Nothing Special   »   [go: up one dir, main page]

skip to main content
article

Efficient information hiding in H.264/AVC video coding

Published: 01 February 2012 Publication History

Abstract

This paper proposes a new real-time information hiding algorithm on latest H.264/AVC video coding standard. The information is embedded into the Trailing Ones of 4 4 blocks during the Context-based Adaptive Variable Length Coding (CAVLC) process. This algorithm is efficient with low computational complexity. The simulation results show that the degradation of video quality is negligible, and the same overall bit-stream length is maintained. Based on this information hiding method, a video subtitle transmission scheme is proposed. Under the simulation of different RTP packet loss channels, the embedded information can be well recovered. The comparison with other algorithms shows the superiority of our proposed method.

References

[1]
Lian, S. (2008). Multimedia content encryption: techniques and applications. Auerbach publication. London: Taylor & Francis.
[2]
Cox, I., Miller, M., Bloom, J., Fridrich, J., & Kalker, T. (2008). Digital watermarking and steganography (2nd ed.). San Mateo: Morgan Kaufmann.
[3]
Katzenbeisser, S., & Petitcolas, A. P. F. (1999). Information hiding techniques for steganography and digital watermarking. Norwood: Artech House.
[4]
Li, Z., Sun, X., Wang, B., & Wang, X. (2008). A steganography scheme in P2P network. In Proceedings of the 2008 international conference on intelligent information hiding and multimedia signal processing (pp. 20---24).
[5]
Szczypiorski, K. (2003). HICCUPS: Hidden communication system for corrupted networks. In Proceeding of the tenth international multi-conference on advanced computer systems ACS'2003 (pp. 31---40).
[6]
Mazurczyk, W., Smolarczyk, M., & Szczypiorski, K. (2009). Hiding information in retransmissions. In Computing research repository (CoRR), Cornell University, Ithaca, NY (USA). arXiv:0905.0363 {abs}.
[7]
Zhang, J., & Ho, A. T. S. (2005). Robust digital image-in-video watermarking for the emerging H.264/AVC standard. In IEEE workshop on signal processing systems design and implementation (pp. 657---662).
[8]
Sakazawa, S., Takishima, Y., & Nakajima, Y. (2006). H.264 native video watermarking method. In Proceedings of IEEE international symposium on circuits and systems (pp. 1439---1442).
[9]
Shan, C., & Sun, D. (2007). Bi-watermarking algorithm for H.264/AVC low bit-rate video stream. Computer Application, 8, 1922---1925.
[10]
Lian, S., Liu, Z., Ren, Z., & Wang, H. (2007). Commutative encryption and watermarking in compressed video data. IEEE Transactions on Circuits and Systems for Video Technology, 17(6), 774---778.
[11]
Lian, S., Liu, Z., Ren, Z., & Wang, H. (2006). Secure distribution scheme for compressed data streams. In IEEE conference on image processing (ICIP 2006) (pp. 1953---1956).
[12]
Mobasseri, B., & Raikar, Y. N. (2007). Authentication of H.264 streams by direct watermarking of CAVLC blocks. In Proceedings of SPIE--the international society for optical engineering (p. 6505).
[13]
Zou, D., & Bloom, J. A. (2008). H.264/AVC Stream replacement technique for video watermarking. In IEEE international conference on acoustics, speech, and signal processing (pp. 1749---1752).
[14]
Seo, Y. H., Choi, H. J., Lee, C. Y., & Kim, D. W. (2008). Low-complexity watermarking based on entropy coding in H.264/AVC. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E91-A(8), 2130---2137.
[15]
Kim, S. M., Kim, S. B., Hong, Y., & Won, C. S. (2007). Data hiding on H.264/AVC compressed video. In Lecture notes in computer science (Vol. 4633, pp. 698---707). Berlin: Springer.
[16]
Zhang, C., Su, Y., & Guan, X. (2000). Digital multimedia watermarking techniques. Journal of China Institute of Communications, 21(9), 46---52.
[17]
Langelaar, G. C., Lagendijk, R. L., & Biemond, J. (1998). Real-time labeling of MPEG-2 compressed video. Journal of Visual Communication and Image Representation, 9(4), 256---270.
[18]
Langelaar, G. C., & Lagendijk, R. L. (2001). Optimal differential energy watermarking (DEW) of DCT encoded images and video. IEEE Transaction on Image Processing, 10(1), 148---158.
[19]
ITU-T H.264 (2007). Series H: audiovisual and multimedia systems, infrastructure of audiovisual services--coding of moving video, advanced video coding for generic audiovisual services. ITU-T, 11.
[20]
Richardson, I. E. G. (2002). H.264/MPEG-4 part 10 white paper: variable length coding.
[21]
Bjontegaard, G., & Lillevold, K. (2002). Contex-adaptive VLC coding of coefficients. JVT Document JVT-C028, Fairfax, VA.
[22]
Chen, S., Zhong, X.-X., Shi, J., & Zhu, S.-Y. (2007). Image encryption through discrete digital chaotic sequence. Journal of Electronics and Information Technology, 29(4), 898---900.
[23]
Liao, K., Ye, D., Lian, S., Guo, Z., & Wang, J. (2009). Lightweight information hiding in H.264/AVC video stream. In Proceedings of 2009 international conference on multimedia information networking and security (MINES'09) (Vol. 1, pp. 578---582). IEEE Computer Society.
[24]
RFC3984 (2005). RTP payload format for H.264 video. Network Working Group, Standards Track.
[25]
Richardson, I. E. G. (2003). H.264 and MPEG-4 video compression--video coding for next-generation multimedia. New York: Wiley.
[26]
Noorkami, M., & Mersereau, R. M. (2005). Compressed domain video watermarking for H.264. In International conference on image processing (Vol. 2, pp. 890---893).

Cited By

View all
  • (2023)Video steganography: recent advances and challengesMultimedia Tools and Applications10.1007/s11042-023-14844-w82:27(41943-41985)Online publication date: 4-Apr-2023
  • (2022)CAVLCU: an efficient GPU-based implementation of CAVLCThe Journal of Supercomputing10.1007/s11227-021-04183-878:6(7556-7590)Online publication date: 1-Apr-2022
  • (2021)Study and investigation of video steganography over uncompressed and compressed domain: a comprehensive reviewMultimedia Systems10.1007/s00530-021-00763-z27:5(985-1024)Online publication date: 1-Oct-2021
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Telecommunications Systems
Telecommunications Systems  Volume 49, Issue 2
February 2012
101 pages

Publisher

Kluwer Academic Publishers

United States

Publication History

Published: 01 February 2012

Author Tags

  1. CAVLC
  2. H.264/AVC
  3. Information hiding
  4. RTP
  5. Subtitle

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 25 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Video steganography: recent advances and challengesMultimedia Tools and Applications10.1007/s11042-023-14844-w82:27(41943-41985)Online publication date: 4-Apr-2023
  • (2022)CAVLCU: an efficient GPU-based implementation of CAVLCThe Journal of Supercomputing10.1007/s11227-021-04183-878:6(7556-7590)Online publication date: 1-Apr-2022
  • (2021)Study and investigation of video steganography over uncompressed and compressed domain: a comprehensive reviewMultimedia Systems10.1007/s00530-021-00763-z27:5(985-1024)Online publication date: 1-Oct-2021
  • (2020)Blind MV-based video steganalysis based on joint inter-frame and intra-frame statisticsMultimedia Tools and Applications10.1007/s11042-020-10001-980:6(9137-9159)Online publication date: 8-Nov-2020
  • (2020)Undetectable video steganography by considering spatio-temporal steganalytic features in the embedding cost functionMultimedia Tools and Applications10.1007/s11042-020-08617-y79:27-28(18909-18939)Online publication date: 14-Mar-2020
  • (2019)Adaptive VP8 Steganography Based on Deblocking FilteringProceedings of the ACM Workshop on Information Hiding and Multimedia Security10.1145/3335203.3335711(25-30)Online publication date: 2-Jul-2019
  • (2017)Segmentation Based Video Steganalysis to Detect Motion Vector ModificationSecurity and Communication Networks10.1155/2017/80513892017Online publication date: 1-Jan-2017
  • (2017)A Steganalytic Algorithm to Detect DCT-based Data Hiding Methods for H.264/AVC VideosProceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security10.1145/3082031.3083245(123-133)Online publication date: 20-Jun-2017
  • (2017)Combined and Calibrated Features for Steganalysis of Motion Vector-Based Steganography in H.264/AVCProceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security10.1145/3082031.3083237(135-146)Online publication date: 20-Jun-2017
  • (2017)Compressed and raw video steganography techniquesMultimedia Tools and Applications10.1007/s11042-016-4055-176:20(21749-21786)Online publication date: 1-Oct-2017
  • Show More Cited By

View Options

View options

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media