin-Chen Chang (張真誠)
Overview of the Scalable Video Coding
BITS Pilani Pilani Campus EEE G612 Coding Theory and Practice SONU BALIYAN 2017H P.
Error Concealment In The Pixel Domain And MATLAB commands
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
Limitations of Traditional Error-Resilience Methods
Deep Learning Hierarchical Representations for Image Steganalysis
Standards Presentation ECE 8873 – Data Compression and Modeling
MPEG4 Natural Video Coding
A Restricted Region-based Data-hiding Scheme
New Framework for Reversible Data Hiding in Encrypted Domain
A Restricted Region-based Data-hiding Scheme
Presentation transcript:

Yun CAO Xianfeng ZHAO Dengguo FENG Rennong SHENG Video Steganography with Perturbed Motion Estimation

Outline Performance Perturbed Motion Estimation Motivation Introduction

Video Steganography Adequate payloads Multiple applications Advanced technologies

Video Steganography  Conventional methods  Domain utilized --Intra frame --Spatial domain (pixels) --Transformed domain (DCT)  Disadvantages --Derived from image schemes --Vulnerable to certain existing steganalysis

Video Steganography  Joint Compression-Embedding  Using motion information  Adopting adaptive selection rules --Amplitude --Prediction errors

Motivation Arbitrary Modification Degradation in Steganographic Security Known/Week Selection rule

Motivation  How to improve?  Using side information --Information reduction process --Only known to the encoder --Leveraging wet paper code  Mitigate the embedding effects --Design pointed selection rules --Merge motion estimation & embedding

Typical Inter-frame Coding … Entropy Coding DCT & QUANTIZATION Inter-MB Coding MB PARTITION

Regular Motion Estimation MBCOORDINATE R C MOTION VECTOR

Perturbed Motion Estimation MBCOORDINATE R R’ C MOTION VECTOR C is applicable

Capacity  Number of applicable MBs  Free to choose criteria  SAD, MSE, Coding efficiency, etc

Wet Paper Code  Applicable MBs (Dry Spot)  Confine modification to them using wet paper code

Embedding Procedure Determine Applicable MBsWet Paper CodingPerturb Motion Estimation

Video Demo  Sequence:“WALK.cif”  Duration: 14 s  Message Embedded: 2.33KB  PSNR Degradation: 0.63dB

Experimental Date  20 CIF standard test sequence  352×288 , 396 MBs  Embedding strength: 50 bit/frame

Preliminary Security Evaluation  Traditional Steganalysis  A 39-d feature vector formed by statistical moments of wavelet characteristic functions (Xuan05)  A 686-d feature vector derived from the second-order subtractive pixel adjacency (Pevny10)  SVM with the polynomial kernel

Preliminary Security Evaluation Xuan’sPevny’s TNTPARTNTPAR

Preliminary Security Evaluation  Motion vector map  Vertical and horizontal components as two images  A 39-d feature vector formed by statistical moments of wavelet characteristic functions (Xuan05)  SVM with the polynomial kernel

Preliminary Security Evaluation Horizontal ComponentVertical Component TNTPARTNTPAR

Preliminary Security Evaluation  Target Steganalysis  A 12-d feature vector derived from the changes in MV statistical characteristics (Zhang08)  SVM with the polynomial kernel

Preliminary Security Evaluation Zhang’s TNTPAR

Summary Joint Compression-Embedding Using side information Improved security

Future works  Minimize embedding impacts  Different parity functions  Different selection rule designing criteria  Further Steganalysis  Larger and more diversified database