Open Access   Article Go Back

Data Hiding In Encrypted Video Stream By Code-Word Substitution

Sagar Hajare1 , Sujata Nikam2 , Kavita Vispute3 , Ravindra Bodke4

Section:Survey Paper, Product Type: Journal Paper
Volume-3 , Issue-9 , Page no. 256-260, Sep-2015

Online published on Oct 01, 2015

Copyright © Sagar Hajare, Sujata Nikam, Kavita Vispute, Ravindra Bodke . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Sagar Hajare, Sujata Nikam, Kavita Vispute, Ravindra Bodke, “Data Hiding In Encrypted Video Stream By Code-Word Substitution,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.9, pp.256-260, 2015.

MLA Style Citation: Sagar Hajare, Sujata Nikam, Kavita Vispute, Ravindra Bodke "Data Hiding In Encrypted Video Stream By Code-Word Substitution." International Journal of Computer Sciences and Engineering 3.9 (2015): 256-260.

APA Style Citation: Sagar Hajare, Sujata Nikam, Kavita Vispute, Ravindra Bodke, (2015). Data Hiding In Encrypted Video Stream By Code-Word Substitution. International Journal of Computer Sciences and Engineering, 3(9), 256-260.

BibTex Style Citation:
@article{Hajare_2015,
author = {Sagar Hajare, Sujata Nikam, Kavita Vispute, Ravindra Bodke},
title = {Data Hiding In Encrypted Video Stream By Code-Word Substitution},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {9 2015},
volume = {3},
Issue = {9},
month = {9},
year = {2015},
issn = {2347-2693},
pages = {256-260},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=681},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=681
TI - Data Hiding In Encrypted Video Stream By Code-Word Substitution
T2 - International Journal of Computer Sciences and Engineering
AU - Sagar Hajare, Sujata Nikam, Kavita Vispute, Ravindra Bodke
PY - 2015
DA - 2015/10/01
PB - IJCSE, Indore, INDIA
SP - 256-260
IS - 9
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2374 2320 downloads 2379 downloads
  
  
           

Abstract

Inspired by the SMVQ technique, this dissertation proposes a reversible data hiding based on VQ-compressed images.This scheme can completely recover the original VQ cover image from an embedded image after the embedded message is extracted. Compared to the SMVQ technique that is very time consuming to set up a state codebook and then search the nearest codeword, the proposed scheme employs block match coding (BMC) to reduce the complexity and preserve a satisfactory embedding capacity. The main problems in the former works are low embedding capacities, low embedding rates, high complexities, or high bit rates. To improve these problems, the proposed scheme applies the BMC prediction to encode indices, and thus can obtain a higher embedding capacity, higher embedding rate, higher processing efficiency, and lower bit rate simultaneously. This chapter describes the method used for data hiding that is vector quantization and its type side match vector quantization in detail.

Key-Words / Index Term

Data hiding, encrypted domain, H.264/AVC, codeword substituting

References

[1] DawenXu, Rangding Wang, and Yun Q. Shi, Fellow,“Data Hiding in Encrypted H.264/AVC Video Streams by CodewordSubstitution”IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 9, NO. 4, APRIL 2014.
[2] D. W. Xu and R. D. Wang, “Watermarking in H.264/AVC compressed domain using Exp-Golomb code words mapping,” Opt. Eng., vol. 50, no. 9, p. 097402, 2011.
[3] D. K. Zou and J. A. Bloom, “H.264 stream replacement watermarking with CABAC encoding,” in Proc. IEEE ICME, Singapore, Jul. 2010, pp. 117–121.
[4] C. C. Chang, W. C. Wu, and Y. C. Hu, “Lossless recovery of a VQ index table with embedded secret data,” J. Visual Commun. Image Representation, vol. 18, no. 3, pp. 207–216, 2007.
[5] C. C. Chang, Y. P. Hsieh, and C. Y. Lin, “Lossless data embedding with high embedding capacity based on de-clustering for VQ-compresse dcodes,” IEEE Trans. Informat. Forensics Security, vol. 2, no. 3,pp. 341–349, Sep. 2007.
[6] S. C. Shie, S. D. Lin, and C. M. Fang, “Adaptive data hiding based on SMVQprediction,”IEICE Trans. Informat. Syst., vol. E89-D, no. 1, pp.358–362, 2006.
[7] C. C. Chang and C. Y. Lin, “Reversible steganography for VQ compressed images using side matching and relocation,” IEEE Trans. Inform. Forensics Security, vol. 1, no. 4, pp. 493–501, Dec. 2006.
[8] S. G. Lian, Z. X. Liu, Z. Ren, and H. L. Wang, “Secure advanced video coding based on selective encryption algorithms,” IEEE Trans.Consumer Electron., vol. 52, no. 2, pp. 621–629, May 2006.
[9] C. C. Chang, G. M. Chen, and M. H. Lin, “Information hiding basedon search-order coding for VQ indices,” Pattern Recognnit. Lett., vol.25, no. 11, pp. 1253–1261, 2004.
[10] J. Tian, “Reversible data embedding using a difference expansion,” IEEETrans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890–896, Aug.2003.
[11] I. E. G. Richardson, H.264 and MPEG-4 Video Compression: VideoCoding for Next Generation Multimedia. Hoboken, NJ, USA: Wiley,2003.