Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Data Hiding in H.264/AVC Video Streams with Tampering Detection

Author : R.Aparna 1 Ajish S 2

Date of Publication :7th February 2016

Abstract: With the arrival of many sophisticated video editing technologies, it becomes significantly difficult to trust the correctness of the video information. There are many cryptographically secure ways of video transmission. The proposed scheme includes encryption, data hiding and tampering detection using the embedded data. The proposed method includes the following three parts- H.264/AVC video encryption ,data embedding and data extraction for tampering detection. A selective encryption is performed in the compressed domain. Encryption and data hiding make use of the compression parameters. Two sensitive parameters namely intra prediction modes (IPM) and motion vector difference(MVD) are selected for encryption . The data hiding is performed by codeword substitution technique where the codewords of levels are used. The data embedded is used for tamper detection.The scheme ensures both format compliance and strict file size preservation even after encryption and data hiding.

Reference :

    1. W. J. Lu, A. Varna, and M. Wu, “Secure video processing: Problems and challenges,” in Proc. IEEE Int. Conf. Acoust., Speech, Signal Processing, Prague, Czech Republic, May 2011, pp. 5856–5859.
    2. B. Zhao, W. D. Kou, and H. Li, “Effective watermarking scheme in the encrypted domain for buyer-seller watermarking protocol,” Inf. Sci., vol. 180, no. 23, pp. 4672–4684, 2010.
    3. P. J. Zheng and J. W. Huang, “Walsh-Hadamard transform in the homomorphic encrypted domain and its application in image watermarking,” in Proc. 14th Inf. Hiding Conf., Berkeley, CA, USA, 2012, pp. 1–15.
    4. Mehdi Fallahpour, Shervin Shirmohammadi, Mehdi Semsarzadeh, and Jiying Zhao, “Tampering detection in compressed digital video using watermarking” IEEE Trans. Instrumentation and Measurement, vol. 63, no. 5, May 2014
    5. I. E. G. Richardson, H.264 and MPEG-4 Video Compression: Video Coding for Next Generation Multimedia. Hoboken, NJ, USA: Wiley, 2003
    6. https://en.wikipedia.org/wiki/RC4
    7. https://staff.najah.edu/sites/default/files/Evaluation_of_t he_RC4_Algorithm_for_Data_Encryption.pdf
    8. Dawen Xu, Rangding Wang, and Yun Q.Shi, “Data Hiding in Encrypted H.264/AVC Video Streams by Codeword Substitution”, in IEEE Trans., Inf. Security vol. 9, April 2014 
    9. http://link.springer.com/referenceworkentry/10.1007%2 F978-1-4419-5906-5_229

    1. W. J. Lu, A. Varna, and M. Wu, “Secure video processing: Problems and challenges,” in Proc. IEEE Int. Conf. Acoust., Speech, Signal Processing, Prague, Czech Republic, May 2011, pp. 5856–5859.
    2. B. Zhao, W. D. Kou, and H. Li, “Effective watermarking scheme in the encrypted domain for buyer-seller watermarking protocol,” Inf. Sci., vol. 180, no. 23, pp. 4672–4684, 2010.
    3. P. J. Zheng and J. W. Huang, “Walsh-Hadamard transform in the homomorphic encrypted domain and its application in image watermarking,” in Proc. 14th Inf. Hiding Conf., Berkeley, CA, USA, 2012, pp. 1–15.
    4. Mehdi Fallahpour, Shervin Shirmohammadi, Mehdi Semsarzadeh, and Jiying Zhao, “Tampering detection in compressed digital video using watermarking” IEEE Trans. Instrumentation and Measurement, vol. 63, no. 5, May 2014.
    5. I. E. G. Richardson, H.264 and MPEG-4 Video Compression: Video Coding for Next Generation Multimedia. Hoboken, NJ, USA: Wiley, 2003
    6. https://en.wikipedia.org/wiki/RC4
    7. https://staff.najah.edu/sites/default/files/Evaluation_of_t he_RC4_Algorithm_for_Data_Encryption.pdf
    8. Dawen Xu, Rangding Wang, and Yun Q.Shi, “Data Hiding in Encrypted H.264/AVC Video Streams by Codeword Substitution”, in IEEE Trans., Inf. Security vol. 9, April 2014.
    9. http://link.springer.com/referenceworkentry/10.1007%2 F978-1-4419-5906-5_229

Recent Article