Open Access   Article Go Back

H.264/AVC Video Steganography Techniques: An Overview

Mukesh Dalal1 , Mamta Juneja2

  1. UIET, Panjab University, Chandigarh, India.
  2. UIET, Panjab University, Chandigarh, India.

Section:Review Paper, Product Type: Journal Paper
Volume-6 , Issue-5 , Page no. 297-303, May-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i5.297303

Online published on May 31, 2018

Copyright © Mukesh Dalal, Mamta Juneja . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Mukesh Dalal, Mamta Juneja, “H.264/AVC Video Steganography Techniques: An Overview,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.297-303, 2018.

MLA Style Citation: Mukesh Dalal, Mamta Juneja "H.264/AVC Video Steganography Techniques: An Overview." International Journal of Computer Sciences and Engineering 6.5 (2018): 297-303.

APA Style Citation: Mukesh Dalal, Mamta Juneja, (2018). H.264/AVC Video Steganography Techniques: An Overview. International Journal of Computer Sciences and Engineering, 6(5), 297-303.

BibTex Style Citation:
@article{Dalal_2018,
author = {Mukesh Dalal, Mamta Juneja},
title = {H.264/AVC Video Steganography Techniques: An Overview},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2018},
volume = {6},
Issue = {5},
month = {5},
year = {2018},
issn = {2347-2693},
pages = {297-303},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1976},
doi = {https://doi.org/10.26438/ijcse/v6i5.297303}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i5.297303}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1976
TI - H.264/AVC Video Steganography Techniques: An Overview
T2 - International Journal of Computer Sciences and Engineering
AU - Mukesh Dalal, Mamta Juneja
PY - 2018
DA - 2018/05/31
PB - IJCSE, Indore, INDIA
SP - 297-303
IS - 5
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
971 364 downloads 216 downloads
  
  
           

Abstract

Video steganography is a process of embedding data inside in a raw or compressed video sequence. Nowadays compressed videos are preferred over raw videos for data transfer, and H.264/ AVC video format is the most frequently used video standard over the internet. H.264/AVC provides more compression as compared to the previous standards and maintains better visual quality. In H.264/ AVC video steganography the message hiding can be done by conventional methods such as spatial domain and transform domain techniques. Additionally, it has more hiding options as compared to the previous standards which are also utilized by researchers for secret data embedding. In this paper, a concise overview of H.264/ AVC video standard is given, and survey of existing video steganography techniques in H.264/ AVC is also done with the implementation of a 4-0-4 LSB technique to show the impact of embedding. The pros and cons of different hiding techniques used for data embedding in H.264/AVC video are discussed towards the end. This paper aims to provide a brief introduction of video steganography techniques in H.264/ AVC video coding standard.

Key-Words / Index Term

Video Steganography, H.264/AVC, Motion vector, Entropy Coding, DCT, Spatial domain, Transform domain

References

[1] H. A. V. C. C. Video, Y. Tew, and K. Wong, “An overview of information hiding in H. 264/AVC compressed video,” Circuits Syst. Video Technol. IEEE Trans., vol. 24, no. 2, pp. 305–319, 2014.
[2] I. E. Richardson, H. 264 and MPEG-4 video compression: video coding for next-generation multimedia. John Wiley & Sons, 2004.
[3] A. Neufeld and A. Ker, “A study of embedding operations and locations for steganography in H. 264 video,” IS&T/SPIE Electron. Imaging, 2013.
[4] T. Wiegand, G. J. Sullivan, G. Bjontegaard, and A. Luthra, “Overview of the H. 264/AVC video coding standard,” IEEE Trans. circuits Syst. video Technol., vol. 13, no. 7, pp. 560–576, 2003.
[5] S. Nimje, A. Belkhede, G. Chaudari, A. Pawar, and K. Kharbikar, “Hiding existence of communication using image steganography,” Int. J. Comput. Sci. Eng., vol. 2, pp. 163–166, 2014.
[6] S. Suri, H. Joshi, V. Mincoha, and A. Tyagi, “Comparative analysis of steganography for coloured images,” Int. J. Comput. Sci. Eng., vol. 2, no. 4, pp. 180–184, 2014.
[7] M. Dalal and M. Juneja, “Video Steganography Techniques in Spatial Domain-A Survey,” in Proceedings of the International Conference on Computing and Communication Systems, Springer, Singapore, pp. 705–711, 2018.
[8] M. Dalal and M. Juneja, “A robust and imperceptible steganography technique for SD and HD videos,” Multimed. Tools Appl., pp. 1–21, 2018.
[9] A. K. Khan and H. Jamal, “The Intra prediction in H. 264,” Nov. Algorithms Tech. Telecommun. Autom. Ind. Electron., pp. 11–15, 2008.
[10] X. Ma, Z. Li, H. Tu, and B. Zhang, “A data hiding algorithm for h.264/AVC video streams without intra-frame distortion drift,” IEEE Trans. Circuits Syst. Video Technol., vol. 20, no. 10, pp. 1320–1330, 2010.
[11] E. Esen and A. A. Alatan, “Robust video data hiding using forbidden zone data hiding and selective embedding,” IEEE Trans. Circuits Syst. Video Technol., vol. 21, no. 8, pp. 1130–1138, 2011.
[12] Y. Liu, Z. Li, X. Ma, and J. Liu, “A robust data hiding algorithm for H.264/AVC video streams,” J. Syst. Softw., vol. 86, no. 8, pp. 2174–2183, 2013.
[13] Y. Liu, L. Ju, M. Hu, H. Zhao, S. Jia, and Z. Jia, “A new data hiding method for H.264 based on secret sharing,” Neurocomputing, vol. 188, pp. 113–119, 2016.
[14] A. Sur, S. V. M. Krishna, N. Sahu, and S. Rana, “Detection of motion vector based video steganography,” Multimed. Tools Appl., vol. 74, no. 23, pp. 10479–10494, 2015.
[15] Y. Yao, W. Zhang, N. Yu, and X. Zhao, “Defining embedding distortion for motion vector-based video steganography,” Multimed. Tools Appl., vol. 74, no. 24, pp. 11163–11186, 2015.
[16] H. Zhu, R. Wang, and D. Xu, “Information hiding algorithm for H. 264 based on the motion estimation of quarter-pixel,” in Future Computer and Communication (ICFCC), 2010 2nd International Conference on, vol. 1, pp. V1--423, 2010.
[17] W. Jue, Z. Min-qing, and S. Juan-li, “Video steganography using motion vector components,” in Communication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference on, pp. 500–503, 2011.
[18] Y. Cao, H. Zhang, X. Zhao, and H. Yu, “Covert communication by compressed videos exploiting the uncertainty of motion estimation,” IEEE Commun. Lett., vol. 19, no. 2, pp. 203–206, 2015.
[19] N. Ke and Z. Weidong, “A video steganography scheme based on H. 264 bitstreams replaced,” in Software Engineering and Service Science (ICSESS), 2013 4th IEEE International Conference on, pp. 447–450, 2013.
[20] D. Xu, R. Wang, and Y. Q. Shi, “An improved scheme for data hiding in encrypted H.264/AVC videos,” J. Vis. Commun. Image Represent., vol. 36, pp. 229–242, 2016.
[21] P. C. Su, M. T. Lu, and C. Y. Wu, “A practical design of high-volume steganography in digital video files,” Multimed. Tools Appl., vol. 66, no. 2, pp. 247–266, 2013.
[22] D. Xu, R. Wang, and Y. Q. Shi, “Data hiding in encrypted H.264/AVC video streams by codeword substitution,” IEEE Trans. Inf. Forensics Secur., vol. 9, no. 4, pp. 596–606, 2014.
[23] Y. Yao, W. Zhang, and N. Yu, “Inter-frame distortion drift analysis for reversible data hiding in encrypted H.264/AVC video bitstreams,” Signal Processing, vol. 128, pp. 531–545, 2016.