Skip to main content

A Data Hiding Scheme with High Quality for H.264/AVC Video Streams

  • Conference paper
  • First Online:
Cloud Computing and Security (ICCCS 2018)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11066))

Included in the following conference series:

Abstract

Visual quality and bit-rate increase are two main metrics of evaluation for many researchers to evaluate the marked videos that additional data is embedded into. In this paper, we combine matrix embedding with several assumptions to propose a novel data hiding method in H.264/AVC video stream. The assumptions can be exploited to analyse the propagation of intra-frame distortion. Namely, both matrix embedding and the given assumptions are used for improving the quality of marked videos. Therefore, although the proposed scheme cannot completely avoid the intra-frame distortion drift, it can keep a few degradations in terms of visual quality and keep a small variation in bit-rate increase. Experimental results have verified that the proposed method has no significant degradation in terms of visual quality (i.e., PSNR and SSIM) and indeed obtains a very small variation in bit-rate increase.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Information hiding-a survey. Proc. IEEE 87(7), 1062–1078 (1999)

    Article  Google Scholar 

  2. Xu, D., Wang, R., Shi, Y.Q.: Data hiding in encrypted H.264/AVC video streams by codeword substitution. IEEE Trans. Inf. Forensics Secur. 9(4), 596–606 (2014)

    Article  Google Scholar 

  3. Cao, Y., Zhang, H., Zhao, X., Yu, H.: Covert communication by compressed videos exploiting the uncertainty of motion estimation. IEEE Commun. Lett. 19(2), 203–206 (2015)

    Article  Google Scholar 

  4. Bloch, M.R.: Covert communication over noisy channels: a resolvability perspective. IEEE Trans. Inf. Theory 62(5), 2334–2354 (2016)

    Article  MathSciNet  Google Scholar 

  5. Goldwasser, S., Micali, S.: Probabilistic encryption. J. Comput. Syst. Sci. 28(2), 270–299 (1984)

    Article  MathSciNet  Google Scholar 

  6. Wu, H.Z., Wang, H.X., Shi, Y.Q.: PPE-based reversible data hiding. In: Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, New York, NY, USA, pp. 187–188. ACM (2016)

    Google Scholar 

  7. Asikuzzaman, M., Pickering, M.R.: An overview of digital video watermarking. IEEE Trans. Circuits Syst. Video Technol. PP(99), 1 (2017)

    Article  Google Scholar 

  8. Ma, X., Zeng, W.K., Yang, L.T., Zou, D., Jin, H.: Lossless ROI privacy protection of H.264/AVC compressed surveillance videos. IEEE Trans. Emerg. Top. Comput. 4(3), 349–362 (2016)

    Article  Google Scholar 

  9. Peng, Y., Lan, H., Yue, M., Xue, Y.: Multipurpose watermarking for vector map protection and authentication. Multimed. Tools Appl. 77, 7239–7259 (2017)

    Article  Google Scholar 

  10. Zhang, X., Wang, S.: Efficient steganographic embedding by exploiting modification direction. IEEE Commun. Lett. 10(11), 781–783 (2006)

    Article  Google Scholar 

  11. Chen, Y., Wang, H., Wu, H., Liu, Y.: An adaptive data hiding algorithm with low bitrate growth for H.264/AVC video stream. Multimed. Tools Appl. 77, 1–19 (2017)

    Google Scholar 

  12. Fallahpour, M., Shirmohammadi, S., Ghanbari, M.: A high capacity data hiding algorithm for H.264/AVC video. Secur. Commun. Netw. 8(16), 2947–2955 (2015)

    Article  Google Scholar 

  13. Ma, X., Li, Z., Tu, H., Zhang, B.: A data hiding algorithm for H.264/AVC video streams without intra-frame distortion drift. IEEE Trans. Circuits Syst. Video Technol. 20(10), 1320–1330 (2010)

    Article  Google Scholar 

  14. Fridrich, J., Soukal, D.: Matrix embedding for large payloads. IEEE Trans. Inf. Forensics Secur. 1(3), 390–395 (2006)

    Article  Google Scholar 

  15. Wiegand, T., Sullivan, G.J., Bjontegaard, G., Luthra, A.: Overview of the H.264/AVC video coding standard. IEEE Trans. Circuits Syst. Video Technol. 13(7), 560–576 (2003)

    Article  Google Scholar 

  16. Liu, Y., Chen, L., Hu, M., Jia, Z., Jia, S., Zhao, H.: A reversible data hiding method for H.264 with shamirs (t, n)-threshold secret sharing. Neurocomputing 188, 63–70 (2016)

    Article  Google Scholar 

  17. H.264/AVC Reference Software JM12.0. http://iphome.hhi.de/suehring/tml/download/old_jm/

  18. H.264/AVC Reference Video Sequences. https://media.xiph.org/video/derf/

  19. Lie, A., Klaue, J.: Evalvid-RA: trace driven simulation of rate adaptive MPEG-4 VBR video. Multimed. Syst. 14(1), 33–50 (2008)

    Article  Google Scholar 

  20. Yu, J., Li, F., Cheng, H., Zhang, X.: Spatial steganalysis using contrast of residuals. IEEE Signal Process. Lett. 23(7), 989–992 (2016)

    Article  Google Scholar 

Download references

Acknowledgment

The authors would like to thank the reviewers for their insightful comments and helpful suggestions. This work was supported by the National Natural Science Foundation of China (NSFC) under the grant No. U1536110.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hongxia Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chen, Y., Wang, H., Wu, H., Chen, Y., Liu, Y. (2018). A Data Hiding Scheme with High Quality for H.264/AVC Video Streams. In: Sun, X., Pan, Z., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science(), vol 11066. Springer, Cham. https://doi.org/10.1007/978-3-030-00015-8_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00015-8_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00014-1

  • Online ISBN: 978-3-030-00015-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics