1st Review Slides
Transcript of 1st Review Slides
-
8/2/2019 1st Review Slides
1/34
Data Hiding in Motion Vectors ofCompressed Video.
Batch 5Project Members:
1.Pothala Preetam (30408104070)2.Vikram Reddy .M(30408104112)3.Vivek Rajan .N(30408104115)
Guide:K.Uma,M.E,(Ph.D)
Assistant Professor
Easwari Engineering CollegeDepartment of Computer Science and Engg
-
8/2/2019 1st Review Slides
2/34
Objectives
To hide secret data in the motion vectors of acompressed video which is not vulnerable toSteganalysis.
To maintain the quality and size of thereconstructed video.
Easwari Engineering CollegeDepartment of Computer Science and Engg
-
8/2/2019 1st Review Slides
3/34
Easwari Engineering CollegeDepartment of Computer Science and Engg
Motivation
Data Hiding is mainly used in InformationSecurity and in Defense.
Interest in the recent improvements in the data
hiding techniques.
-
8/2/2019 1st Review Slides
4/34
Easwari Engineering CollegeDepartment of Computer Science and Engg
Existing System
The existing method targets the motion vectors ofthe compressed video based on their attributes such
as magnitude and phase angle.
The motion vector is selected if its magnitude is large andthe phase angle between two motion vectors is high.
The secret message is encoded in both thehorizontal and vertical component of motion vector.
-
8/2/2019 1st Review Slides
5/34
Easwari Engineering CollegeDepartment of Computer Science and Engg
Challenges in the Existing System
Easily vulnerable to steganalysis.
Existing method has higher distortion to the qualityof the reconstructed video.
Existing method has high increase in the data size of
the reconstructed video.
-
8/2/2019 1st Review Slides
6/34
Easwari Engineering CollegeDepartment of Computer Science and Engg
Proposed System
It targets the motion vectors which are used to reconstruct
and encode both the predictive and bidirectional frames inthe compressed video.
The motion vectors with high prediction error(low PSNR)
are chosen so that it is not vulnerable to steganalysis .
-
8/2/2019 1st Review Slides
7/34
Easwari Engineering CollegeDepartment of Computer Science and Engg
The secret message is encrypted into a cipher text.
The cipher text is coded into bit-stream which is embeddedin LSB of both the horizontal and vertical components ofthe motion chosen vectors.
By using the algorithms the secret message bit-stream is encoded and decoded.
The proposed method have lower distortion to thequality of the video and lower increase data size .
Proposed System
-
8/2/2019 1st Review Slides
8/34
Easwari Engineering CollegeDepartment of Computer Science and Engg
Input and output of the system
SystemHost video
SignalVideo with secretMessage embedded in it.
-
8/2/2019 1st Review Slides
9/34
Easwari Engineering CollegeDepartment of Computer Science and Engg
System ArchitectureInput Video
Datahiding
DataExtraction
SecretMessage
secret
message
EncryptionEKey
Cipher text
Bit stream
GOPsObtain
Motion vectors
Tkey
TKey
EKey
-
8/2/2019 1st Review Slides
10/34
Easwari Engineering CollegeDepartment of Computer Science and Engg
Functional Architecture
MODULE 1 MODULE 2 MODULE 3
Organizing input
video signal
Into GOP
Determining
motion vectors Data hiding
Data
Extraction
Results
Encrypting
Secret messageinto Cipher text
-
8/2/2019 1st Review Slides
11/34
Easwari Engineering CollegeDepartment of Computer Science and Engg
List of modules
1.Organise the input video signal into GOPs and determine
the candidate motion vectors.
2.Data Encryption and Data Hiding.
3.Data extraction, results.
-
8/2/2019 1st Review Slides
12/34
Easwari Engineering CollegeDepartment of Computer Science and Engg
Module 1Organize the input video signal into GOPs and
determine the candidate motion vectors.
In this module:
1.Input video is ordered into group of pictures(GOP) whoseframes can be encoded in the sequence: [I,B,B,P,B,B,P,B,B].
2.Target the candidate motion vectors who associative macroblock prediction is high (low PSNR).
-
8/2/2019 1st Review Slides
13/34
Easwari Engineering CollegeDepartment of Computer Science and Engg
Input and output of module 1
SystemInput video GOP, Candidate
motion vectors.
-
8/2/2019 1st Review Slides
14/34
Easwari Engineering CollegeDepartment of Computer Science and Engg
Design of module 1
Input
Video
Ordered into
group of
pictures
Coded in the
sequence
I,B,B,P,B,B,P,B,B
Determining the
candidate motionvectors
TKey
-
8/2/2019 1st Review Slides
15/34
Easwari Engineering CollegeDepartment of Computer Science and Engg
Module 2
Data Encryption and Data Hiding
In this module:
1.The secret message is encrypted into cipher text usinga key and is coded into bit stream.
2.Message bit stream and both the keys are hidden inmotion vectors of GOPs .
-
8/2/2019 1st Review Slides
16/34
Easwari Engineering CollegeDepartment of Computer Science and Engg
Input and output of module 2
CMV & GOPData Hiding
Video with secretmessage hidden
-
8/2/2019 1st Review Slides
17/34
Easwari Engineering CollegeDepartment of Computer Science and Engg
Design of module 2
secret
message
Encryption
Cipher text
Bit stream
EKey Data Hiding
& Compression
TKey
Video with secret
message hidden
-
8/2/2019 1st Review Slides
18/34
Easwari Engineering CollegeDepartment of Computer Science and Engg
Algorithm for module 2:Data hiding in GOP
Input : GOP, motion vectors,Output : Data embedded in the Encoded GOP
For each P and B frame in GOP (d,E`) Obtain the motion vectors Get the message bit stream size.Replace the LSB of the motion vectors horizontal andvertical component with message bit stream.
For B-Frame replace for the backward compensationmotion vectors the least significant bit.
-
8/2/2019 1st Review Slides
19/34
Easwari Engineering CollegeDepartment of Computer Science and Engg
Algorithm for module 2:Data hiding in GOP(contd)
Compress the video using JPEG compression.
The key for each frame is different which is also hiddenin the motion vectors or sent via a different channel.
-
8/2/2019 1st Review Slides
20/34
Easwari Engineering CollegeDepartment of Computer Science and Engg
Module 3Data extraction
In this module:
1.The compressed video with secret message embedded in itis now decompressed.
2.The secret message bit stream is extracted back by decryption
and reconstructed back by concatenation.
3.The results are evaluated based on two metrics:quality distortion to the reconstructed video and data size
increase of the compressed video.
-
8/2/2019 1st Review Slides
21/34
Easwari Engineering CollegeDepartment of Computer Science and Engg
Input and output of module 3
Data
Extraction
Hidden secret
message bit streamVideo with secretmessage hidden
-
8/2/2019 1st Review Slides
22/34
Easwari Engineering CollegeDepartment of Computer Science and Engg
Design of module 3
Data Extractor
(Decryption)
Extracted
message bit
stream
Video with secret
message hidden
Concatenation
Secret
message
-
8/2/2019 1st Review Slides
23/34
Easwari Engineering CollegeDepartment of Computer Science and Engg
Algorithm for module 3:Data Extraction
Input : Compressed GOP with secret message in it.Output : Message bit stream m.
Extract the keys for all frames in GOP from I-frameor use them from other channel.For each P and B Frame in GOP do
Decompress the GOP and identify the candidate motionvectors.
Extract the cipher text from the motion vectors.Extract the original message by decryption.
-
8/2/2019 1st Review Slides
24/34
Easwari Engineering CollegeDepartment of Computer Science and Engg
References
Data Hiding in Motion Vectors of CompressedVideo Based on Their Associated Prediction
Error by Hussein A. Aly , Member, IEEE inIEEE TRANSACTIONS ON INFORMATIONFORENSICS AND SECURITY, VOL. 6, NO. 1,MARCH 2011
-
8/2/2019 1st Review Slides
25/34
Easwari Engineering CollegeDepartment of Computer Science and Engg
Information hidingA survey
By F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn,in Proc. IEEE, vol. 87, no. 7, pp. 10621078,Jul.1999.
References
Data hiding in H.264 encoded video sequences
By S. K. Kapotas, E. E. Varsaki, and A. N. Skodras,in IEEE 9th Workshop on Multimedia SignalProcessing (MMSP07), Oct. 2007, pp. 373376.
-
8/2/2019 1st Review Slides
26/34
Easwari Engineering CollegeDepartment of Computer Science and Engg
References
A novel video watermark technique in motion vectors
By P.Wang, Z. Zheng, and J. Ying, in Int. Conf.Audio, Language and Image Processing (ICALIP),Jul. 2008, pp. 15551559.
Steganography in compressed video stream
By C. Xu, X. Ping, and T. Zhang, in Proc. Int. Conf.Innovative Computing, Information and Control(ICICIC06), 2006, vol. II, pp. 803806.
-
8/2/2019 1st Review Slides
27/34
Easwari Engineering CollegeDepartment of Computer Science and Engg
ReferencesA novel steganographic algorithm based on the motion vector phase,
By X. He and Z. Luo, in Proc. Int. Conf. Comp. Sc. and Software Eng.,
2008, pp. 822825.
Data hiding for digital video with phase ofmotion vector,
By D.-Y. Fang and L.-W. Chang, in Proc. Int. Symp. Circuits and
Systems (ISCAS),2006, pp. 14221425.
-
8/2/2019 1st Review Slides
28/34
web search Results
-
8/2/2019 1st Review Slides
29/34
3/20/2012 29
3.StateChart Diagram
web search Results
-
8/2/2019 1st Review Slides
30/34
3/20/2012 30
4.Activity Diagram
web search Results
-
8/2/2019 1st Review Slides
31/34
3/20/2012 31
5.Component Diagram
-
8/2/2019 1st Review Slides
32/34
-
8/2/2019 1st Review Slides
33/34
-
8/2/2019 1st Review Slides
34/34