paint-brush
New AI Beats Rivals in Hiding Secret Messages in Videosby@kinetograph

New AI Beats Rivals in Hiding Secret Messages in Videos

by Kinetograph: The Video Editing Technology Publication
Kinetograph: The Video Editing Technology Publication HackerNoon profile picture

Kinetograph: The Video Editing Technology Publication

@kinetograph

The Kinetograph's the 1st motion-picture camera. At Kinetograph.Tech, we cover...

December 25th, 2024
Read on Terminal Reader
Read this story in a terminal
Print this story
Read this story w/o Javascript
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

Researchers developed a method to hide secret messages that is more secure and resistant to distortion during online sharing.
featured image - New AI Beats Rivals in Hiding Secret Messages in Videos
1x
Read by Dr. One voice-avatar

Listen to this story

Kinetograph: The Video Editing Technology Publication HackerNoon profile picture
Kinetograph: The Video Editing Technology Publication

Kinetograph: The Video Editing Technology Publication

@kinetograph

The Kinetograph's the 1st motion-picture camera. At Kinetograph.Tech, we cover cutting edge tech for video editing.

Learn More
LEARN MORE ABOUT @KINETOGRAPH'S
EXPERTISE AND PLACE ON THE INTERNET.
0-item

STORY’S CREDIBILITY

Academic Research Paper

Academic Research Paper

Part of HackerNoon's growing list of open-source research papers, promoting free access to academic material.

Authors:

(1) Xueying Mao, School of Computer Science, Fudan University, China (xymao22@m.@fudan.edu.cn);

(2) Xiaoxiao Hu, School of Computer Science, Fudan University, China (xxhu23@m.fudan.edu.cn);

(3) Wanli Peng, School of Computer Science, Fudan University, China (pengwanli@fudan.edu.cn);

(4) Zhenliang Gan, School of Computer Science, Fudan University, China (zlgan23@m.@fudan.edu.cn);

(5) Qichao Ying, School of Computer Science, Fudan University, China (qcying20@fudan.edu.cn);

(6) Zhenxing Qian, School of Computer Science, Fudan University, China and a Corresponding Author (zxqian@fudan.edu.cn);

(7) Sheng Li, School of Computer Science, Fudan University, China (lisheng@fudan.edu.cn);

(8) Xinpeng Zhang, School of Computer Science, Fudan University, China (zhangxinpeng@fudan.edu.cn).

Editor's note: This is Part 5 of 7 of a study describing the development of a new method to hide secret messages in semantic features of videos, making it more secure and resistant to distortion during online sharing. Read the rest below.

4.2. Performance Analysis

We compare the performance of our RoGVS with image-level steganography including HiDDeN [12] and LSB [80] and video-level steganography including PWRN [35].


Video Quality Assessment. Fig 4 shows qualitative results on the integrity of generated video frames. We perform tests within and across datasets, each containing 16 test samples.


Fig. 4. Exampled Generated Stego Video Frames. Left: Vggface2. Right: FFHQ.

Fig. 4. Exampled Generated Stego Video Frames. Left: Vggface2. Right: FFHQ.


Table 2. Ablation Study on Different Embedding Positions of Secret Message. Evaluation metric: Accuracy.

Table 2. Ablation Study on Different Embedding Positions of Secret Message. Evaluation metric: Accuracy.


The generated faces effectively change individual identities while retaining attributes like expressions and poses. More findings are available in the supplementary materials. Fig 3 illustrates the visual effects of certain intermittent frames within the stego videos.


Comparisons on Extraction Accuracy & Robustness. We conduct extensive experiments with multiple types of distortions. Detailed distortion implementations are provided in the supplement.


Table 3. Ablation Study for λ on Extraction Accuracy.

Table 3. Ablation Study for λ on Extraction Accuracy.


The quantitative comparison results in terms of accuracy are reported in Table 1. The results show that our method can successfully extract secret message with high accuracy even after severe distortions. LSB [80] struggles even with PNG (quantization) and HiDDeN [12], though trained with a distortion module, can not generalize well to video-level distortions. PWRN [35] demonstrates robustness across numerous distortions, yet its performance remains constrained under operations such as motion blur or contrast adjustment. The proposed RoGVS method shows superior robustness to these distortions while maintaining high extraction accuracy.


Table 4. Quantitative Security Analysis. Evaluation metric: AUC. Closer to 0.5 indicates higher performance.

Table 4. Quantitative Security Analysis. Evaluation metric: AUC. Closer to 0.5 indicates higher performance.



Security Analysis. We use three video steganalysis tools to evaluate the security of our method. The detection performance of these three steganalysis schemes is presented in Table 4. Table 4 demonstrates that our method exhibits slightly superior security compared to the three counterparts.


This paper is available on arxiv under CC 4.0 license.


L O A D I N G
. . . comments & more!

About Author

Kinetograph: The Video Editing Technology Publication HackerNoon profile picture
Kinetograph: The Video Editing Technology Publication@kinetograph
The Kinetograph's the 1st motion-picture camera. At Kinetograph.Tech, we cover cutting edge tech for video editing.

TOPICS

THIS ARTICLE WAS FEATURED IN...

Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite
Hackernoon
Threads
Bsky
X REMOVE AD