An improved scheme for data hiding in encrypted H.264/AVC videos

•The embedding is done on encrypted H.264/AVC data without knowing the decryption key.•The paired code-word substitution and multiple-base notational system are exploited.•Both encryption and data embedding keep the bit-rate intact.•Data extraction can be carried out either in encrypted or decrypted...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:Journal of visual communication and image representation Ročník 36; s. 229 - 242
Hlavní autoři: Xu, Dawen, Wang, Rangding, Shi, Yun Q.
Médium: Journal Article
Jazyk:angličtina
Vydáno: Elsevier Inc 01.04.2016
Témata:
ISSN:1047-3203, 1095-9076
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract •The embedding is done on encrypted H.264/AVC data without knowing the decryption key.•The paired code-word substitution and multiple-base notational system are exploited.•Both encryption and data embedding keep the bit-rate intact.•Data extraction can be carried out either in encrypted or decrypted domain. Recently, a novel scheme to hide data into encrypted H.264/AVC videos using code-word substitution has been proposed by Xu et al. However, the statistical analysis of CAVLC code-words demonstrate that Xu et al.’s work does not fully exploit redundancy existing in CAVLC code-word for data embedding. In this paper, an improved version of Xu et al.’s data hiding method in encrypted H.264/AVC videos is proposed. Specifically, when suffixLength is equal to 1, data embedding is performed by paired code-word substitution. When suffixLength is greater than 2, not the single code-word substitution but the multiple-based notational system is adopted for data embedding. Experimental results have demonstrated that the improved method is indeed capable of providing a larger embedding capacity in comparison with Xu et al.’s method. Moreover, both encryption and data embedding can be accomplished without affecting the coding efficiency of H.264/AVC by keeping exactly the same bitrate.
AbstractList •The embedding is done on encrypted H.264/AVC data without knowing the decryption key.•The paired code-word substitution and multiple-base notational system are exploited.•Both encryption and data embedding keep the bit-rate intact.•Data extraction can be carried out either in encrypted or decrypted domain. Recently, a novel scheme to hide data into encrypted H.264/AVC videos using code-word substitution has been proposed by Xu et al. However, the statistical analysis of CAVLC code-words demonstrate that Xu et al.’s work does not fully exploit redundancy existing in CAVLC code-word for data embedding. In this paper, an improved version of Xu et al.’s data hiding method in encrypted H.264/AVC videos is proposed. Specifically, when suffixLength is equal to 1, data embedding is performed by paired code-word substitution. When suffixLength is greater than 2, not the single code-word substitution but the multiple-based notational system is adopted for data embedding. Experimental results have demonstrated that the improved method is indeed capable of providing a larger embedding capacity in comparison with Xu et al.’s method. Moreover, both encryption and data embedding can be accomplished without affecting the coding efficiency of H.264/AVC by keeping exactly the same bitrate.
Recently, a novel scheme to hide data into encrypted H.264/AVC videos using code-word substitution has been proposed by Xu et al. However, the statistical analysis of CAVLC code-words demonstrate that Xu et al.'s work does not fully exploit redundancy existing in CAVLC code-word for data embedding. In this paper, an improved version of Xu et al.'s data hiding method in encrypted H.264/AVC videos is proposed. Specifically, when suffixLength is equal to 1, data embedding is performed by paired code-word substitution. When suffixLength is greater than 2, not the single code-word substitution but the multiple-based notational system is adopted for data embedding. Experimental results have demonstrated that the improved method is indeed capable of providing a larger embedding capacity in comparison with Xu et al.'s method. Moreover, both encryption and data embedding can be accomplished without affecting the coding efficiency of H.264/AVC by keeping exactly the same bitrate.
Author Shi, Yun Q.
Wang, Rangding
Xu, Dawen
Author_xml – sequence: 1
  givenname: Dawen
  surname: Xu
  fullname: Xu, Dawen
  email: dawenxu@126.com
  organization: School of Electronics and Information Engineering, Ningbo University of Technology, Ningbo 315016, China
– sequence: 2
  givenname: Rangding
  surname: Wang
  fullname: Wang, Rangding
  organization: CKC Software Lab, Ningbo University, Ningbo 315211, China
– sequence: 3
  givenname: Yun Q.
  surname: Shi
  fullname: Shi, Yun Q.
  organization: Department of Electrical and Computer Engineering, New Jersey Institute of Technology, Newark, NJ 07102-1982, USA
BookMark eNqFkLFOwzAQhi1UJFrgCVgysiQ9x6kbD0hUFVCkSizAajn2mTpKk2Knkfr2uJSJAab7T_q_0-mbkFHbtUjIDYWMAuXTOqsH7XyWxyWDPAPIz8iYgpilAuZ8dMzFPGU5sAsyCaEGACZYMSb3izZx253vBjRJ0BvcYmI7nxjVq2TjjGs_Etcm2Gp_2PWxs8pyXkwX78tkcAa7cEXOrWoCXv_MS_L2-PC6XKXrl6fn5WKd6gJ4nwolZkxoK4wpGFMWtdVsZpUWRSUqK1heWc4s5Rw1QyjzeclQKzTcAlWmYpfk9nQ3_vq5x9DLrQsam0a12O2DpCWUNFKCxyo7VbXvQvBo5c67rfIHSUEefclafvuSR18Schl9RUr8orTrVe-6tvfKNf-wdycWo4HBoZdBu-gMjfOoe2k69yf_BTvbiVM
CitedBy_id crossref_primary_10_1109_ACCESS_2020_2983330
crossref_primary_10_1016_j_jvcir_2017_02_008
crossref_primary_10_1109_ACCESS_2020_3013033
crossref_primary_10_1007_s11042_022_12676_8
crossref_primary_10_1155_2019_7480147
crossref_primary_10_1155_2022_8303504
crossref_primary_10_1016_j_jvcir_2020_102986
crossref_primary_10_1007_s10462_021_09968_0
crossref_primary_10_1007_s11042_023_14517_8
crossref_primary_10_4018_IJDCF_2018040101
crossref_primary_10_1007_s11042_020_09929_9
crossref_primary_10_1109_TCSVT_2019_2947545
crossref_primary_10_1109_ACCESS_2019_2906500
crossref_primary_10_3390_electronics11162552
crossref_primary_10_4218_etrij_2018_0484
crossref_primary_10_1007_s11042_023_14844_w
crossref_primary_10_1007_s11042_018_6538_8
crossref_primary_10_1109_ACCESS_2019_2916484
crossref_primary_10_1007_s11227_021_04183_8
crossref_primary_10_1016_j_jvcir_2019_102744
crossref_primary_10_1016_j_image_2020_115994
crossref_primary_10_1155_2018_1734961
crossref_primary_10_3390_app10186410
crossref_primary_10_1145_3672568
crossref_primary_10_1016_j_image_2016_08_003
crossref_primary_10_1007_s11554_017_0727_y
crossref_primary_10_1109_ACCESS_2024_3386798
crossref_primary_10_1016_j_image_2021_116274
crossref_primary_10_1016_j_ins_2016_08_059
crossref_primary_10_1109_ACCESS_2018_2869148
crossref_primary_10_1109_ACCESS_2022_3152548
crossref_primary_10_1007_s10044_024_01220_z
crossref_primary_10_1155_2018_5183451
Cites_doi 10.1109/TIP.2014.2302681
10.1109/TCSVT.2013.2276710
10.1109/TIFS.2011.2176120
10.1109/TIFS.2013.2286456
10.1109/TMM.2014.2316154
10.1109/TCSVT.2011.2162290
10.1117/1.JEI.23.5.053022
10.1109/TIFS.2014.2302899
10.1109/TCSVT.2012.2221191
10.1109/TCE.2006.1649688
10.1109/LSP.2004.838214
10.1016/j.jvcir.2014.12.007
10.1109/TMM.2014.2310595
10.1007/s11554-010-0175-4
10.1109/TIFS.2013.2248725
10.1109/TMM.2011.2181342
10.1016/j.ins.2010.08.003
10.1117/1.JEI.24.3.033028
ContentType Journal Article
Copyright 2016 Elsevier Inc.
Copyright_xml – notice: 2016 Elsevier Inc.
DBID AAYXX
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
DOI 10.1016/j.jvcir.2016.02.002
DatabaseName CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList
Technology Research Database
DeliveryMethod fulltext_linktorsrc
Discipline Journalism & Communications
Engineering
EISSN 1095-9076
EndPage 242
ExternalDocumentID 10_1016_j_jvcir_2016_02_002
S1047320316000286
GroupedDBID --K
--M
.DC
.~1
0R~
1B1
1~.
1~5
29L
4.4
457
4G.
53G
5GY
5VS
7-5
71M
8P~
9JN
AACTN
AAEDT
AAEDW
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAQXK
AAXUO
AAYFN
ABBOA
ABFNM
ABJNI
ABMAC
ABXDB
ABYKQ
ACDAQ
ACGFS
ACNNM
ACRLP
ACZNC
ADBBV
ADEZE
ADFGL
ADJOM
ADMHC
ADMUD
ADTZH
AEBSH
AECPX
AEKER
AENEX
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHHHB
AHJVU
AHZHX
AIALX
AIEXJ
AIKHN
AITUG
AJBFU
AJOXV
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOUOD
ASPBG
AVWKF
AXJTR
AZFZN
BJAXD
BKOJK
BLXMC
CAG
COF
CS3
DM4
DU5
EBS
EFBJH
EFLBG
EJD
EO8
EO9
EP2
EP3
F5P
FDB
FEDTE
FGOYB
FIRID
FNPLU
FYGXN
G-2
G-Q
GBLVA
GBOLZ
HLZ
HVGLF
HZ~
IHE
J1W
JJJVA
KOM
LG5
LX9
M41
MO0
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
P2P
PC.
Q38
R2-
RIG
ROL
RPZ
SBC
SDF
SDG
SDP
SES
SEW
SPC
SPCBC
SST
SSV
SSZ
T5K
WH7
WUQ
XPP
YQT
ZMT
ZU3
~G-
9DU
AATTM
AAXKI
AAYWO
AAYXX
ABWVN
ACLOT
ACRPL
ACVFH
ADCNI
ADNMO
AEIPS
AEUPX
AFJKZ
AFPUW
AGQPQ
AIGII
AIIUN
AKBMS
AKRWK
AKYEP
ANKPU
APXCP
CITATION
EFKBS
~HD
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c406t-9a9539cf9dd433afecfc35fac94b9bf932bf63f166ec3e082783ecaed6f01adb3
ISICitedReferencesCount 36
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000371280200019&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1047-3203
IngestDate Sun Sep 28 06:15:58 EDT 2025
Sat Nov 29 04:56:34 EST 2025
Tue Nov 18 21:28:25 EST 2025
Fri Feb 23 02:24:19 EST 2024
IsPeerReviewed true
IsScholarly true
Keywords Code-word substitution
Encrypted domain
Code-word pair
Data hiding
Context-adaptive variable length coding (CAVLC)
Data embedding capacity
H.264/AVC
Data extraction
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c406t-9a9539cf9dd433afecfc35fac94b9bf932bf63f166ec3e082783ecaed6f01adb3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 23
PQID 1808127896
PQPubID 23500
PageCount 14
ParticipantIDs proquest_miscellaneous_1808127896
crossref_primary_10_1016_j_jvcir_2016_02_002
crossref_citationtrail_10_1016_j_jvcir_2016_02_002
elsevier_sciencedirect_doi_10_1016_j_jvcir_2016_02_002
PublicationCentury 2000
PublicationDate 2016-04-01
PublicationDateYYYYMMDD 2016-04-01
PublicationDate_xml – month: 04
  year: 2016
  text: 2016-04-01
  day: 01
PublicationDecade 2010
PublicationTitle Journal of visual communication and image representation
PublicationYear 2016
Publisher Elsevier Inc
Publisher_xml – name: Elsevier Inc
References Stütz, Autrusseau, Uhl (b0075) 2014; 16
Zhao, Kou, Li (b0010) 2010; 180
Rad, Wong, Guo (b0025) 2014; 23
Qian, Zhang, Wang (b0040) 2014; 16
Liao, Shu (b0045) 2015; 28
Zhang, Wang (b0105) 2005; 12
Xu, Wang, Wang (b0055) 2012; 7
Tew, Wong (b0050) 2014; 24
Zhou, Varadharajan, Hitchens (b0005) 2013; 8
ITU-T Recommendation H.264, Advanced Video Coding for Generic Audiovisual Services. March 2005.
.
Richardson (b0090) 2003
Lian, Liu, Ren, Wang (b0065) 2006; 52
H.264/AVC Reference Software JM 12.2.
Zhang (b0030) 2012; 7
Ma, Zhang, Zhao (b0035) 2013; 8
P.J. Zheng, J.W. Huang, Walsh–Hadamard transform in the homomorphic encrypted domain and its application in image watermarking, in: 14th Information Hiding Conference, Berkeley, California, May 2012, pp. 1–15.
Xu, Wang (b0070) 2014; 23
Sullivan, Ohm, Han, Wiegand (b0115) 2012; 22
Subramanyam, Emmanuel, Kankanhalli (b0020) 2012; 14
Li, Liu, Huang, Shi (b0060) 2012; 8
Xu, Wang (b0085) 2015; 24
Stütz, Uhl (b0100) 2012; 22
Xu, Wang, Shi (b0080) 2014; 9
10.1016/j.jvcir.2016.02.002_b0015
Qian (10.1016/j.jvcir.2016.02.002_b0040) 2014; 16
Xu (10.1016/j.jvcir.2016.02.002_b0055) 2012; 7
Zhao (10.1016/j.jvcir.2016.02.002_b0010) 2010; 180
Stütz (10.1016/j.jvcir.2016.02.002_b0075) 2014; 16
Subramanyam (10.1016/j.jvcir.2016.02.002_b0020) 2012; 14
Rad (10.1016/j.jvcir.2016.02.002_b0025) 2014; 23
10.1016/j.jvcir.2016.02.002_b0095
Xu (10.1016/j.jvcir.2016.02.002_b0085) 2015; 24
10.1016/j.jvcir.2016.02.002_b0110
Tew (10.1016/j.jvcir.2016.02.002_b0050) 2014; 24
Li (10.1016/j.jvcir.2016.02.002_b0060) 2012; 8
Ma (10.1016/j.jvcir.2016.02.002_b0035) 2013; 8
Zhou (10.1016/j.jvcir.2016.02.002_b0005) 2013; 8
Zhang (10.1016/j.jvcir.2016.02.002_b0030) 2012; 7
Stütz (10.1016/j.jvcir.2016.02.002_b0100) 2012; 22
Xu (10.1016/j.jvcir.2016.02.002_b0070) 2014; 23
Xu (10.1016/j.jvcir.2016.02.002_b0080) 2014; 9
Zhang (10.1016/j.jvcir.2016.02.002_b0105) 2005; 12
Sullivan (10.1016/j.jvcir.2016.02.002_b0115) 2012; 22
Lian (10.1016/j.jvcir.2016.02.002_b0065) 2006; 52
Liao (10.1016/j.jvcir.2016.02.002_b0045) 2015; 28
Richardson (10.1016/j.jvcir.2016.02.002_b0090) 2003
References_xml – volume: 12
  start-page: 67
  year: 2005
  end-page: 70
  ident: b0105
  article-title: Steganography using multiple-base notational system and human vision sensitivity
  publication-title: IEEE Signal Process. Lett.
– reference: H.264/AVC Reference Software JM 12.2. <
– volume: 8
  start-page: 553
  year: 2013
  end-page: 562
  ident: b0035
  article-title: Reversible data hiding in encrypted images by reserving room before encryption
  publication-title: IEEE Trans. Inform. Forens. Secur.
– volume: 8
  start-page: 1
  year: 2012
  end-page: 22
  ident: b0060
  article-title: Reference index-based H.264 video watermarking scheme
  publication-title: ACM Trans. Multimedia Comput. Commun. Appl.
– volume: 14
  start-page: 703
  year: 2012
  end-page: 716
  ident: b0020
  article-title: Robust watermarking of compressed and encrypted JPEG2000 images
  publication-title: IEEE Trans. Multimedia
– reference: >.
– volume: 180
  start-page: 4672
  year: 2010
  end-page: 4684
  ident: b0010
  article-title: Effective watermarking scheme in the encrypted domain for buyer–seller watermarking protocol
  publication-title: Inform. Sci.
– volume: 7
  start-page: 205
  year: 2012
  end-page: 214
  ident: b0055
  article-title: Prediction mode modulated data-hiding algorithm for H.264/AVC
  publication-title: J. Real-Time Image Process.
– volume: 23
  start-page: 053022:1
  year: 2014
  end-page: 053022:14
  ident: b0070
  article-title: Efficient reversible data hiding in encrypted H.264/AVC Videos
  publication-title: J. Electron. Imag.
– volume: 24
  start-page: 033028:1
  year: 2015
  end-page: 033028:13
  ident: b0085
  article-title: Context adaptive binary arithmetic coding-based data hiding in partially encrypted H.264/AVC videos
  publication-title: J. Electron. Imag.
– volume: 52
  start-page: 621
  year: 2006
  end-page: 629
  ident: b0065
  article-title: Secure advanced video coding based on selective encryption algorithms
  publication-title: IEEE Trans. Consum. Electron.
– volume: 23
  start-page: 1463
  year: 2014
  end-page: 1475
  ident: b0025
  article-title: A unified data embedding and scrambling method
  publication-title: IEEE Trans. Image Process.
– volume: 28
  start-page: 21
  year: 2015
  end-page: 27
  ident: b0045
  article-title: Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels
  publication-title: J. Vis. Commun. Image Represent.
– volume: 24
  start-page: 305
  year: 2014
  end-page: 319
  ident: b0050
  article-title: An overview of information hiding in H.264/AVC compressed video
  publication-title: IEEE Trans. Circ. Syst. Video Technol.
– reference: ITU-T Recommendation H.264, Advanced Video Coding for Generic Audiovisual Services. March 2005.
– volume: 8
  start-page: 1947
  year: 2013
  end-page: 1960
  ident: b0005
  article-title: Achieving secure role-based access control on encrypted data in cloud storage
  publication-title: IEEE Trans. Inform. Forens. Secur.
– volume: 7
  start-page: 826
  year: 2012
  end-page: 832
  ident: b0030
  article-title: Separable reversible data hiding in encrypted image
  publication-title: IEEE Trans. Inform. Forens. Secur.
– year: 2003
  ident: b0090
  article-title: H.264 and MPEG-4 Video Compression: Video Coding for Next Generation Multimedia
– volume: 16
  start-page: 1486
  year: 2014
  end-page: 1491
  ident: b0040
  article-title: Reversible data hiding in encrypted JPEG bitstream
  publication-title: IEEE Trans. Multimedia
– volume: 9
  start-page: 596
  year: 2014
  end-page: 606
  ident: b0080
  article-title: Data hiding in encrypted H.264/AVC video streams by codeword substitution
  publication-title: IEEE Trans. Inform. Forens. Secur.
– volume: 16
  start-page: 1337
  year: 2014
  end-page: 1349
  ident: b0075
  article-title: Non-blind structure-preserving substitution watermarking of H.264/CAVLC inter-frames
  publication-title: IEEE Trans. Multimedia
– reference: P.J. Zheng, J.W. Huang, Walsh–Hadamard transform in the homomorphic encrypted domain and its application in image watermarking, in: 14th Information Hiding Conference, Berkeley, California, May 2012, pp. 1–15.
– volume: 22
  start-page: 325
  year: 2012
  end-page: 339
  ident: b0100
  article-title: A survey of H.264 AVC/SVC encryption
  publication-title: IEEE Trans. Circ. Syst. Video Technol.
– volume: 22
  start-page: 1649
  year: 2012
  end-page: 1668
  ident: b0115
  article-title: Overview of the High Efficiency Video Coding (HEVC) standard
  publication-title: IEEE Trans. Circ. Syst. Video Technol.
– volume: 23
  start-page: 1463
  issue: 4
  year: 2014
  ident: 10.1016/j.jvcir.2016.02.002_b0025
  article-title: A unified data embedding and scrambling method
  publication-title: IEEE Trans. Image Process.
  doi: 10.1109/TIP.2014.2302681
– volume: 24
  start-page: 305
  issue: 2
  year: 2014
  ident: 10.1016/j.jvcir.2016.02.002_b0050
  article-title: An overview of information hiding in H.264/AVC compressed video
  publication-title: IEEE Trans. Circ. Syst. Video Technol.
  doi: 10.1109/TCSVT.2013.2276710
– volume: 7
  start-page: 826
  issue: 2
  year: 2012
  ident: 10.1016/j.jvcir.2016.02.002_b0030
  article-title: Separable reversible data hiding in encrypted image
  publication-title: IEEE Trans. Inform. Forens. Secur.
  doi: 10.1109/TIFS.2011.2176120
– volume: 8
  start-page: 1
  issue: S2
  year: 2012
  ident: 10.1016/j.jvcir.2016.02.002_b0060
  article-title: Reference index-based H.264 video watermarking scheme
  publication-title: ACM Trans. Multimedia Comput. Commun. Appl.
– volume: 8
  start-page: 1947
  issue: 12
  year: 2013
  ident: 10.1016/j.jvcir.2016.02.002_b0005
  article-title: Achieving secure role-based access control on encrypted data in cloud storage
  publication-title: IEEE Trans. Inform. Forens. Secur.
  doi: 10.1109/TIFS.2013.2286456
– volume: 16
  start-page: 1486
  issue: 5
  year: 2014
  ident: 10.1016/j.jvcir.2016.02.002_b0040
  article-title: Reversible data hiding in encrypted JPEG bitstream
  publication-title: IEEE Trans. Multimedia
  doi: 10.1109/TMM.2014.2316154
– volume: 22
  start-page: 325
  issue: 3
  year: 2012
  ident: 10.1016/j.jvcir.2016.02.002_b0100
  article-title: A survey of H.264 AVC/SVC encryption
  publication-title: IEEE Trans. Circ. Syst. Video Technol.
  doi: 10.1109/TCSVT.2011.2162290
– ident: 10.1016/j.jvcir.2016.02.002_b0110
– volume: 23
  start-page: 053022:1
  issue: 5
  year: 2014
  ident: 10.1016/j.jvcir.2016.02.002_b0070
  article-title: Efficient reversible data hiding in encrypted H.264/AVC Videos
  publication-title: J. Electron. Imag.
  doi: 10.1117/1.JEI.23.5.053022
– volume: 9
  start-page: 596
  issue: 4
  year: 2014
  ident: 10.1016/j.jvcir.2016.02.002_b0080
  article-title: Data hiding in encrypted H.264/AVC video streams by codeword substitution
  publication-title: IEEE Trans. Inform. Forens. Secur.
  doi: 10.1109/TIFS.2014.2302899
– year: 2003
  ident: 10.1016/j.jvcir.2016.02.002_b0090
– volume: 22
  start-page: 1649
  issue: 12
  year: 2012
  ident: 10.1016/j.jvcir.2016.02.002_b0115
  article-title: Overview of the High Efficiency Video Coding (HEVC) standard
  publication-title: IEEE Trans. Circ. Syst. Video Technol.
  doi: 10.1109/TCSVT.2012.2221191
– volume: 52
  start-page: 621
  issue: 2
  year: 2006
  ident: 10.1016/j.jvcir.2016.02.002_b0065
  article-title: Secure advanced video coding based on selective encryption algorithms
  publication-title: IEEE Trans. Consum. Electron.
  doi: 10.1109/TCE.2006.1649688
– volume: 12
  start-page: 67
  issue: 1
  year: 2005
  ident: 10.1016/j.jvcir.2016.02.002_b0105
  article-title: Steganography using multiple-base notational system and human vision sensitivity
  publication-title: IEEE Signal Process. Lett.
  doi: 10.1109/LSP.2004.838214
– volume: 28
  start-page: 21
  year: 2015
  ident: 10.1016/j.jvcir.2016.02.002_b0045
  article-title: Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels
  publication-title: J. Vis. Commun. Image Represent.
  doi: 10.1016/j.jvcir.2014.12.007
– ident: 10.1016/j.jvcir.2016.02.002_b0095
– volume: 16
  start-page: 1337
  issue: 5
  year: 2014
  ident: 10.1016/j.jvcir.2016.02.002_b0075
  article-title: Non-blind structure-preserving substitution watermarking of H.264/CAVLC inter-frames
  publication-title: IEEE Trans. Multimedia
  doi: 10.1109/TMM.2014.2310595
– volume: 7
  start-page: 205
  issue: 4
  year: 2012
  ident: 10.1016/j.jvcir.2016.02.002_b0055
  article-title: Prediction mode modulated data-hiding algorithm for H.264/AVC
  publication-title: J. Real-Time Image Process.
  doi: 10.1007/s11554-010-0175-4
– volume: 8
  start-page: 553
  issue: 3
  year: 2013
  ident: 10.1016/j.jvcir.2016.02.002_b0035
  article-title: Reversible data hiding in encrypted images by reserving room before encryption
  publication-title: IEEE Trans. Inform. Forens. Secur.
  doi: 10.1109/TIFS.2013.2248725
– volume: 14
  start-page: 703
  issue: 3
  year: 2012
  ident: 10.1016/j.jvcir.2016.02.002_b0020
  article-title: Robust watermarking of compressed and encrypted JPEG2000 images
  publication-title: IEEE Trans. Multimedia
  doi: 10.1109/TMM.2011.2181342
– volume: 180
  start-page: 4672
  year: 2010
  ident: 10.1016/j.jvcir.2016.02.002_b0010
  article-title: Effective watermarking scheme in the encrypted domain for buyer–seller watermarking protocol
  publication-title: Inform. Sci.
  doi: 10.1016/j.ins.2010.08.003
– ident: 10.1016/j.jvcir.2016.02.002_b0015
– volume: 24
  start-page: 033028:1
  issue: 3
  year: 2015
  ident: 10.1016/j.jvcir.2016.02.002_b0085
  article-title: Context adaptive binary arithmetic coding-based data hiding in partially encrypted H.264/AVC videos
  publication-title: J. Electron. Imag.
  doi: 10.1117/1.JEI.24.3.033028
SSID ssj0003934
Score 2.2796893
Snippet •The embedding is done on encrypted H.264/AVC data without knowing the decryption key.•The paired code-word substitution and multiple-base notational system...
Recently, a novel scheme to hide data into encrypted H.264/AVC videos using code-word substitution has been proposed by Xu et al. However, the statistical...
SourceID proquest
crossref
elsevier
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 229
SubjectTerms Code-word pair
Code-word substitution
Coding
Context-adaptive variable length coding (CAVLC)
Data embedding capacity
Data extraction
Data hiding
Embedded systems
Encrypted domain
Encryption
H.264/AVC
Redundancy
Representations
Statistical analysis
Video data
Visual
Title An improved scheme for data hiding in encrypted H.264/AVC videos
URI https://dx.doi.org/10.1016/j.jvcir.2016.02.002
https://www.proquest.com/docview/1808127896
Volume 36
WOSCitedRecordID wos000371280200019&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVESC
  databaseName: Elsevier SD Freedom Collection Journals 2021
  customDbUrl:
  eissn: 1095-9076
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0003934
  issn: 1047-3203
  databaseCode: AIEXJ
  dateStart: 19950301
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Bb9MwGLVQxwEOEwwQYwMZCXEpKU2cOPGNahoaCE2ABpST5Ti2loq6VdOW8e_5bCdptmkVO3BJqyi23L5Xf6_29z0j9ConLCx0zAJdpDSIaZEFWRKrYJjHTBNBC-oLhT-lp6fZeMw-1zumlTtOIDUmu7hg8_8KNdwDsG3p7C3gbjuFG_AeQIcrwA7XfwJ-ZGzp42K2BikJf13V1Nt621TQ_nnZ1LDAiBd_5lZungxArVhbhe9HfVuUN6tuEKzrslo5N5FOSYnfe5jaxB9nj9mUMrWUG6985vzvTcnZj3qJ-iu8tpHTuUS6zIKfK9P_MuiuRoS0k8TiJ1Dr_ECiIenOsOTSFFmvcPhoG3lvrWsTuV9TmAwma1la29aQemvVaBO3mr36K-GsTTJs8tcm3HXCbSd8GHHnPboTpQnLemhn9OF4_LGN3YT5PITmUzQ-VS4j8NpYbtIyV6K6kypnD9BuDRkeeW48RHeU2UP3O86Te-igfqispvg1vlQlVD1C70YGNxzCnkMYOIQth7DnEC4NbjmEHYfeAoOwZ9Bj9O398dnRSVAftRFIUHTLgAmWECY1K4qYEKGV1JIkWkgW5yzXIPJzTYkOKVWSKJCNaUaUFKqgehiKIidPUM_MjHqKsGZRpPI0ESDUrTOSSHUiCIHGoYoZTfdR1HxpXNY-9PY4lF98C2D76E3baO5tWLY_Ths0eK0kvULkwK_tDV822HGYZ-3mmTBqtqp4aI-osWXj9NntxnKA7m1-KIeot1ys1HN0V66XZbV4URPwL29qoGw
linkProvider Elsevier
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=An+improved+scheme+for+data+hiding+in+encrypted+H.264%2FAVC+videos&rft.jtitle=Journal+of+visual+communication+and+image+representation&rft.au=Xu%2C+Dawen&rft.au=Wang%2C+Rangding&rft.au=Shi%2C+Yun+Q.&rft.date=2016-04-01&rft.issn=1047-3203&rft.volume=36&rft.spage=229&rft.epage=242&rft_id=info:doi/10.1016%2Fj.jvcir.2016.02.002&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_jvcir_2016_02_002
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1047-3203&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1047-3203&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1047-3203&client=summon