From Covert Hiding to Visual Editing: Robust Generative Video Steganography (2401.00652v1)
Abstract: Traditional video steganography methods are based on modifying the covert space for embedding, whereas we propose an innovative approach that embeds secret message within semantic feature for steganography during the video editing process. Although existing traditional video steganography methods display a certain level of security and embedding capacity, they lack adequate robustness against common distortions in online social networks (OSNs). In this paper, we introduce an end-to-end robust generative video steganography network (RoGVS), which achieves visual editing by modifying semantic feature of videos to embed secret message. We employ face-swapping scenario to showcase the visual editing effects. We first design a secret message embedding module to adaptively hide secret message into the semantic feature of videos. Extensive experiments display that the proposed RoGVS method applied to facial video datasets demonstrate its superiority over existing video and image steganography techniques in terms of both robustness and capacity.
- Authors, “The frobnicatable foo filter,” ACM MM 2013 submission ID 324. Supplied as additional material acmmm13.pdf.
- Authors, “Frobnication tutorial,” 2012, Supplied as additional material tr.pdf.
- “An algorithm for the machine computation of complex Fourier series,” Math. Comp., vol. 19, pp. 297–301, Apr. 1965.
- S. Haykin, “Adaptive filter theory,” Information and System Science. Prentice Hall, 4th edition, 2002.
- Dennis R. Morgan, “Dos and don’ts of technical writing,” IEEE Potentials, vol. 24, no. 3, pp. 22–25, Aug. 2005.
- “Designing steganographic distortion using directional filters,” in 2012 IEEE International workshop on information forensics and security (WIFS). IEEE, 2012, pp. 234–239.
- “Universal distortion function for steganography in an arbitrary domain,” EURASIP Journal on Information Security, vol. 2014, pp. 1–13, 2014.
- “A new cost function for spatial image steganography,” in 2014 IEEE International conference on image processing (ICIP). IEEE, 2014, pp. 4206–4210.
- “Redmark: Framework for residual diffusion watermarking based on deep networks,” Expert Systems with Applications, vol. 146, pp. 113157, 2020.
- “Hinet: deep image hiding by invertible network,” in Proceedings of the IEEE/CVF international conference on computer vision, 2021, pp. 4733–4742.
- “Large-capacity image steganography based on invertible neural networks,” in Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, 2021, pp. 10816–10825.
- “Hidden: Hiding data with deep networks,” in Proceedings of the European conference on computer vision (ECCV), 2018, pp. 657–672.
- “Large scale gan training for high fidelity natural image synthesis,” arXiv preprint arXiv:1809.11096, 2018.
- “Progressive growing of gans for improved quality, stability, and variation,” arXiv preprint arXiv:1710.10196, 2017.
- “A style-based generator architecture for generative adversarial networks,” in Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, 2019, pp. 4401–4410.
- “Generative steganography network,” in Proceedings of the 30th ACM International Conference on Multimedia, 2022, pp. 1621–1629.
- “Self-attention generative adversarial networks,” in International conference on machine learning. PMLR, 2019, pp. 7354–7363.
- “A novel image steganography method via deep convolutional generative adversarial networks,” IEEE access, vol. 6, pp. 38303–38314, 2018.
- “A generative method for steganography by cover synthesis with auxiliary semantics,” Tsinghua Science and Technology, vol. 25, no. 4, pp. 516–527, 2020.
- “Generative steganography by sampling,” IEEE access, vol. 7, pp. 118586–118597, 2019.
- “Fine-grained face swapping via regional gan inversion,” in Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023, pp. 8578–8587.
- “3d-model-based face replacement in video,” in SIGGRAPH’09: Posters, pp. 1–1. 2009.
- “Face2face: Real-time face capture and reenactment of rgb videos,” in Proceedings of the IEEE conference on computer vision and pattern recognition, 2016, pp. 2387–2395.
- “Fsgan: Subject agnostic face swapping and reenactment,” in Proceedings of the IEEE/CVF international conference on computer vision, 2019, pp. 7184–7193.
- “Faceshifter: Towards high fidelity and occlusion aware face swapping,” arXiv preprint arXiv:1912.13457, 2019.
- “Simswap: An efficient framework for high fidelity face swapping,” in Proceedings of the 28th ACM International Conference on Multimedia, 2020, pp. 2003–2011.
- “Generative steganography via auto-generation of semantic object contours,” IEEE Transactions on Information Forensics and Security, 2023.
- “Data hiding during image processing using capsule networks,” Neurocomputing, vol. 537, pp. 49–60, 2023.
- “Enhanced least significant bit algorithm for image steganography,” IJCEM International Journal of Computational Engineering & Management, vol. 15, no. 4, pp. 40–42, 2012.
- “An improved lsb based image steganography technique for rgb images,” in 2015 IEEE International Conference on electrical, computer and communication technologies (ICECCT). IEEE, 2015, pp. 1–4.
- “Steganogan: High capacity image steganography with gans,” arXiv preprint arXiv:1901.03892, 2019.
- “A new steganography algorithm based on color histograms for data embedding into raw video streams,” computers & security, vol. 28, no. 7, pp. 670–682, 2009.
- “A high capacity hevc steganographic algorithm using intra prediction modes in multi-sized prediction blocks,” in Digital Forensics and Watermarking: 17th International Workshop, IWDW 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings 17. Springer, 2019, pp. 233–247.
- “A high-performance cnn-applied hevc steganography based on diamond-coded pu partition modes,” IEEE Transactions on Multimedia, vol. 24, pp. 2084–2097, 2021.
- “An anti-steganalysis hevc video steganography with high performance based on cnn and pu partition modes,” IEEE Transactions on Dependable and Secure Computing, vol. 20, no. 1, pp. 606–619, 2022.
- “Adaptive hevc video steganography with high performance based on attention-net and pu partition modes,” IEEE Transactions on Multimedia, 2023.
- “Arcface: Additive angular margin loss for deep face recognition,” in Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, 2019, pp. 4690–4699.
- “Spatial transformer networks,” Advances in neural information processing systems, vol. 28, 2015.
- “Systematic literature review and analysis for arabic text steganography method practically,” Egyptian Informatics Journal, 2022.
- “A coverless image steganography based on robust image wavelet hashing,” TELKOMNIKA (Telecommunication Computing Electronics and Control), vol. 20, no. 6, pp. 1317–1325, 2022.
- “Robust image steganography against general downsampling operations with lossless secret recovery,” IEEE Transactions on Dependable and Secure Computing, 2023.
- “Enhancing lsb using binary message size encoding for high capacity, transparent and secure audio steganography–an innovative approach,” IEEE Access, vol. 10, pp. 29954–29971, 2022.
- Omer Farooq Ahmed Adeeb and Seyed Jahanshah Kabudian, “Arabic text steganography based on deep learning methods,” IEEE Access, vol. 10, pp. 94403–94416, 2022.
- “Text steganography in chat,” in 2007 3rd IEEE/IFIP International Conference in Central Asia on Internet. IEEE, 2007, pp. 1–5.
- B Delina, “Information hiding: A new approach in text steganography,” in Proceedings of the International Conference on Applied Computer and Applied Computational Science, World Scientific and Engineering Academy and Society (WSEAS 2008), 2008, pp. 689–695.
- “A view on latest audio steganography techniques,” in 2011 International Conference on Innovations in Information Technology. IEEE, 2011, pp. 409–414.
- Kaliappan Gopalan, “Audio steganography using bit modification,” in 2003 International Conference on Multimedia and Expo. ICME’03. Proceedings (Cat. No. 03TH8698). IEEE, 2003, vol. 1, pp. I–629.
- “Comparative study of digital audio steganography techniques,” EURASIP Journal on Audio, Speech, and Music Processing, vol. 2012, no. 1, pp. 1–16, 2012.
- “Image generation network for covert transmission in online social network,” in Proceedings of the 30th ACM International Conference on Multimedia, 2022, pp. 2834–2842.
- “High-resolution image synthesis and semantic manipulation with conditional gans,” in Proceedings of the IEEE conference on computer vision and pattern recognition, 2018, pp. 8798–8807.
- “Synthesizing robust adversarial examples,” in International conference on machine learning. PMLR, 2018, pp. 284–293.
- “Deep charuco: Dark charuco marker pose estimation,” in Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2019, pp. 8436–8444.
- “Jpeg-resistant adversarial images,” in NIPS 2017 Workshop on Machine Learning and Computer Security, 2017, vol. 1, p. 8.
- “Stegastamp: Invisible hyperlinks in physical photographs,” in Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, 2020, pp. 2117–2126.
- “Deep residual learning for image recognition,” in Proceedings of the IEEE conference on computer vision and pattern recognition, 2016, pp. 770–778.
- “Arbitrary style transfer in real-time with adaptive instance normalization,” in Proceedings of the IEEE international conference on computer vision, 2017, pp. 1501–1510.
- “Few-shot unsupervised image-to-image translation,” in Proceedings of the IEEE/CVF international conference on computer vision, 2019, pp. 10551–10560.
- “Semantic image synthesis with spatially-adaptive normalization,” in Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, 2019, pp. 2337–2346.
- “Banach wasserstein gan,” Advances in neural information processing systems, vol. 31, 2018.
- “Improved training of wasserstein gans,” Advances in neural information processing systems, vol. 30, 2017.
- “Vggface2: A dataset for recognising faces across pose and age,” in 2018 13th IEEE international conference on automatic face & gesture recognition (FG 2018). IEEE, 2018, pp. 67–74.
- “Universal detection of video steganography in multiple domains based on the consistency of motion vectors,” IEEE transactions on information forensics and security, vol. 15, pp. 1762–1777, 2019.
- “A hevc video steganalysis algorithm based on pu partition modes.,” Computers, Materials & Continua, vol. 59, no. 2, 2019.
- “A prediction mode steganalysis detection algorithm for hevc,” J Optoelectron-laser, vol. 28, no. 4, pp. 433–440, 2017.
- “Deepfake mnist+: a deepfake facial animation dataset,” in Proceedings of the IEEE/CVF International Conference on Computer Vision, 2021, pp. 1973–1982.
- “Image disentanglement autoencoder for steganography without embedding,” in Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, 2022, pp. 2303–2312.
- Robert Engelmore and Anthony Morgan, Eds., Blackboard Systems, Addison-Wesley, Reading, Mass., 1986.
- William J. Clancey, “Communication, Simulation, and Intelligent Agents: Implications of Personal Intelligent Machines for Medical Education,” in Proceedings of the Eighth International Joint Conference on Artificial Intelligence (IJCAI-83), Menlo Park, Calif, 1983, pp. 556–560, IJCAI Organization.
- William J. Clancey, “Classification Problem Solving,” in Proceedings of the Fourth National Conference on Artificial Intelligence, Menlo Park, Calif., 1984, pp. 45–54, AAAI Press.
- Arthur L. Robinson, “New ways to make microcircuits smaller,” Science, vol. 208, no. 4447, pp. 1019–1022, 1980.
- Arthur L. Robinson, “New Ways to Make Microcircuits Smaller—Duplicate Entry,” Science, vol. 208, pp. 1019–1026, 1980.
- “Strategic explanations for a diagnostic consultation system,” International Journal of Man-Machine Studies, vol. 20, no. 1, pp. 3–19, 1984.
- “Strategic Explanations in Consultation—Duplicate,” The International Journal of Man-Machine Studies, vol. 20, no. 1, pp. 3–19, 1983.
- James Rice, “Poligon: A System for Parallel Problem Solving,” Technical Report KSL-86-19, Dept. of Computer Science, Stanford Univ., 1986.
- William J. Clancey, Transfer of Rule-Based Expertise through a Tutorial Dialogue, Ph.D. diss., Dept. of Computer Science, Stanford Univ., Stanford, Calif., 1979.
- William J. Clancey, “The Engineering of Qualitative Models,” Forthcoming, 2021.
- Mathieu Bouville, “Crime and punishment in scientific research,” 2008.
- NASA, “Pluto: The ’other’ red planet,” \urlhttps://www.nasa.gov/nh/pluto-the-other-red-planet, 2015, Accessed: 2018-12-06.
- “Faceforensics++: Learning to detect manipulated facial images,” in Proceedings of the IEEE/CVF international conference on computer vision, 2019, pp. 1–11.
- “Hiding data in images by simple lsb substitution,” Pattern recognition, vol. 37, no. 3, pp. 469–474, 2004.
- “Maintaining rate-distortion optimization for ipm-based video steganography by constructing isolated channels in hevc,” in Proceedings of the 6th ACM workshop on information hiding and multimedia security, 2018, pp. 97–107.
- “Robust image forgery detection over online social network shared images,” in Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022, pp. 13440–13449.
- “Implicit identity leakage: The stumbling block to improving deepfake detection generalization,” in CVPR, 2023.
- “Diffswap: High-fidelity and controllable face swapping via 3d-aware masked diffusion,” in CVPR, 2023.
- “Altfreezing for more general video face forgery detection,” in CVPR, 2023.
- Xueying Mao (1 paper)
- Xiaoxiao Hu (21 papers)
- Wanli Peng (9 papers)
- Zhenliang Gan (3 papers)
- Qichao Ying (20 papers)
- Zhenxing Qian (54 papers)
- Sheng Li (219 papers)
- Xinpeng Zhang (86 papers)