CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

A Novel Approach for Codeword Substitution using Encrypted H.264/AVC Video Streams for Data Hiding

by Nikita Ramdas Bodke, Jayashri Shantaram Khule, Premlata Uttam Shinde, Sandip Nathu Kapse, Kavita S. Kumavat
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 128 - Number 4
Year of Publication: 2015
Authors: Nikita Ramdas Bodke, Jayashri Shantaram Khule, Premlata Uttam Shinde, Sandip Nathu Kapse, Kavita S. Kumavat
10.5120/ijca2015906508

Nikita Ramdas Bodke, Jayashri Shantaram Khule, Premlata Uttam Shinde, Sandip Nathu Kapse, Kavita S. Kumavat . A Novel Approach for Codeword Substitution using Encrypted H.264/AVC Video Streams for Data Hiding. International Journal of Computer Applications. 128, 4 ( October 2015), 6-10. DOI=10.5120/ijca2015906508

@article{ 10.5120/ijca2015906508,
author = { Nikita Ramdas Bodke, Jayashri Shantaram Khule, Premlata Uttam Shinde, Sandip Nathu Kapse, Kavita S. Kumavat },
title = { A Novel Approach for Codeword Substitution using Encrypted H.264/AVC Video Streams for Data Hiding },
journal = { International Journal of Computer Applications },
issue_date = { October 2015 },
volume = { 128 },
number = { 4 },
month = { October },
year = { 2015 },
issn = { 0975-8887 },
pages = { 6-10 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume128/number4/22859-2015906508/ },
doi = { 10.5120/ijca2015906508 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:20:32.159915+05:30
%A Nikita Ramdas Bodke
%A Jayashri Shantaram Khule
%A Premlata Uttam Shinde
%A Sandip Nathu Kapse
%A Kavita S. Kumavat
%T A Novel Approach for Codeword Substitution using Encrypted H.264/AVC Video Streams for Data Hiding
%J International Journal of Computer Applications
%@ 0975-8887
%V 128
%N 4
%P 6-10
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Because of the privacy-preserving, data hiding is a new technique that had drawn attention. Access control and transaction tracking, data hiding techniques can be used to insert a private message and private image into a video bit stream for copyright protection. To an encrypted format, for security and privacy digital video need to be stored in the system and then processed. This will preserve the private information of data. video encryption, data insertion, and data extraction, in data hiding in encrypted of H.264/AVC video stream H.264/AVC it contain. to produce encrypted video. Using codeword substitution methods ,cloud server or data hider may insert additional data in domain, in an encryption H.264/AVC video is encrypted with encryption key using the stream cipher. The data extraction process can be done in the encrypted domain or decrypted domain. The codeword of residue coefficients are encrypted, in an stream cipher codeword of intraprediction modes, the codeword of motion vector difference. Is restricted maintain the video file size in an encryption and data insertion. To hide or secure private message, images in video bit format, for protection, data hiding technique can be used. So that edge quality information and number of bits of block can be hide, to maintain security and privacy bit streams processed in an encrypted format. Experimental result can maintain file size of video, degradation in video quality is quite small.

References
  1. W. J. Lu, A. Varna, and M. Wu, “Secure video processing:Problems andchallenges,” in Proc. IEEE Int. Conf. Acoust., Speech, Signal Processing,Prague, Czech Republic, May 2011, pp. 5856–5859.
  2. B. Zhao, W. D. Kou, and H. Li, “Effective watermarking scheme inthe encrypted domain for buyer-seller watermarking protocol,” Inf. Sci.,vol. 180, no. 23, pp. 4672–4684, 2010.
  3. P. J. Zheng and J. W. Huang, “Walsh-Hadamard transform in the homomorphicencrypted domain and its application in image watermarking,”inProc. 14th Inf. Hiding Conf., Berkeley, CA, USA, 2012, pp. 1–15.
  4. W. Puech, M. Chaumont, and O. Strauss, “A reversible datahiding method for encrypted images,” Proc. SPIE, vol. 6819,pp. 68191E-1–68191E-9, Jan. 2008.
  5. X. P. Zhang, “Reversible data hiding in encrypted image,” IEEE SignalProcess.Lett., vol. 18, no. 4, pp. 255–258, Apr. 2011.
  6. W. Hong, T. S. Chen, and H. Y. Wu, “An improved reversible datahiding in encrypted images using side match,” IEEE Signal Process.Lett., vol. 19, no. 4, pp. 199–202, Apr. 2012.
  7. X. P. Zhang, “Separable reversible data hiding in encryptedimage,” IEEE Trans. Inf. Forensics Security, vol. 7, no. 2,pp. 826–832, Apr. 2012.
  8. K. D. Ma, W. M. Zhang, X. F. Zhao, N. Yu, and F. Li, “Reversible datahiding in encrypted images by reserving room before encryption,” IEEETrans. Inf. Forensics Security, vol. 8, no. 3, pp. 553–562, Mar. 2013.
  9. A. V. Subramanyam, S. Emmanuel, and M. S. Kankanhalli, “Robustwatermarking of compressed and encrypted JPEG2000 images,” IEEETrans. Multimedia, vol. 14, no. 3, pp. 703–716, Jun. 2012.
  10. S. G. Lian, Z. X. Liu, and Z. Ren, “Commutative encryption andwatermarking in video compression,” IEEE Trans. Circuits Syst. VideoTechnol., vol. 17, no. 6, pp. 774–778, Jun. 2007.
  11. S. W. Park and S. U. Shin, “Combined scheme of encryption andwatermarking in H.264/scalable video coding (SVC),” New DirectionsIntell. Interact. Multimedia, vol. 142, no. 1, pp. 351–361, 2008.
  12. T. Wiegand, G. J. Sullivan, G. Bjontegaard, and A. Luthra, “Overviewof the H.264/AVC video coding standard,” IEEE Trans. Circuits Syst.Video Technol., vol. 13, no. 7, pp. 560–576, Jul. 2003.
  13. S. G. Lian, Z. X. Liu, Z. Ren, and H. L. Wang, “Secure advancedvideo coding based on selective encryption algorithms,” IEEE Trans.Consumer Electron., vol. 52, no. 2, pp. 621–629, May 2006.
  14. Z. Shahid, M. Chaumont, and W. Puech, “Fast protection of H.264/AVCby selective encryption of CAVLC and CABAC for I and P frames,”IEEE Trans. Circuits Syst. Video Technol., vol. 21, no. 5, pp. 565–576,May 2011.
  15. M. N. Asghar and M. Ghanbari, “An efficient security system forCABAC bin-strings of H.264/SVC,” IEEE Trans. Circuits Syst. VideoTechnol., vol. 23, no. 3, pp. 425–437, Mar. 2013.
Index Terms

Computer Science
Information Sciences

Keywords

Data hidden encrypted domain H.264/AVC codeword substituting.