An improved scheme for data hiding in encrypted H.264/AVC videos
•The embedding is done on encrypted H.264/AVC data without knowing the decryption key.•The paired code-word substitution and multiple-base notational system are exploited.•Both encryption and data embedding keep the bit-rate intact.•Data extraction can be carried out either in encrypted or decrypted...
Uloženo v:
| Vydáno v: | Journal of visual communication and image representation Ročník 36; s. 229 - 242 |
|---|---|
| Hlavní autoři: | , , |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
Elsevier Inc
01.04.2016
|
| Témata: | |
| ISSN: | 1047-3203, 1095-9076 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | •The embedding is done on encrypted H.264/AVC data without knowing the decryption key.•The paired code-word substitution and multiple-base notational system are exploited.•Both encryption and data embedding keep the bit-rate intact.•Data extraction can be carried out either in encrypted or decrypted domain.
Recently, a novel scheme to hide data into encrypted H.264/AVC videos using code-word substitution has been proposed by Xu et al. However, the statistical analysis of CAVLC code-words demonstrate that Xu et al.’s work does not fully exploit redundancy existing in CAVLC code-word for data embedding. In this paper, an improved version of Xu et al.’s data hiding method in encrypted H.264/AVC videos is proposed. Specifically, when suffixLength is equal to 1, data embedding is performed by paired code-word substitution. When suffixLength is greater than 2, not the single code-word substitution but the multiple-based notational system is adopted for data embedding. Experimental results have demonstrated that the improved method is indeed capable of providing a larger embedding capacity in comparison with Xu et al.’s method. Moreover, both encryption and data embedding can be accomplished without affecting the coding efficiency of H.264/AVC by keeping exactly the same bitrate. |
|---|---|
| AbstractList | Recently, a novel scheme to hide data into encrypted H.264/AVC videos using code-word substitution has been proposed by Xu et al. However, the statistical analysis of CAVLC code-words demonstrate that Xu et al.'s work does not fully exploit redundancy existing in CAVLC code-word for data embedding. In this paper, an improved version of Xu et al.'s data hiding method in encrypted H.264/AVC videos is proposed. Specifically, when suffixLength is equal to 1, data embedding is performed by paired code-word substitution. When suffixLength is greater than 2, not the single code-word substitution but the multiple-based notational system is adopted for data embedding. Experimental results have demonstrated that the improved method is indeed capable of providing a larger embedding capacity in comparison with Xu et al.'s method. Moreover, both encryption and data embedding can be accomplished without affecting the coding efficiency of H.264/AVC by keeping exactly the same bitrate. •The embedding is done on encrypted H.264/AVC data without knowing the decryption key.•The paired code-word substitution and multiple-base notational system are exploited.•Both encryption and data embedding keep the bit-rate intact.•Data extraction can be carried out either in encrypted or decrypted domain. Recently, a novel scheme to hide data into encrypted H.264/AVC videos using code-word substitution has been proposed by Xu et al. However, the statistical analysis of CAVLC code-words demonstrate that Xu et al.’s work does not fully exploit redundancy existing in CAVLC code-word for data embedding. In this paper, an improved version of Xu et al.’s data hiding method in encrypted H.264/AVC videos is proposed. Specifically, when suffixLength is equal to 1, data embedding is performed by paired code-word substitution. When suffixLength is greater than 2, not the single code-word substitution but the multiple-based notational system is adopted for data embedding. Experimental results have demonstrated that the improved method is indeed capable of providing a larger embedding capacity in comparison with Xu et al.’s method. Moreover, both encryption and data embedding can be accomplished without affecting the coding efficiency of H.264/AVC by keeping exactly the same bitrate. |
| Author | Shi, Yun Q. Wang, Rangding Xu, Dawen |
| Author_xml | – sequence: 1 givenname: Dawen surname: Xu fullname: Xu, Dawen email: dawenxu@126.com organization: School of Electronics and Information Engineering, Ningbo University of Technology, Ningbo 315016, China – sequence: 2 givenname: Rangding surname: Wang fullname: Wang, Rangding organization: CKC Software Lab, Ningbo University, Ningbo 315211, China – sequence: 3 givenname: Yun Q. surname: Shi fullname: Shi, Yun Q. organization: Department of Electrical and Computer Engineering, New Jersey Institute of Technology, Newark, NJ 07102-1982, USA |
| BookMark | eNqFkLFOwzAQhi1UJFrgCVgysiQ9x6kbD0hUFVCkSizAajn2mTpKk2Knkfr2uJSJAab7T_q_0-mbkFHbtUjIDYWMAuXTOqsH7XyWxyWDPAPIz8iYgpilAuZ8dMzFPGU5sAsyCaEGACZYMSb3izZx253vBjRJ0BvcYmI7nxjVq2TjjGs_Etcm2Gp_2PWxs8pyXkwX78tkcAa7cEXOrWoCXv_MS_L2-PC6XKXrl6fn5WKd6gJ4nwolZkxoK4wpGFMWtdVsZpUWRSUqK1heWc4s5Rw1QyjzeclQKzTcAlWmYpfk9nQ3_vq5x9DLrQsam0a12O2DpCWUNFKCxyo7VbXvQvBo5c67rfIHSUEefclafvuSR18Schl9RUr8orTrVe-6tvfKNf-wdycWo4HBoZdBu-gMjfOoe2k69yf_BTvbiVM |
| CitedBy_id | crossref_primary_10_1109_ACCESS_2020_2983330 crossref_primary_10_1016_j_jvcir_2017_02_008 crossref_primary_10_1109_ACCESS_2020_3013033 crossref_primary_10_1007_s11042_022_12676_8 crossref_primary_10_1155_2019_7480147 crossref_primary_10_1155_2022_8303504 crossref_primary_10_1016_j_jvcir_2020_102986 crossref_primary_10_1007_s10462_021_09968_0 crossref_primary_10_1007_s11042_023_14517_8 crossref_primary_10_4018_IJDCF_2018040101 crossref_primary_10_1007_s11042_020_09929_9 crossref_primary_10_1109_TCSVT_2019_2947545 crossref_primary_10_1109_ACCESS_2019_2906500 crossref_primary_10_3390_electronics11162552 crossref_primary_10_4218_etrij_2018_0484 crossref_primary_10_1007_s11042_023_14844_w crossref_primary_10_1007_s11042_018_6538_8 crossref_primary_10_1109_ACCESS_2019_2916484 crossref_primary_10_1007_s11227_021_04183_8 crossref_primary_10_1016_j_jvcir_2019_102744 crossref_primary_10_1016_j_image_2020_115994 crossref_primary_10_1155_2018_1734961 crossref_primary_10_3390_app10186410 crossref_primary_10_1145_3672568 crossref_primary_10_1016_j_image_2016_08_003 crossref_primary_10_1007_s11554_017_0727_y crossref_primary_10_1109_ACCESS_2024_3386798 crossref_primary_10_1016_j_image_2021_116274 crossref_primary_10_1016_j_ins_2016_08_059 crossref_primary_10_1109_ACCESS_2018_2869148 crossref_primary_10_1109_ACCESS_2022_3152548 crossref_primary_10_1007_s10044_024_01220_z crossref_primary_10_1155_2018_5183451 |
| Cites_doi | 10.1109/TIP.2014.2302681 10.1109/TCSVT.2013.2276710 10.1109/TIFS.2011.2176120 10.1109/TIFS.2013.2286456 10.1109/TMM.2014.2316154 10.1109/TCSVT.2011.2162290 10.1117/1.JEI.23.5.053022 10.1109/TIFS.2014.2302899 10.1109/TCSVT.2012.2221191 10.1109/TCE.2006.1649688 10.1109/LSP.2004.838214 10.1016/j.jvcir.2014.12.007 10.1109/TMM.2014.2310595 10.1007/s11554-010-0175-4 10.1109/TIFS.2013.2248725 10.1109/TMM.2011.2181342 10.1016/j.ins.2010.08.003 10.1117/1.JEI.24.3.033028 |
| ContentType | Journal Article |
| Copyright | 2016 Elsevier Inc. |
| Copyright_xml | – notice: 2016 Elsevier Inc. |
| DBID | AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D |
| DOI | 10.1016/j.jvcir.2016.02.002 |
| DatabaseName | CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
| DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | Technology Research Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Journalism & Communications Engineering |
| EISSN | 1095-9076 |
| EndPage | 242 |
| ExternalDocumentID | 10_1016_j_jvcir_2016_02_002 S1047320316000286 |
| GroupedDBID | --K --M .DC .~1 0R~ 1B1 1~. 1~5 29L 4.4 457 4G. 53G 5GY 5VS 7-5 71M 8P~ 9JN AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AAXUO AAYFN ABBOA ABFNM ABJNI ABMAC ABXDB ABYKQ ACDAQ ACGFS ACNNM ACRLP ACZNC ADBBV ADEZE ADFGL ADJOM ADMHC ADMUD ADTZH AEBSH AECPX AEKER AENEX AFKWA AFTJW AGHFR AGUBO AGYEJ AHHHB AHJVU AHZHX AIALX AIEXJ AIKHN AITUG AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD ASPBG AVWKF AXJTR AZFZN BJAXD BKOJK BLXMC CAG COF CS3 DM4 DU5 EBS EFBJH EFLBG EJD EO8 EO9 EP2 EP3 F5P FDB FEDTE FGOYB FIRID FNPLU FYGXN G-2 G-Q GBLVA GBOLZ HLZ HVGLF HZ~ IHE J1W JJJVA KOM LG5 LX9 M41 MO0 N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. Q38 R2- RIG ROL RPZ SBC SDF SDG SDP SES SEW SPC SPCBC SST SSV SSZ T5K WH7 WUQ XPP YQT ZMT ZU3 ~G- 9DU AATTM AAXKI AAYWO AAYXX ABWVN ACLOT ACRPL ACVFH ADCNI ADNMO AEIPS AEUPX AFJKZ AFPUW AGQPQ AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP CITATION EFKBS ~HD 7SC 7SP 8FD JQ2 L7M L~C L~D |
| ID | FETCH-LOGICAL-c406t-9a9539cf9dd433afecfc35fac94b9bf932bf63f166ec3e082783ecaed6f01adb3 |
| ISICitedReferencesCount | 36 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000371280200019&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1047-3203 |
| IngestDate | Sun Sep 28 06:15:58 EDT 2025 Sat Nov 29 04:56:34 EST 2025 Tue Nov 18 21:28:25 EST 2025 Fri Feb 23 02:24:19 EST 2024 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Keywords | Code-word substitution Encrypted domain Code-word pair Data hiding Context-adaptive variable length coding (CAVLC) Data embedding capacity H.264/AVC Data extraction |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c406t-9a9539cf9dd433afecfc35fac94b9bf932bf63f166ec3e082783ecaed6f01adb3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 23 |
| PQID | 1808127896 |
| PQPubID | 23500 |
| PageCount | 14 |
| ParticipantIDs | proquest_miscellaneous_1808127896 crossref_primary_10_1016_j_jvcir_2016_02_002 crossref_citationtrail_10_1016_j_jvcir_2016_02_002 elsevier_sciencedirect_doi_10_1016_j_jvcir_2016_02_002 |
| PublicationCentury | 2000 |
| PublicationDate | 2016-04-01 |
| PublicationDateYYYYMMDD | 2016-04-01 |
| PublicationDate_xml | – month: 04 year: 2016 text: 2016-04-01 day: 01 |
| PublicationDecade | 2010 |
| PublicationTitle | Journal of visual communication and image representation |
| PublicationYear | 2016 |
| Publisher | Elsevier Inc |
| Publisher_xml | – name: Elsevier Inc |
| References | Stütz, Autrusseau, Uhl (b0075) 2014; 16 Zhao, Kou, Li (b0010) 2010; 180 Rad, Wong, Guo (b0025) 2014; 23 Qian, Zhang, Wang (b0040) 2014; 16 Liao, Shu (b0045) 2015; 28 Zhang, Wang (b0105) 2005; 12 Xu, Wang, Wang (b0055) 2012; 7 Tew, Wong (b0050) 2014; 24 Zhou, Varadharajan, Hitchens (b0005) 2013; 8 ITU-T Recommendation H.264, Advanced Video Coding for Generic Audiovisual Services. March 2005. . Richardson (b0090) 2003 Lian, Liu, Ren, Wang (b0065) 2006; 52 H.264/AVC Reference Software JM 12.2. Zhang (b0030) 2012; 7 Ma, Zhang, Zhao (b0035) 2013; 8 P.J. Zheng, J.W. Huang, Walsh–Hadamard transform in the homomorphic encrypted domain and its application in image watermarking, in: 14th Information Hiding Conference, Berkeley, California, May 2012, pp. 1–15. Xu, Wang (b0070) 2014; 23 Sullivan, Ohm, Han, Wiegand (b0115) 2012; 22 Subramanyam, Emmanuel, Kankanhalli (b0020) 2012; 14 Li, Liu, Huang, Shi (b0060) 2012; 8 Xu, Wang (b0085) 2015; 24 Stütz, Uhl (b0100) 2012; 22 Xu, Wang, Shi (b0080) 2014; 9 10.1016/j.jvcir.2016.02.002_b0015 Qian (10.1016/j.jvcir.2016.02.002_b0040) 2014; 16 Xu (10.1016/j.jvcir.2016.02.002_b0055) 2012; 7 Zhao (10.1016/j.jvcir.2016.02.002_b0010) 2010; 180 Stütz (10.1016/j.jvcir.2016.02.002_b0075) 2014; 16 Subramanyam (10.1016/j.jvcir.2016.02.002_b0020) 2012; 14 Rad (10.1016/j.jvcir.2016.02.002_b0025) 2014; 23 10.1016/j.jvcir.2016.02.002_b0095 Xu (10.1016/j.jvcir.2016.02.002_b0085) 2015; 24 10.1016/j.jvcir.2016.02.002_b0110 Tew (10.1016/j.jvcir.2016.02.002_b0050) 2014; 24 Li (10.1016/j.jvcir.2016.02.002_b0060) 2012; 8 Ma (10.1016/j.jvcir.2016.02.002_b0035) 2013; 8 Zhou (10.1016/j.jvcir.2016.02.002_b0005) 2013; 8 Zhang (10.1016/j.jvcir.2016.02.002_b0030) 2012; 7 Stütz (10.1016/j.jvcir.2016.02.002_b0100) 2012; 22 Xu (10.1016/j.jvcir.2016.02.002_b0070) 2014; 23 Xu (10.1016/j.jvcir.2016.02.002_b0080) 2014; 9 Zhang (10.1016/j.jvcir.2016.02.002_b0105) 2005; 12 Sullivan (10.1016/j.jvcir.2016.02.002_b0115) 2012; 22 Lian (10.1016/j.jvcir.2016.02.002_b0065) 2006; 52 Liao (10.1016/j.jvcir.2016.02.002_b0045) 2015; 28 Richardson (10.1016/j.jvcir.2016.02.002_b0090) 2003 |
| References_xml | – volume: 12 start-page: 67 year: 2005 end-page: 70 ident: b0105 article-title: Steganography using multiple-base notational system and human vision sensitivity publication-title: IEEE Signal Process. Lett. – reference: H.264/AVC Reference Software JM 12.2. < – volume: 8 start-page: 553 year: 2013 end-page: 562 ident: b0035 article-title: Reversible data hiding in encrypted images by reserving room before encryption publication-title: IEEE Trans. Inform. Forens. Secur. – volume: 8 start-page: 1 year: 2012 end-page: 22 ident: b0060 article-title: Reference index-based H.264 video watermarking scheme publication-title: ACM Trans. Multimedia Comput. Commun. Appl. – volume: 14 start-page: 703 year: 2012 end-page: 716 ident: b0020 article-title: Robust watermarking of compressed and encrypted JPEG2000 images publication-title: IEEE Trans. Multimedia – reference: >. – volume: 180 start-page: 4672 year: 2010 end-page: 4684 ident: b0010 article-title: Effective watermarking scheme in the encrypted domain for buyer–seller watermarking protocol publication-title: Inform. Sci. – volume: 7 start-page: 205 year: 2012 end-page: 214 ident: b0055 article-title: Prediction mode modulated data-hiding algorithm for H.264/AVC publication-title: J. Real-Time Image Process. – volume: 23 start-page: 053022:1 year: 2014 end-page: 053022:14 ident: b0070 article-title: Efficient reversible data hiding in encrypted H.264/AVC Videos publication-title: J. Electron. Imag. – volume: 24 start-page: 033028:1 year: 2015 end-page: 033028:13 ident: b0085 article-title: Context adaptive binary arithmetic coding-based data hiding in partially encrypted H.264/AVC videos publication-title: J. Electron. Imag. – volume: 52 start-page: 621 year: 2006 end-page: 629 ident: b0065 article-title: Secure advanced video coding based on selective encryption algorithms publication-title: IEEE Trans. Consum. Electron. – volume: 23 start-page: 1463 year: 2014 end-page: 1475 ident: b0025 article-title: A unified data embedding and scrambling method publication-title: IEEE Trans. Image Process. – volume: 28 start-page: 21 year: 2015 end-page: 27 ident: b0045 article-title: Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels publication-title: J. Vis. Commun. Image Represent. – volume: 24 start-page: 305 year: 2014 end-page: 319 ident: b0050 article-title: An overview of information hiding in H.264/AVC compressed video publication-title: IEEE Trans. Circ. Syst. Video Technol. – reference: ITU-T Recommendation H.264, Advanced Video Coding for Generic Audiovisual Services. March 2005. – volume: 8 start-page: 1947 year: 2013 end-page: 1960 ident: b0005 article-title: Achieving secure role-based access control on encrypted data in cloud storage publication-title: IEEE Trans. Inform. Forens. Secur. – volume: 7 start-page: 826 year: 2012 end-page: 832 ident: b0030 article-title: Separable reversible data hiding in encrypted image publication-title: IEEE Trans. Inform. Forens. Secur. – year: 2003 ident: b0090 article-title: H.264 and MPEG-4 Video Compression: Video Coding for Next Generation Multimedia – volume: 16 start-page: 1486 year: 2014 end-page: 1491 ident: b0040 article-title: Reversible data hiding in encrypted JPEG bitstream publication-title: IEEE Trans. Multimedia – volume: 9 start-page: 596 year: 2014 end-page: 606 ident: b0080 article-title: Data hiding in encrypted H.264/AVC video streams by codeword substitution publication-title: IEEE Trans. Inform. Forens. Secur. – volume: 16 start-page: 1337 year: 2014 end-page: 1349 ident: b0075 article-title: Non-blind structure-preserving substitution watermarking of H.264/CAVLC inter-frames publication-title: IEEE Trans. Multimedia – reference: P.J. Zheng, J.W. Huang, Walsh–Hadamard transform in the homomorphic encrypted domain and its application in image watermarking, in: 14th Information Hiding Conference, Berkeley, California, May 2012, pp. 1–15. – volume: 22 start-page: 325 year: 2012 end-page: 339 ident: b0100 article-title: A survey of H.264 AVC/SVC encryption publication-title: IEEE Trans. Circ. Syst. Video Technol. – volume: 22 start-page: 1649 year: 2012 end-page: 1668 ident: b0115 article-title: Overview of the High Efficiency Video Coding (HEVC) standard publication-title: IEEE Trans. Circ. Syst. Video Technol. – volume: 23 start-page: 1463 issue: 4 year: 2014 ident: 10.1016/j.jvcir.2016.02.002_b0025 article-title: A unified data embedding and scrambling method publication-title: IEEE Trans. Image Process. doi: 10.1109/TIP.2014.2302681 – volume: 24 start-page: 305 issue: 2 year: 2014 ident: 10.1016/j.jvcir.2016.02.002_b0050 article-title: An overview of information hiding in H.264/AVC compressed video publication-title: IEEE Trans. Circ. Syst. Video Technol. doi: 10.1109/TCSVT.2013.2276710 – volume: 7 start-page: 826 issue: 2 year: 2012 ident: 10.1016/j.jvcir.2016.02.002_b0030 article-title: Separable reversible data hiding in encrypted image publication-title: IEEE Trans. Inform. Forens. Secur. doi: 10.1109/TIFS.2011.2176120 – volume: 8 start-page: 1 issue: S2 year: 2012 ident: 10.1016/j.jvcir.2016.02.002_b0060 article-title: Reference index-based H.264 video watermarking scheme publication-title: ACM Trans. Multimedia Comput. Commun. Appl. – volume: 8 start-page: 1947 issue: 12 year: 2013 ident: 10.1016/j.jvcir.2016.02.002_b0005 article-title: Achieving secure role-based access control on encrypted data in cloud storage publication-title: IEEE Trans. Inform. Forens. Secur. doi: 10.1109/TIFS.2013.2286456 – volume: 16 start-page: 1486 issue: 5 year: 2014 ident: 10.1016/j.jvcir.2016.02.002_b0040 article-title: Reversible data hiding in encrypted JPEG bitstream publication-title: IEEE Trans. Multimedia doi: 10.1109/TMM.2014.2316154 – volume: 22 start-page: 325 issue: 3 year: 2012 ident: 10.1016/j.jvcir.2016.02.002_b0100 article-title: A survey of H.264 AVC/SVC encryption publication-title: IEEE Trans. Circ. Syst. Video Technol. doi: 10.1109/TCSVT.2011.2162290 – ident: 10.1016/j.jvcir.2016.02.002_b0110 – volume: 23 start-page: 053022:1 issue: 5 year: 2014 ident: 10.1016/j.jvcir.2016.02.002_b0070 article-title: Efficient reversible data hiding in encrypted H.264/AVC Videos publication-title: J. Electron. Imag. doi: 10.1117/1.JEI.23.5.053022 – volume: 9 start-page: 596 issue: 4 year: 2014 ident: 10.1016/j.jvcir.2016.02.002_b0080 article-title: Data hiding in encrypted H.264/AVC video streams by codeword substitution publication-title: IEEE Trans. Inform. Forens. Secur. doi: 10.1109/TIFS.2014.2302899 – year: 2003 ident: 10.1016/j.jvcir.2016.02.002_b0090 – volume: 22 start-page: 1649 issue: 12 year: 2012 ident: 10.1016/j.jvcir.2016.02.002_b0115 article-title: Overview of the High Efficiency Video Coding (HEVC) standard publication-title: IEEE Trans. Circ. Syst. Video Technol. doi: 10.1109/TCSVT.2012.2221191 – volume: 52 start-page: 621 issue: 2 year: 2006 ident: 10.1016/j.jvcir.2016.02.002_b0065 article-title: Secure advanced video coding based on selective encryption algorithms publication-title: IEEE Trans. Consum. Electron. doi: 10.1109/TCE.2006.1649688 – volume: 12 start-page: 67 issue: 1 year: 2005 ident: 10.1016/j.jvcir.2016.02.002_b0105 article-title: Steganography using multiple-base notational system and human vision sensitivity publication-title: IEEE Signal Process. Lett. doi: 10.1109/LSP.2004.838214 – volume: 28 start-page: 21 year: 2015 ident: 10.1016/j.jvcir.2016.02.002_b0045 article-title: Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels publication-title: J. Vis. Commun. Image Represent. doi: 10.1016/j.jvcir.2014.12.007 – ident: 10.1016/j.jvcir.2016.02.002_b0095 – volume: 16 start-page: 1337 issue: 5 year: 2014 ident: 10.1016/j.jvcir.2016.02.002_b0075 article-title: Non-blind structure-preserving substitution watermarking of H.264/CAVLC inter-frames publication-title: IEEE Trans. Multimedia doi: 10.1109/TMM.2014.2310595 – volume: 7 start-page: 205 issue: 4 year: 2012 ident: 10.1016/j.jvcir.2016.02.002_b0055 article-title: Prediction mode modulated data-hiding algorithm for H.264/AVC publication-title: J. Real-Time Image Process. doi: 10.1007/s11554-010-0175-4 – volume: 8 start-page: 553 issue: 3 year: 2013 ident: 10.1016/j.jvcir.2016.02.002_b0035 article-title: Reversible data hiding in encrypted images by reserving room before encryption publication-title: IEEE Trans. Inform. Forens. Secur. doi: 10.1109/TIFS.2013.2248725 – volume: 14 start-page: 703 issue: 3 year: 2012 ident: 10.1016/j.jvcir.2016.02.002_b0020 article-title: Robust watermarking of compressed and encrypted JPEG2000 images publication-title: IEEE Trans. Multimedia doi: 10.1109/TMM.2011.2181342 – volume: 180 start-page: 4672 year: 2010 ident: 10.1016/j.jvcir.2016.02.002_b0010 article-title: Effective watermarking scheme in the encrypted domain for buyer–seller watermarking protocol publication-title: Inform. Sci. doi: 10.1016/j.ins.2010.08.003 – ident: 10.1016/j.jvcir.2016.02.002_b0015 – volume: 24 start-page: 033028:1 issue: 3 year: 2015 ident: 10.1016/j.jvcir.2016.02.002_b0085 article-title: Context adaptive binary arithmetic coding-based data hiding in partially encrypted H.264/AVC videos publication-title: J. Electron. Imag. doi: 10.1117/1.JEI.24.3.033028 |
| SSID | ssj0003934 |
| Score | 2.279593 |
| Snippet | •The embedding is done on encrypted H.264/AVC data without knowing the decryption key.•The paired code-word substitution and multiple-base notational system... Recently, a novel scheme to hide data into encrypted H.264/AVC videos using code-word substitution has been proposed by Xu et al. However, the statistical... |
| SourceID | proquest crossref elsevier |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 229 |
| SubjectTerms | Code-word pair Code-word substitution Coding Context-adaptive variable length coding (CAVLC) Data embedding capacity Data extraction Data hiding Embedded systems Encrypted domain Encryption H.264/AVC Redundancy Representations Statistical analysis Video data Visual |
| Title | An improved scheme for data hiding in encrypted H.264/AVC videos |
| URI | https://dx.doi.org/10.1016/j.jvcir.2016.02.002 https://www.proquest.com/docview/1808127896 |
| Volume | 36 |
| WOSCitedRecordID | wos000371280200019&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: Elsevier SD Freedom Collection Journals 2021 customDbUrl: eissn: 1095-9076 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0003934 issn: 1047-3203 databaseCode: AIEXJ dateStart: 19950301 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3Pb9MwFLag4wAHBAPENkBGQruUjCTOL9-opk4DTeWHOggnK3FsSLW6pWnK-O95tpO0Y9o0DlyiKHLSyO-r3xe_976H0Ksky7VwWORESRw4gaDcyYFlw5nMcjcW4DYK02wiHo2SNKUfmzzdyrQTiJVKzs_p_L-aGq6BsXXp7D-Yu3soXIBzMDocwexwvJHhB0qXPi5mK6CS8OkqplbWW6eC9n-UbQ0LvPHi91zTzeMDYCtaVuHLYV8X5c2qKwjrqqxqoyayUVJiYw9Tnfhj5DHbUqYOcmltA0rZr3XN2ddMfTdhoM9w0vlOoxNZmobr32rV_7S5HwFWXqex2CVUaz8Q3yWbayy5sEg2exzW3_pWXevSUm53FSYHkxUvtXCrF1lxVX_tudpo_egDOzo9OWHjYTren_90dE8xHXtvGqzcRlt-HNKkh7YG74bp-85TE2qzDto3blWpTP7fpd-9irn85cMNMRk_QPcbA-GBRcJDdEuobXRvQ2dyG-01g8pqivfxhZqg6hF6O1C4RQy2iMGAGKwRgy1icKlwhxhsEPMG8IItXh6j06Ph-PDYaRprOBz429KhGQ0J5ZIWRUBIJgWXnIQy4zTIaS6B0ucyItKLIsGJAJIYJ0TwTBSRdL2syMkT1FMzJZ4iTHz4Qgh9GbhJHnhFkJMi5KHuieDzHJ6-g_x20hhvVOd185Mz1qYXTpiZaaZnmrk-g5neQa-7m-ZWdOX64VFrDdbwRssHGWDp-htftrZjsKrqUFmmxKyumKcb0ugi8Wj3BmP20N31P-EZ6i0XtXiO7vDVsqwWLxrU_QHHo5kn |
| linkProvider | Elsevier |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=An+improved+scheme+for+data+hiding+in+encrypted+H.264%2FAVC+videos&rft.jtitle=Journal+of+visual+communication+and+image+representation&rft.au=Xua%2C+Dawen&rft.au=Wangb%2C+Rangding&rft.au=Shic%2C+Yun+Q&rft.date=2016-04-01&rft.issn=1047-3203&rft.volume=36&rft.spage=229&rft.epage=242&rft_id=info:doi/10.1016%2Fj.jvcir.2016.02.002&rft.externalDBID=NO_FULL_TEXT |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1047-3203&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1047-3203&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1047-3203&client=summon |