paint-brush
Researchers Claim AI May Be the Ultimate Tool for Hiding Secret Messages in Videosby@kinetograph
New Story

Researchers Claim AI May Be the Ultimate Tool for Hiding Secret Messages in Videos

tldt arrow

Too Long; Didn't Read

Researchers developed a method to hide secret messages that is more secure and resistant to distortion during online sharing.
featured image - Researchers Claim AI May Be the Ultimate Tool for Hiding Secret Messages in Videos
Kinetograph: The Video Editing Technology Publication HackerNoon profile picture

Authors:

(1) Xueying Mao, School of Computer Science, Fudan University, China (xymao22@[email protected]);

(2) Xiaoxiao Hu, School of Computer Science, Fudan University, China ([email protected]);

(3) Wanli Peng, School of Computer Science, Fudan University, China ([email protected]);

(4) Zhenliang Gan, School of Computer Science, Fudan University, China (zlgan23@[email protected]);

(5) Qichao Ying, School of Computer Science, Fudan University, China ([email protected]);

(6) Zhenxing Qian, School of Computer Science, Fudan University, China and a Corresponding Author ([email protected]);

(7) Sheng Li, School of Computer Science, Fudan University, China ([email protected]);

(8) Xinpeng Zhang, School of Computer Science, Fudan University, China ([email protected]).

Editor's note: This is Part 7 of 7 of a study describing the development of a new method to hide secret messages in semantic features of videos, making it more secure and resistant to distortion during online sharing. Read the rest below.

5. CONCLUSIONS

We propose a robust generative video steganography method based on visual editing, which modifies semantic feature to embed secret message. We use face-swapping scenario as an example to show the effectiveness of our RoGVS. The results showcase that our method can generate high-quality visually edited stego videos. What’s more, RoGVS outperforms existing video and image steganography methods in robustness and capacity.

6. REFERENCES

[1] Authors, “The frobnicatable foo filter,” ACM MM 2013 submission ID 324. Supplied as additional material acmmm13.pdf.


[2] Authors, “Frobnication tutorial,” 2012, Supplied as additional material tr.pdf. [3] J. W. Cooley and J. W. Tukey, “An algorithm for the machine computation of complex Fourier series,” Math. Comp., vol. 19, pp. 297–301, Apr. 1965.


[4] S. Haykin, “Adaptive filter theory,” Information and System Science. Prentice Hall, 4th edition, 2002.


[5] Dennis R. Morgan, “Dos and don’ts of technical writing,” IEEE Potentials, vol. 24, no. 3, pp. 22–25, Aug. 2005.


[6] Vojtech Holub and Jessica Fridrich, “Designing stegano- ˇ graphic distortion using directional filters,” in 2012 IEEE International workshop on information forensics and security (WIFS). IEEE, 2012, pp. 234–239.


[7] Vojtech Holub, Jessica Fridrich, and Tom ˇ a´s Denemark, “Uni- ˇ versal distortion function for steganography in an arbitrary domain,” EURASIP Journal on Information Security, vol. 2014, pp. 1–13, 2014.


[8] Bin Li, Ming Wang, Jiwu Huang, and Xiaolong Li, “A new cost function for spatial image steganography,” in 2014 IEEE International conference on image processing (ICIP). IEEE, 2014, pp. 4206–4210.


[9] Mahdi Ahmadi, Alireza Norouzi, Nader Karimi, Shadrokh Samavi, and Ali Emami, “Redmark: Framework for residual diffusion watermarking based on deep networks,” Expert Systems with Applications, vol. 146, pp. 113157, 2020.


[10] Junpeng Jing, Xin Deng, Mai Xu, Jianyi Wang, and Zhenyu Guan, “Hinet: deep image hiding by invertible network,” in Proceedings of the IEEE/CVF international conference on computer vision, 2021, pp. 4733–4742.


[11] Shao-Ping Lu, Rong Wang, Tao Zhong, and Paul L Rosin, “Large-capacity image steganography based on invertible neural networks,” in Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, 2021, pp. 10816– 10825.


[12] Jiren Zhu, Russell Kaplan, Justin Johnson, and Li Fei-Fei, “Hidden: Hiding data with deep networks,” in Proceedings of the European conference on computer vision (ECCV), 2018, pp. 657–672.


[13] Andrew Brock, Jeff Donahue, and Karen Simonyan, “Large scale gan training for high fidelity natural image synthesis,” arXiv preprint arXiv:1809.11096, 2018.


[14] Tero Karras, Timo Aila, Samuli Laine, and Jaakko Lehtinen, “Progressive growing of gans for improved quality, stability, and variation,” arXiv preprint arXiv:1710.10196, 2017.


[15] Tero Karras, Samuli Laine, and Timo Aila, “A style-based generator architecture for generative adversarial networks,” in Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, 2019, pp. 4401–4410.


[16] Ping Wei, Sheng Li, Xinpeng Zhang, Ge Luo, Zhenxing Qian, and Qing Zhou, “Generative steganography network,” in Proceedings of the 30th ACM International Conference on Multimedia, 2022, pp. 1621–1629.


[17] Han Zhang, Ian Goodfellow, Dimitris Metaxas, and Augustus Odena, “Self-attention generative adversarial networks,” in International conference on machine learning. PMLR, 2019, pp. 7354–7363.


[18] Donghui Hu, Liang Wang, Wenjie Jiang, Shuli Zheng, and Bin Li, “A novel image steganography method via deep convolutional generative adversarial networks,” IEEE access, vol. 6, pp. 38303–38314, 2018.


[19] Zhuo Zhang, Guangyuan Fu, Rongrong Ni, Jia Liu, and Xiaoyuan Yang, “A generative method for steganography by cover synthesis with auxiliary semantics,” Tsinghua Science and Technology, vol. 25, no. 4, pp. 516–527, 2020.


[20] Zhuo Zhang, Jia Liu, Yan Ke, Yu Lei, Jun Li, Minqing Zhang, and Xiaoyuan Yang, “Generative steganography by sampling,” IEEE access, vol. 7, pp. 118586–118597, 2019.


[21] Zhian Liu, Maomao Li, Yong Zhang, Cairong Wang, Qi Zhang, Jue Wang, and Yongwei Nie, “Fine-grained face swapping via regional gan inversion,” in Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023, pp. 8578–8587.


[22] Yi-Ting Cheng, Virginia Tzeng, Yu Liang, Chuan-Chang Wang, Bing-Yu Chen, Yung-Yu Chuang, and Ming Ouhyoung, “3d-model-based face replacement in video,” in SIGGRAPH’09: Posters, pp. 1–1. 2009.


[23] Justus Thies, Michael Zollhofer, Marc Stamminger, Christian Theobalt, and Matthias Nießner, “Face2face: Real-time face capture and reenactment of rgb videos,” in Proceedings of the IEEE conference on computer vision and pattern recognition, 2016, pp. 2387–2395.


[24] Yuval Nirkin, Yosi Keller, and Tal Hassner, “Fsgan: Subject agnostic face swapping and reenactment,” in Proceedings of the IEEE/CVF international conference on computer vision, 2019, pp. 7184–7193.


[25] Lingzhi Li, Jianmin Bao, Hao Yang, Dong Chen, and Fang Wen, “Faceshifter: Towards high fidelity and occlusion aware face swapping,” arXiv preprint arXiv:1912.13457, 2019.


[26] Renwang Chen, Xuanhong Chen, Bingbing Ni, and Yanhao Ge, “Simswap: An efficient framework for high fidelity face swapping,” in Proceedings of the 28th ACM International Conference on Multimedia, 2020, pp. 2003–2011.


[27] Zhili Zhou, Xiaohua Dong, Ruohan Meng, Meimin Wang, Hongyang Yan, Keping Yu, and Kim-Kwang Raymond Choo, “Generative steganography via auto-generation of semantic object contours,” IEEE Transactions on Information Forensics and Security, 2023.


[28] Zichi Wang, Guorui Feng, Hanzhou Wu, and Xinpeng Zhang, “Data hiding during image processing using capsule networks,” Neurocomputing, vol. 537, pp. 49–60, 2023.


[29] Shilpa Gupta, Geeta Gujral, and Neha Aggarwal, “Enhanced least significant bit algorithm for image steganography,” IJCEM International Journal of Computational Engineering & Management, vol. 15, no. 4, pp. 40–42, 2012.


[30] Amritpal Singh and Harpal Singh, “An improved lsb based image steganography technique for rgb images,” in 2015 IEEE International Conference on electrical, computer and communication technologies (ICECCT). IEEE, 2015, pp. 1–4.


[31] Kevin Alex Zhang, Alfredo Cuesta-Infante, Lei Xu, and Kalyan Veeramachaneni, “Steganogan: High capacity image steganography with gans,” arXiv preprint arXiv:1901.03892, 2019.


[32] Ozdemir Cetin and A Turan Ozcerit, “A new steganography algorithm based on color histograms for data embedding into raw video streams,” computers & security, vol. 28, no. 7, pp. 670–682, 2009.


[33] Yi Dong, Tanfeng Sun, and Xinghao Jiang, “A high capacity hevc steganographic algorithm using intra prediction modes in multi-sized prediction blocks,” in Digital Forensics and Watermarking: 17th International Workshop, IWDW 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings 17. Springer, 2019, pp. 233–247.


[34] Jindou Liu, Zhaohong Li, Xinghao Jiang, and Zhenzhen Zhang, “A high-performance cnn-applied hevc steganography based on diamond-coded pu partition modes,” IEEE Transactions on Multimedia, vol. 24, pp. 2084–2097, 2021.


[35] Zhonghao Li, Xinghao Jiang, Yi Dong, Laijin Meng, and Tanfeng Sun, “An anti-steganalysis hevc video steganography with high performance based on cnn and pu partition modes,” IEEE Transactions on Dependable and Secure Computing, vol. 20, no. 1, pp. 606–619, 2022.


[36] Songhan He, Dawen Xu, Lin Yang, and Weipeng Liang, “Adaptive hevc video steganography with high performance based on attention-net and pu partition modes,” IEEE Transactions on Multimedia, 2023.


[37] Jiankang Deng, Jia Guo, Niannan Xue, and Stefanos Zafeiriou, “Arcface: Additive angular margin loss for deep face recognition,” in Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, 2019, pp. 4690–4699.


[38] Max Jaderberg, Karen Simonyan, Andrew Zisserman, et al., “Spatial transformer networks,” Advances in neural information processing systems, vol. 28, 2015.


[39] Nuur Alifah Roslan, Nur Izura Udzir, Ramlan Mahmod, and Adnan Gutub, “Systematic literature review and analysis for arabic text steganography method practically,” Egyptian Informatics Journal, 2022.


[40] Nadia A Karim, Suhad A Ali, and Majid Jabbar Jawad, “A coverless image steganography based on robust image wavelet hashing,” TELKOMNIKA (Telecommunication Computing Electronics and Control), vol. 20, no. 6, pp. 1317–1325, 2022.


[41] Sheng Li, Zichi Wang, Xiudong Zhang, and Xinpeng Zhang, “Robust image steganography against general downsampling operations with lossless secret recovery,” IEEE Transactions on Dependable and Secure Computing, 2023.


[42] Mahmoud M Mahmoud and Huwaida T Elshoush, “Enhancing lsb using binary message size encoding for high capacity, transparent and secure audio steganography–an innovative approach,” IEEE Access, vol. 10, pp. 29954–29971, 2022.


[43] Omer Farooq Ahmed Adeeb and Seyed Jahanshah Kabudian, “Arabic text steganography based on deep learning methods,” IEEE Access, vol. 10, pp. 94403–94416, 2022.


[44] M Hassan Shirali-Shahreza and Mohammad Shirali-Shahreza, “Text steganography in chat,” in 2007 3rd IEEE/IFIP International Conference in Central Asia on Internet. IEEE, 2007, pp. 1–5.


[45] B Delina, “Information hiding: A new approach in text steganography,” in Proceedings of the International Conference on Applied Computer and Applied Computational Science, World Scientific and Engineering Academy and Society (WSEAS 2008), 2008, pp. 689–695.


[46] Fatiha Djebbar, Beghdad Ayad, Habib Hamam, and Karim Abed-Meraim, “A view on latest audio steganography techniques,” in 2011 International Conference on Innovations in Information Technology. IEEE, 2011, pp. 409–414.


[47] Kaliappan Gopalan, “Audio steganography using bit modification,” in 2003 International Conference on Multimedia and Expo. ICME’03. Proceedings (Cat. No. 03TH8698). IEEE, 2003, vol. 1, pp. I–629.


[48] Fatiha Djebbar, Beghdad Ayad, Karim Abed Meraim, and Habib Hamam, “Comparative study of digital audio steganography techniques,” EURASIP Journal on Audio, Speech, and Music Processing, vol. 2012, no. 1, pp. 1–16, 2012.


[49] Zhengxin You, Qichao Ying, Sheng Li, Zhenxing Qian, and Xinpeng Zhang, “Image generation network for covert transmission in online social network,” in Proceedings of the 30th ACM International Conference on Multimedia, 2022, pp. 2834–2842.


[50] Ting-Chun Wang, Ming-Yu Liu, Jun-Yan Zhu, Andrew Tao, Jan Kautz, and Bryan Catanzaro, “High-resolution image synthesis and semantic manipulation with conditional gans,” in Proceedings of the IEEE conference on computer vision and pattern recognition, 2018, pp. 8798–8807.


[51] Anish Athalye, Logan Engstrom, Andrew Ilyas, and Kevin Kwok, “Synthesizing robust adversarial examples,” in International conference on machine learning. PMLR, 2018, pp. 284–293.


[52] Danying Hu, Daniel DeTone, and Tomasz Malisiewicz, “Deep charuco: Dark charuco marker pose estimation,” in Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2019, pp. 8436–8444.


[53] Richard Shin and Dawn Song, “Jpeg-resistant adversarial images,” in NIPS 2017 Workshop on Machine Learning and Computer Security, 2017, vol. 1, p. 8.


[54] Matthew Tancik, Ben Mildenhall, and Ren Ng, “Stegastamp: Invisible hyperlinks in physical photographs,” in Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, 2020, pp. 2117–2126.


[55] Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun, “Deep residual learning for image recognition,” in Proceedings of the IEEE conference on computer vision and pattern recognition, 2016, pp. 770–778.


[56] Xun Huang and Serge Belongie, “Arbitrary style transfer in real-time with adaptive instance normalization,” in Proceedings of the IEEE international conference on computer vision, 2017, pp. 1501–1510.


[57] Ming-Yu Liu, Xun Huang, Arun Mallya, Tero Karras, Timo Aila, Jaakko Lehtinen, and Jan Kautz, “Few-shot unsupervised image-to-image translation,” in Proceedings of the IEEE/CVF international conference on computer vision, 2019, pp. 10551– 10560.


[58] Taesung Park, Ming-Yu Liu, Ting-Chun Wang, and Jun-Yan Zhu, “Semantic image synthesis with spatially-adaptive normalization,” in Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, 2019, pp. 2337– 2346.


[59] Jonas Adler and Sebastian Lunz, “Banach wasserstein gan,” Advances in neural information processing systems, vol. 31, 2018.


[60] Ishaan Gulrajani, Faruk Ahmed, Martin Arjovsky, Vincent Dumoulin, and Aaron C Courville, “Improved training of wasserstein gans,” Advances in neural information processing systems, vol. 30, 2017.


[61] Qiong Cao, Li Shen, Weidi Xie, Omkar M Parkhi, and Andrew Zisserman, “Vggface2: A dataset for recognising faces across pose and age,” in 2018 13th IEEE international conference on automatic face & gesture recognition (FG 2018). IEEE, 2018, pp. 67–74.


[62] Liming Zhai, Lina Wang, and Yanzhen Ren, “Universal detection of video steganography in multiple domains based on the consistency of motion vectors,” IEEE transactions on information forensics and security, vol. 15, pp. 1762–1777, 2019.


[63] Zhonghao Li, Laijing Meng, Shutong Xu, Zhaohong Li, Yunqing Shi, and Yuanchang Liang, “A hevc video steganalysis algorithm based on pu partition modes.,” Computers, Materials & Continua, vol. 59, no. 2, 2019.


[64] Q Sheng, RD Wang, ML Huang, Q Li, and D Xu, “A prediction mode steganalysis detection algorithm for hevc,” J Optoelectron-laser, vol. 28, no. 4, pp. 433–440, 2017.


[65] Jiajun Huang, Xueyu Wang, Bo Du, Pei Du, and Chang Xu, “Deepfake mnist+: a deepfake facial animation dataset,” in Proceedings of the IEEE/CVF International Conference on Computer Vision, 2021, pp. 1973–1982.


[66] Xiyao Liu, Ziping Ma, Junxing Ma, Jian Zhang, Gerald Schaefer, and Hui Fang, “Image disentanglement autoencoder for steganography without embedding,” in Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, 2022, pp. 2303–2312.


[67] Robert Engelmore and Anthony Morgan, Eds., Blackboard Systems, Addison-Wesley, Reading, Mass., 1986.


[68] William J. Clancey, “Communication, Simulation, and Intelligent Agents: Implications of Personal Intelligent Machines for Medical Education,” in Proceedings of the Eighth International Joint Conference on Artificial Intelligence (IJCAI-83), Menlo Park, Calif, 1983, pp. 556–560, IJCAI Organization.


[69] William J. Clancey, “Classification Problem Solving,” in Proceedings of the Fourth National Conference on Artificial Intelligence, Menlo Park, Calif., 1984, pp. 45–54, AAAI Press.


[70] Arthur L. Robinson, “New ways to make microcircuits smaller,” Science, vol. 208, no. 4447, pp. 1019–1022, 1980.


[71] Arthur L. Robinson, “New Ways to Make Microcircuits Smaller—Duplicate Entry,” Science, vol. 208, pp. 1019–1026, 1980.


[72] Diane Warner Hasling, William J. Clancey, and Glenn Rennels, “Strategic explanations for a diagnostic consultation system,” International Journal of Man-Machine Studies, vol. 20, no. 1, pp. 3–19, 1984.


[73] Diane Warner Hasling, William J. Clancey, Glenn R. Rennels, and Thomas Test, “Strategic Explanations in Consultation— Duplicate,” The International Journal of Man-Machine Studies, vol. 20, no. 1, pp. 3–19, 1983.


[74] James Rice, “Poligon: A System for Parallel Problem Solving,” Technical Report KSL-86-19, Dept. of Computer Science, Stanford Univ., 1986.


[75] William J. Clancey, Transfer of Rule-Based Expertise through a Tutorial Dialogue, Ph.D. diss., Dept. of Computer Science, Stanford Univ., Stanford, Calif., 1979.


[76] William J. Clancey, “The Engineering of Qualitative Models,” Forthcoming, 2021.


[77] Mathieu Bouville, “Crime and punishment in scientific research,” 2008.


[78] NASA, “Pluto: The ’other’ red planet,” https://www. nasa.gov/nh/pluto-the-other-red-planet, 2015, Accessed: 2018-12-06.


[79] Andreas Rossler, Davide Cozzolino, Luisa Verdoliva, Christian Riess, Justus Thies, and Matthias Nießner, “Faceforensics++: Learning to detect manipulated facial images,” in Proceedings of the IEEE/CVF international conference on computer vision, 2019, pp. 1–11.


[80] Chi-Kwong Chan and Lee-Ming Cheng, “Hiding data in images by simple lsb substitution,” Pattern recognition, vol. 37, no. 3, pp. 469–474, 2004.


[81] Yu Wang, Yun Cao, Xianfeng Zhao, Zhoujun Xu, and Meineng Zhu, “Maintaining rate-distortion optimization for ipm-based video steganography by constructing isolated channels in hevc,” in Proceedings of the 6th ACM workshop on information hiding and multimedia security, 2018, pp. 97–107.


[82] Haiwei Wu, Jiantao Zhou, Jinyu Tian, and Jun Liu, “Robust image forgery detection over online social network shared images,” in Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022, pp. 13440–13449.


[83] Shichao Dong, Jin Wang, Renhe Ji, and et al., “Implicit identity leakage: The stumbling block to improving deepfake detection generalization,” in CVPR, 2023.


[84] Wenliang Zhao, Yongming Rao, Weikang Shi, and et al., “Diffswap: High-fidelity and controllable face swapping via 3daware masked diffusion,” in CVPR, 2023.


[85] Zhendong Wang, Jianmin Bao, and et al., “Altfreezing for more general video face forgery detection,” in CVPR, 2023.


This paper is available on arxiv under CC 4.0 license.