High-Capacity Convolutional Video Steganography with Temporal Residual Modeling

Steganography represents the art of unobtrusively concealing a secret message within some cover data. The key scope of this work is about high-capacity visual steganography techniques that hide a full-sized color video within another. We empirically validate that high-capacity image steganography model doesn't naturally extend to the video case for it completely ignores the temporal redundancy within consecutive video frames. Our work proposes a novel solution to this problem(i.e., hiding a video into another video). The technical contributions are two-fold: first, motivated by the fact that the residual between two consecutive frames is highly-sparse, we propose to explicitly consider inter-frame residuals. Specifically, our model contains two branches, one of which is specially designed for hiding inter-frame residual into a cover video frame and the other hides the original secret frame. And then two decoders are devised, revealing residual or frame respectively. Secondly, we develop the model based on deep convolutional neural networks, which is the first of its kind in the literature of video steganography. In experiments, comprehensive evaluations are conducted to compare our model with classic steganography methods and pure high-capacity image steganography models. All results strongly suggest that the proposed model enjoys advantages over previous methods. We also carefully investigate our model's security to steganalyzer and the robustness to video compression.

[1]  Laiha Binti Mat Kiah,et al.  High Rate Video Streaming Steganography , 2009, 2009 International Conference on Information Management and Engineering.

[2]  George Danezis,et al.  Generating steganographic images via adversarial training , 2017, NIPS.

[3]  Tomás Pevný,et al.  Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.

[4]  Alexei A. Efros,et al.  Image-to-Image Translation with Conditional Adversarial Networks , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[5]  Yoshua Bengio,et al.  Generative Adversarial Nets , 2014, NIPS.

[6]  Sushil Jajodia,et al.  Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures , 2000, IH 2012.

[7]  Bin Li,et al.  Stacked convolutional auto-encoders for steganalysis of digital images , 2014, Signal and Information Processing Association Annual Summit and Conference (APSIPA), 2014 Asia-Pacific.

[8]  Lorenzo Torresani,et al.  C3D: Generic Features for Video Analysis , 2014, ArXiv.

[9]  Jessica J. Fridrich,et al.  Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.

[10]  E. V. Prasad,et al.  STEGANOGRAPHY USING BPCS TO THE INTEGER WAVELET TRANSFORMED IMAGE , 2007 .

[11]  Roman V. Yampolskiy,et al.  Steganography and Visual Cryptography in Computer Forensics , 2010, 2010 Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering.

[12]  Amal Said Khalifa,et al.  Video steganography: a comprehensive review , 2015, Multimedia Tools and Applications.

[13]  Stefan Katzenbeisser,et al.  Defining security in steganographic systems , 2002, IS&T/SPIE Electronic Imaging.

[14]  B. S. Manjunath,et al.  Data hiding in video , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).

[15]  Jing Dong,et al.  Deep learning for steganalysis via convolutional neural networks , 2015, Electronic Imaging.

[16]  Nasir D. Memon,et al.  Analysis of LSB based image steganography techniques , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[17]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[18]  Gandharba Swain,et al.  Digital Image Steganography Using Eight-Directional PVD against RS Analysis and PDH Analysis , 2018, Adv. Multim..

[19]  Sung Wook Baik,et al.  Image steganography using uncorrelated color space and its application for security of visual contents in online social networks , 2016, Future Gener. Comput. Syst..

[20]  Amandeep Kaur,et al.  STEGANOGRAPHIC APPROACH FOR HIDING IMAGE IN DCT DOMAIN , 2011 .

[21]  Sushanta Biswas,et al.  A novel technique for image steganography based on Block-DCT and Huffman Encoding , 2010, ArXiv.

[22]  Jessica J. Fridrich,et al.  Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[23]  Bin Li,et al.  Investigation on Cost Assignment in Spatial Image Steganography , 2014, IEEE Transactions on Information Forensics and Security.

[24]  Reza Safabakhsh,et al.  An Improvement on LSB Matching and LSB Matching Revisited Steganography Methods , 2017, ArXiv.

[25]  Eiji Kawaguchi,et al.  Principles and applications of BPCS steganography , 1999, Other Conferences.

[26]  Jessica J. Fridrich,et al.  Detecting LSB Steganography in Color and Gray-Scale Images , 2001, IEEE Multim..

[27]  Chet Hosmer,et al.  An Overview of Steganography , 2011, Adv. Comput..

[28]  Omaima N. A. AL-Allaf,et al.  Hiding an Image inside another Image using Variable-Rate Steganography , 2013 .

[29]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998, Computer.

[30]  Jan H. P. Eloff,et al.  An overview of image steganography , 2005, ISSA.

[31]  Adnan Abdul-Aziz Gutub,et al.  RGB Intensity Based Variable-Bits Image Steganography , 2008, 2008 IEEE Asia-Pacific Services Computing Conference.

[32]  Md. Ismail Hossain,et al.  A new approach for LSB based image steganography using secret key , 2011, 14th International Conference on Computer and Information Technology (ICCIT 2011).

[33]  Liang Yang,et al.  Secure Steganography in JPEG Images Based on Histogram Modification and Hyper Chaotic System , 2018, Int. J. Digit. Crime Forensics.

[34]  Shumeet Baluja,et al.  Hiding Images in Plain Sight: Deep Steganography , 2017, NIPS.

[35]  Sahar A. El-Rahman,et al.  A comparative analysis of image steganography based on DCT algorithm and steganography tool to hide nuclear reactors confidential information , 2016, Comput. Electr. Eng..

[36]  Iasonas Kokkinos,et al.  DeepLab: Semantic Image Segmentation with Deep Convolutional Nets, Atrous Convolution, and Fully Connected CRFs , 2016, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[37]  Yun Q. Shi,et al.  Structural Design of Convolutional Neural Networks for Steganalysis , 2016, IEEE Signal Processing Letters.

[38]  Jessica J. Fridrich,et al.  Practical steganalysis of digital images: state of the art , 2002, IS&T/SPIE Electronic Imaging.

[39]  Jiwu Huang,et al.  Edge Adaptive Image Steganography Based on LSB Matching Revisited , 2010, IEEE Transactions on Information Forensics and Security.

[40]  Alan C. Bovik,et al.  Image information and visual quality , 2004, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[41]  Alan C. Bovik,et al.  Image information and visual quality , 2006, IEEE Trans. Image Process..

[42]  Li Fei-Fei,et al.  HiDDeN: Hiding Data With Deep Networks , 2018, ECCV.

[43]  Po-Yueh Chen,et al.  A DWT Based Approach for Image Steganography , 2006 .

[44]  David Megías,et al.  Unsupervised steganalysis based on artificial training sets , 2016, Eng. Appl. Artif. Intell..

[45]  Phalguni Gupta,et al.  Edge-based image steganography , 2014, EURASIP J. Inf. Secur..

[46]  Haitham Badi,et al.  Artificial neural network for steganography , 2014, Neural Computing and Applications.

[47]  Hideki Noda,et al.  BPCS steganography using EZW lossy compressed images , 2002, Pattern Recognit. Lett..

[48]  Jascha Sohl-Dickstein,et al.  Adversarial Examples that Fool both Human and Computer Vision , 2018, ArXiv.

[49]  Min Long,et al.  A Formula Adaptive Pixel Pair Matching Steganography Algorithm , 2018, Adv. Multim..

[50]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..

[51]  Jessica J. Fridrich,et al.  Digital image steganography using stochastic modulation , 2003, IS&T/SPIE Electronic Imaging.

[52]  Marc Chaumont,et al.  Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover sourcemismatch , 2015, Media Watermarking, Security, and Forensics.