1st Review Slides

download 1st Review Slides

of 34

Transcript of 1st Review Slides

  • 8/2/2019 1st Review Slides

    1/34

    Data Hiding in Motion Vectors ofCompressed Video.

    Batch 5Project Members:

    1.Pothala Preetam (30408104070)2.Vikram Reddy .M(30408104112)3.Vivek Rajan .N(30408104115)

    Guide:K.Uma,M.E,(Ph.D)

    Assistant Professor

    Easwari Engineering CollegeDepartment of Computer Science and Engg

  • 8/2/2019 1st Review Slides

    2/34

    Objectives

    To hide secret data in the motion vectors of acompressed video which is not vulnerable toSteganalysis.

    To maintain the quality and size of thereconstructed video.

    Easwari Engineering CollegeDepartment of Computer Science and Engg

  • 8/2/2019 1st Review Slides

    3/34

    Easwari Engineering CollegeDepartment of Computer Science and Engg

    Motivation

    Data Hiding is mainly used in InformationSecurity and in Defense.

    Interest in the recent improvements in the data

    hiding techniques.

  • 8/2/2019 1st Review Slides

    4/34

    Easwari Engineering CollegeDepartment of Computer Science and Engg

    Existing System

    The existing method targets the motion vectors ofthe compressed video based on their attributes such

    as magnitude and phase angle.

    The motion vector is selected if its magnitude is large andthe phase angle between two motion vectors is high.

    The secret message is encoded in both thehorizontal and vertical component of motion vector.

  • 8/2/2019 1st Review Slides

    5/34

    Easwari Engineering CollegeDepartment of Computer Science and Engg

    Challenges in the Existing System

    Easily vulnerable to steganalysis.

    Existing method has higher distortion to the qualityof the reconstructed video.

    Existing method has high increase in the data size of

    the reconstructed video.

  • 8/2/2019 1st Review Slides

    6/34

    Easwari Engineering CollegeDepartment of Computer Science and Engg

    Proposed System

    It targets the motion vectors which are used to reconstruct

    and encode both the predictive and bidirectional frames inthe compressed video.

    The motion vectors with high prediction error(low PSNR)

    are chosen so that it is not vulnerable to steganalysis .

  • 8/2/2019 1st Review Slides

    7/34

    Easwari Engineering CollegeDepartment of Computer Science and Engg

    The secret message is encrypted into a cipher text.

    The cipher text is coded into bit-stream which is embeddedin LSB of both the horizontal and vertical components ofthe motion chosen vectors.

    By using the algorithms the secret message bit-stream is encoded and decoded.

    The proposed method have lower distortion to thequality of the video and lower increase data size .

    Proposed System

  • 8/2/2019 1st Review Slides

    8/34

    Easwari Engineering CollegeDepartment of Computer Science and Engg

    Input and output of the system

    SystemHost video

    SignalVideo with secretMessage embedded in it.

  • 8/2/2019 1st Review Slides

    9/34

    Easwari Engineering CollegeDepartment of Computer Science and Engg

    System ArchitectureInput Video

    Datahiding

    DataExtraction

    SecretMessage

    secret

    message

    EncryptionEKey

    Cipher text

    Bit stream

    GOPsObtain

    Motion vectors

    Tkey

    TKey

    EKey

  • 8/2/2019 1st Review Slides

    10/34

    Easwari Engineering CollegeDepartment of Computer Science and Engg

    Functional Architecture

    MODULE 1 MODULE 2 MODULE 3

    Organizing input

    video signal

    Into GOP

    Determining

    motion vectors Data hiding

    Data

    Extraction

    Results

    Encrypting

    Secret messageinto Cipher text

  • 8/2/2019 1st Review Slides

    11/34

    Easwari Engineering CollegeDepartment of Computer Science and Engg

    List of modules

    1.Organise the input video signal into GOPs and determine

    the candidate motion vectors.

    2.Data Encryption and Data Hiding.

    3.Data extraction, results.

  • 8/2/2019 1st Review Slides

    12/34

    Easwari Engineering CollegeDepartment of Computer Science and Engg

    Module 1Organize the input video signal into GOPs and

    determine the candidate motion vectors.

    In this module:

    1.Input video is ordered into group of pictures(GOP) whoseframes can be encoded in the sequence: [I,B,B,P,B,B,P,B,B].

    2.Target the candidate motion vectors who associative macroblock prediction is high (low PSNR).

  • 8/2/2019 1st Review Slides

    13/34

    Easwari Engineering CollegeDepartment of Computer Science and Engg

    Input and output of module 1

    SystemInput video GOP, Candidate

    motion vectors.

  • 8/2/2019 1st Review Slides

    14/34

    Easwari Engineering CollegeDepartment of Computer Science and Engg

    Design of module 1

    Input

    Video

    Ordered into

    group of

    pictures

    Coded in the

    sequence

    I,B,B,P,B,B,P,B,B

    Determining the

    candidate motionvectors

    TKey

  • 8/2/2019 1st Review Slides

    15/34

    Easwari Engineering CollegeDepartment of Computer Science and Engg

    Module 2

    Data Encryption and Data Hiding

    In this module:

    1.The secret message is encrypted into cipher text usinga key and is coded into bit stream.

    2.Message bit stream and both the keys are hidden inmotion vectors of GOPs .

  • 8/2/2019 1st Review Slides

    16/34

    Easwari Engineering CollegeDepartment of Computer Science and Engg

    Input and output of module 2

    CMV & GOPData Hiding

    Video with secretmessage hidden

  • 8/2/2019 1st Review Slides

    17/34

    Easwari Engineering CollegeDepartment of Computer Science and Engg

    Design of module 2

    secret

    message

    Encryption

    Cipher text

    Bit stream

    EKey Data Hiding

    & Compression

    TKey

    Video with secret

    message hidden

  • 8/2/2019 1st Review Slides

    18/34

    Easwari Engineering CollegeDepartment of Computer Science and Engg

    Algorithm for module 2:Data hiding in GOP

    Input : GOP, motion vectors,Output : Data embedded in the Encoded GOP

    For each P and B frame in GOP (d,E`) Obtain the motion vectors Get the message bit stream size.Replace the LSB of the motion vectors horizontal andvertical component with message bit stream.

    For B-Frame replace for the backward compensationmotion vectors the least significant bit.

  • 8/2/2019 1st Review Slides

    19/34

    Easwari Engineering CollegeDepartment of Computer Science and Engg

    Algorithm for module 2:Data hiding in GOP(contd)

    Compress the video using JPEG compression.

    The key for each frame is different which is also hiddenin the motion vectors or sent via a different channel.

  • 8/2/2019 1st Review Slides

    20/34

    Easwari Engineering CollegeDepartment of Computer Science and Engg

    Module 3Data extraction

    In this module:

    1.The compressed video with secret message embedded in itis now decompressed.

    2.The secret message bit stream is extracted back by decryption

    and reconstructed back by concatenation.

    3.The results are evaluated based on two metrics:quality distortion to the reconstructed video and data size

    increase of the compressed video.

  • 8/2/2019 1st Review Slides

    21/34

    Easwari Engineering CollegeDepartment of Computer Science and Engg

    Input and output of module 3

    Data

    Extraction

    Hidden secret

    message bit streamVideo with secretmessage hidden

  • 8/2/2019 1st Review Slides

    22/34

    Easwari Engineering CollegeDepartment of Computer Science and Engg

    Design of module 3

    Data Extractor

    (Decryption)

    Extracted

    message bit

    stream

    Video with secret

    message hidden

    Concatenation

    Secret

    message

  • 8/2/2019 1st Review Slides

    23/34

    Easwari Engineering CollegeDepartment of Computer Science and Engg

    Algorithm for module 3:Data Extraction

    Input : Compressed GOP with secret message in it.Output : Message bit stream m.

    Extract the keys for all frames in GOP from I-frameor use them from other channel.For each P and B Frame in GOP do

    Decompress the GOP and identify the candidate motionvectors.

    Extract the cipher text from the motion vectors.Extract the original message by decryption.

  • 8/2/2019 1st Review Slides

    24/34

    Easwari Engineering CollegeDepartment of Computer Science and Engg

    References

    Data Hiding in Motion Vectors of CompressedVideo Based on Their Associated Prediction

    Error by Hussein A. Aly , Member, IEEE inIEEE TRANSACTIONS ON INFORMATIONFORENSICS AND SECURITY, VOL. 6, NO. 1,MARCH 2011

  • 8/2/2019 1st Review Slides

    25/34

    Easwari Engineering CollegeDepartment of Computer Science and Engg

    Information hidingA survey

    By F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn,in Proc. IEEE, vol. 87, no. 7, pp. 10621078,Jul.1999.

    References

    Data hiding in H.264 encoded video sequences

    By S. K. Kapotas, E. E. Varsaki, and A. N. Skodras,in IEEE 9th Workshop on Multimedia SignalProcessing (MMSP07), Oct. 2007, pp. 373376.

  • 8/2/2019 1st Review Slides

    26/34

    Easwari Engineering CollegeDepartment of Computer Science and Engg

    References

    A novel video watermark technique in motion vectors

    By P.Wang, Z. Zheng, and J. Ying, in Int. Conf.Audio, Language and Image Processing (ICALIP),Jul. 2008, pp. 15551559.

    Steganography in compressed video stream

    By C. Xu, X. Ping, and T. Zhang, in Proc. Int. Conf.Innovative Computing, Information and Control(ICICIC06), 2006, vol. II, pp. 803806.

  • 8/2/2019 1st Review Slides

    27/34

    Easwari Engineering CollegeDepartment of Computer Science and Engg

    ReferencesA novel steganographic algorithm based on the motion vector phase,

    By X. He and Z. Luo, in Proc. Int. Conf. Comp. Sc. and Software Eng.,

    2008, pp. 822825.

    Data hiding for digital video with phase ofmotion vector,

    By D.-Y. Fang and L.-W. Chang, in Proc. Int. Symp. Circuits and

    Systems (ISCAS),2006, pp. 14221425.

  • 8/2/2019 1st Review Slides

    28/34

    web search Results

  • 8/2/2019 1st Review Slides

    29/34

    3/20/2012 29

    3.StateChart Diagram

    web search Results

  • 8/2/2019 1st Review Slides

    30/34

    3/20/2012 30

    4.Activity Diagram

    web search Results

  • 8/2/2019 1st Review Slides

    31/34

    3/20/2012 31

    5.Component Diagram

  • 8/2/2019 1st Review Slides

    32/34

  • 8/2/2019 1st Review Slides

    33/34

  • 8/2/2019 1st Review Slides

    34/34