Data hiding in partially encrypted HEVC video
In this study, an efficient scheme for hiding data directly in partially encrypted versions of high efficiency video coding (HEVC) videos is proposed. The content owner uses stream cipher to selectively encrypt some HEVC‐CABAC bin strings in a format‐compliant manner. Then, the data hider embeds the...
Uloženo v:
| Vydáno v: | ETRI journal Ročník 42; číslo 3; s. 446 - 458 |
|---|---|
| Hlavní autor: | |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
Electronics and Telecommunications Research Institute (ETRI)
01.06.2020
한국전자통신연구원 |
| Témata: | |
| ISSN: | 1225-6463, 2233-7326 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | In this study, an efficient scheme for hiding data directly in partially encrypted versions of high efficiency video coding (HEVC) videos is proposed. The content owner uses stream cipher to selectively encrypt some HEVC‐CABAC bin strings in a format‐compliant manner. Then, the data hider embeds the secret message into the encrypted HEVC videos using the specific coefficient modification technique. Consequently, it can be used in third‐party computing environments (more generally, cloud computing). For security and privacy purposes, service providers cannot access the visual content of the host video. As the coefficient is only slightly modified, the quality of the decrypted video is satisfactory. The encrypted and marked bitstreams meet the requirements of format compatibility, and have the same bit rate. At the receiving end, data extraction can be performed in the encrypted domain or decrypted domain that can be adapted to different application scenarios. Several standard video sequences with different resolutions and contents have been used for experimental evaluation. |
|---|---|
| AbstractList | In this study, an efficient scheme for hiding data directly in partially encrypted versions of high efficiency video coding (HEVC) videos is proposed. The content owner uses stream cipher to selectively encrypt some HEVC‐CABAC bin strings in a format‐compliant manner. Then, the data hider embeds the secret message into the encrypted HEVC videos using the specific coefficient modification technique. Consequently, it can be used in third‐party computing environments (more generally, cloud computing). For security and privacy purposes, service providers cannot access the visual content of the host video. As the coefficient is only slightly modified, the quality of the decrypted video is satisfactory. The encrypted and marked bitstreams meet the requirements of format compatibility, and have the same bit rate. At the receiving end, data extraction can be performed in the encrypted domain or decrypted domain that can be adapted to different application scenarios. Several standard video sequences with different resolutions and contents have been used for experimental evaluation. In this study, an efficient scheme for hiding data directly in partially encrypted versions of high efficiency video coding (HEVC) videos is proposed. The content owner uses stream cipher to selectively encrypt some HEVC‐CABAC bin strings in a format‐compliant manner. Then, the data hider embeds the secret message into the encrypted HEVC videos using the specific coefficient modification technique. Consequently, it can be used in third‐party computing environments (more generally, cloud computing). For security and privacy purposes, service providers cannot access the visual content of the host video. As the coefficient is only slightly modified, the quality of the decrypted video is satisfactory. The encrypted and marked bitstreams meet the requirements of format compatibility, and have the same bit rate. At the receiving end, data extraction can be performed in the encrypted domain or decrypted domain that can be adapted to different application scenarios. Several standard video sequences with different resolutions and contents have been used for experimental evaluation. KCI Citation Count: 5 |
| Author | Xu, Dawen |
| Author_xml | – sequence: 1 givenname: Dawen orcidid: 0000-0002-9619-8407 surname: Xu fullname: Xu, Dawen email: dawenxu@126.com organization: Ningbo University of Technology |
| BackLink | https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART002593479$$DAccess content in National Research Foundation of Korea (NRF) |
| BookMark | eNqFkc1PwkAQxTcGExE9e-3VQ2G_P44EUUhITAh63QzdXVyoLdk2Gv57C-jFxHiazOT9XmbeXKNeVVceoTuCh5wSPfJtitshxUTnmGt-gfqUMpYrRmUP9QmlIpdcsit03TRbjCnmQvdR_gAtZG_RxWqTxSrbQ2ojlOUh81WRDvvWu2w2fZ1kH9H5-gZdBigbf_tdB-jlcbqazPLF89N8Ml7kBacG57B2QgZugnaAMWistCDaUx2MIyCU87JbDYzzoLAXqutAG0mCWq-JMpwN0P3Zt0rB7opoa4inuqntLtnxcjW3hhnMmem087PW1bC1-xTfIR1OwGlQp4093lSU3gbD18RgkFRyXhTCCMKkDJ4qx0EE1nmJs1eR6qZJPtgittDGumoTxNISbI9Z21PW9pi1PWbdcaNf3M8efxPyTHzG0h_-k9vpakm7FyrMvgAh_ZKH |
| CitedBy_id | crossref_primary_10_1109_ACCESS_2022_3149599 crossref_primary_10_1007_s11042_020_09654_3 crossref_primary_10_1109_ACCESS_2020_3019840 crossref_primary_10_1109_ACCESS_2022_3152548 crossref_primary_10_3390_app10186410 |
| Cites_doi | 10.1007/s11554-017-0727-y 10.1109/TIFS.2014.2302899 10.1109/TCSVT.2015.2511879 10.1109/TCSVT.2015.2418611 10.1016/j.jvcir.2015.03.009 10.1016/j.jvcir.2017.02.008 10.1016/j.sigpro.2015.12.012 10.1016/j.ins.2010.08.003 10.1016/j.ins.2016.08.059 10.1109/TMM.2017.2777470 10.1117/1.JEI.23.5.053022 10.1049/iet-ifs.2017.0092 10.1016/j.image.2016.04.002 10.1109/TIFS.2016.2598528 10.1117/1.JEI.24.3.033028 10.1007/s11554-010-0175-4 10.1109/TCYB.2015.2423678 10.1109/TIP.2014.2302681 10.1109/TCSVT.2012.2221526 10.1016/j.jvcir.2016.02.002 10.1109/TCSVT.2011.2129090 10.1109/TCSVT.2003.815173 10.1016/j.sigpro.2016.05.004 10.1109/TIFS.2011.2176120 10.1109/TCSVT.2007.896635 10.1109/TMM.2011.2181342 10.1109/TCSVT.2012.2223055 10.1109/TCSVT.2013.2248588 |
| ContentType | Journal Article |
| Copyright | 2020 ETRI |
| Copyright_xml | – notice: 2020 ETRI |
| DBID | AAYXX CITATION DOA ACYCR |
| DOI | 10.4218/etrij.2018-0484 |
| DatabaseName | CrossRef DOAJ Directory of Open Access Journals Korean Citation Index |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 2233-7326 |
| EndPage | 458 |
| ExternalDocumentID | oai_kci_go_kr_ARTI_9390439 oai_doaj_org_article_f94b190a62644cc5951366fe27d4a5f3 10_4218_etrij_2018_0484 ETR212270 |
| Genre | article |
| GrantInformation_xml | – fundername: Ningbo Natural Science Foundation funderid: 2018A610054 – fundername: National Natural Science Foundation of China funderid: 61771270 – fundername: Zhejiang Provincial Natural Science Foundation of China funderid: LY17F020013; LR20F020001 |
| GroupedDBID | -~X .4S .DC .UV 0R~ 1OC 29G 2WC 5GY 5VS 9ZL AAKPC AAYBS ACGFS ACXQS ACYCR ADBBV ADDVE AENEX ALMA_UNASSIGNED_HOLDINGS ARCSS AVUZU BCNDV DU5 E3Z EBS EDO EJD GROUPED_DOAJ IPNFZ ITG ITH JDI KQ8 KVFHK MK~ ML~ O9- OK1 P5Y RIG RNS TR2 TUS WIN XSB AAMMB AAYXX ADMLS AEFGJ AGXDD AIDQK AIDYY ALUQN CITATION OVT |
| ID | FETCH-LOGICAL-c4290-abd56f49f8da00a8078518e28f9d1a57de6233a9dea70e57623a8961f7bb17943 |
| IEDL.DBID | WIN |
| ISICitedReferencesCount | 7 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000537540400013&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1225-6463 |
| IngestDate | Sat Oct 25 08:02:50 EDT 2025 Fri Oct 03 12:45:01 EDT 2025 Tue Nov 18 21:31:34 EST 2025 Sat Nov 29 03:21:28 EST 2025 Wed Jan 22 16:35:21 EST 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 3 |
| Language | English |
| License | http://doi.wiley.com/10.1002/tdm_license_1.1 http://onlinelibrary.wiley.com/termsAndConditions#vor |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c4290-abd56f49f8da00a8078518e28f9d1a57de6233a9dea70e57623a8961f7bb17943 |
| Notes | Funding information This research was supported by the National Natural Science Foundation of China (61771270), Zhejiang Provincial Natural Science Foundation of China (LY17F020013, LR20F020001), and Ningbo Natural Science Foundation (2018A610054). https://doi.org/10.4218/etrij.2018-0484 |
| ORCID | 0000-0002-9619-8407 |
| OpenAccessLink | https://doaj.org/article/f94b190a62644cc5951366fe27d4a5f3 |
| PageCount | 13 |
| ParticipantIDs | nrf_kci_oai_kci_go_kr_ARTI_9390439 doaj_primary_oai_doaj_org_article_f94b190a62644cc5951366fe27d4a5f3 crossref_citationtrail_10_4218_etrij_2018_0484 crossref_primary_10_4218_etrij_2018_0484 wiley_primary_10_4218_etrij_2018_0484_ETR212270 |
| PublicationCentury | 2000 |
| PublicationDate | June 2020 |
| PublicationDateYYYYMMDD | 2020-06-01 |
| PublicationDate_xml | – month: 06 year: 2020 text: June 2020 |
| PublicationDecade | 2020 |
| PublicationTitle | ETRI journal |
| PublicationYear | 2020 |
| Publisher | Electronics and Telecommunications Research Institute (ETRI) 한국전자통신연구원 |
| Publisher_xml | – name: Electronics and Telecommunications Research Institute (ETRI) – name: 한국전자통신연구원 |
| References | 2007; 17 2013; 23 2017; 27 2015; 30 2017; 45 2003; 13 2016; 123 2016; 128 2012; 14 2010; 180 2018; 20 2014; 23 2016; 36 2016; 11 2015; 24 2011; 21 2018; 12 2014; 9 2017; 387 2012; 7 2016; 26 2012; 22 2016; 46 2016; 45 2018; 14 e_1_2_6_10_1 e_1_2_6_30_1 e_1_2_6_19_1 e_1_2_6_13_1 e_1_2_6_14_1 e_1_2_6_11_1 e_1_2_6_12_1 e_1_2_6_17_1 e_1_2_6_18_1 e_1_2_6_15_1 e_1_2_6_16_1 e_1_2_6_21_1 e_1_2_6_20_1 e_1_2_6_9_1 e_1_2_6_8_1 e_1_2_6_5_1 e_1_2_6_4_1 e_1_2_6_7_1 e_1_2_6_6_1 e_1_2_6_25_1 e_1_2_6_24_1 e_1_2_6_3_1 e_1_2_6_23_1 e_1_2_6_2_1 e_1_2_6_22_1 e_1_2_6_29_1 e_1_2_6_28_1 e_1_2_6_27_1 e_1_2_6_26_1 |
| References_xml | – volume: 27 start-page: 892 issue: 4 year: 2017 end-page: 906 article-title: Extended selective encryption of H.264/AVC (CABAC) and HEVC encoded video streams publication-title: IEEE Trans. Circ. Syst. Vid. – volume: 22 start-page: 1778 issue: 12 year: 2012 end-page: 1791 article-title: High throughput CABAC entropy coding in HEVC publication-title: IEEE Trans. Circ. Syst. Vid. – volume: 11 start-page: 2777 issue: 12 year: 2016 end-page: 2789 article-title: New framework for reversible data hiding in encrypted domain publication-title: IEEE Trans. Inf. Forensics Secur. – volume: 7 start-page: 205 issue: 4 year: 2012 end-page: 214 article-title: Prediction mode modulated data‐hiding algorithm for H.264/AVC publication-title: J. Real‐Time Image Process. – volume: 45 start-page: 41 year: 2016 end-page: 51 article-title: Robust and hierarchical watermarking of encrypted images based on compressive sensing publication-title: Signal Process. Image Commun. – volume: 12 start-page: 42 issue: 1 year: 2018 end-page: 51 article-title: Database authentication watermarking scheme in encrypted domain publication-title: IET Inf. Secur. – volume: 30 start-page: 125 year: 2015 end-page: 135 article-title: Secure watermarking scheme against watermark attacks in the encrypted domain publication-title: J. Vis. Commun. Image Represent. – volume: 46 start-page: 1132 issue: 5 year: 2016 end-page: 1143 article-title: High capacity reversible data hiding in encrypted images by patch‐level sparse representation publication-title: IEEE Trans. Cybernetics – volume: 26 start-page: 636 issue: 4 year: 2016 end-page: 646 article-title: Reversible data hiding in encrypted images with distributed source encoding publication-title: IEEE Trans. Circ. Syst. Vid. – volume: 23 issue: 5 year: 2014 article-title: Efficient reversible data hiding in encrypted H.264/AVC videos publication-title: J. Electronic Imaging. – volume: 21 start-page: 565 issue: 5 year: 2011 end-page: 576 article-title: Fast protection of H.264/AVC by selective encryption of CAVLC and CABAC for I and P frames publication-title: IEEE Trans. Circ. Syst. Vid. – volume: 20 start-page: 1636 issue: 7 year: 2018 end-page: 1644 article-title: HEVC selective encryption using RC6 block cipher technique publication-title: IEEE Trans. Multimedia. – volume: 387 start-page: 90 year: 2017 end-page: 102 article-title: Cryptography‐based secure data storage and sharing using HEVC and public clouds publication-title: Inf. Sci. – volume: 45 start-page: 34 year: 2017 end-page: 45 article-title: Tunable data hiding in partially encrypted H.264/AVC videos publication-title: J. Vis. Commun. Image Represent. – volume: 22 start-page: 1765 issue: 12 year: 2012 end-page: 1777 article-title: Transform coefficient coding in HEVC publication-title: IEEE Trans. Circ. Syst. Vid. – volume: 14 start-page: 703 issue: 3 year: 2012 end-page: 716 article-title: Robust watermarking of compressed and encrypted JPEG2000 images publication-title: IEEE Trnas. Multimedia – volume: 17 start-page: 774 issue: 6 year: 2007 end-page: 778 article-title: Commutative encryption and watermarking in video compression publication-title: IEEE Trans. Circ. Syst. Vid. – volume: 128 start-page: 531 year: 2016 end-page: 545 article-title: Inter‐frame distortion drift analysis for reversible data hiding in encrypted H.264AVC Video bitstreams publication-title: Signal Process. – volume: 7 start-page: 826 issue: 2 year: 2012 end-page: 832 article-title: Separable reversible data hiding in encrypted image publication-title: IEEE Trans. Inf. Forensics Secur. – volume: 13 start-page: 620 issue: 7 year: 2003 end-page: 636 article-title: Context‐based adaptive binary arithmetic coding in the H.264/AVC video, compression standard publication-title: IEEE Trans. Circ. Syst. Vid. – volume: 180 start-page: 4672 year: 2010 end-page: 4684 article-title: Effective watermarking scheme in the encrypted domain for buyer–seller watermarking protocol publication-title: Inf. Sci. – volume: 36 start-page: 229 year: 2016 end-page: 242 article-title: An improved scheme for data hiding in encrypted H.264/AVC videos publication-title: J. Vis. Commun. Image Represent. – volume: 23 start-page: 1476 issue: 9 year: 2013 end-page: 1490 article-title: A tunable encryption scheme and analysis of fast selective encryption for CAVLC and CABAC in H.264/AVC publication-title: IEEE Trans. Circ. Syst. Vid. – volume: 14 start-page: 171 issue: 1 year: 2018 end-page: 182 article-title: Separable reversible data hiding and encryption for HEVC Video publication-title: J. Real‐Time Image Process. – volume: 24 issue: 3 year: 2015 article-title: Context adaptive binary arithmetic coding‐based data hiding in partially encrypted H.264/AVC videos publication-title: J. Electronic Imaging. – volume: 9 start-page: 596 issue: 4 year: 2014 end-page: 606 article-title: Data hiding in encrypted H.264/AVC video streams by codeword substitution publication-title: IEEE Trans. Inf. Forensics Secur. – volume: 123 start-page: 9 year: 2016 end-page: 21 article-title: Separable and error‐free reversible data hiding in encrypted images publication-title: Signal Process. – volume: 23 start-page: 1463 issue: 4 year: 2014 end-page: 1475 article-title: A unified data embedding and scrambling method publication-title: IEEE Trans. Image Process – ident: e_1_2_6_21_1 doi: 10.1007/s11554-017-0727-y – ident: e_1_2_6_15_1 doi: 10.1109/TIFS.2014.2302899 – ident: e_1_2_6_25_1 doi: 10.1109/TCSVT.2015.2511879 – ident: e_1_2_6_12_1 doi: 10.1109/TCSVT.2015.2418611 – ident: e_1_2_6_4_1 doi: 10.1016/j.jvcir.2015.03.009 – ident: e_1_2_6_18_1 doi: 10.1016/j.jvcir.2017.02.008 – ident: e_1_2_6_13_1 doi: 10.1016/j.sigpro.2015.12.012 – ident: e_1_2_6_3_1 doi: 10.1016/j.ins.2010.08.003 – ident: e_1_2_6_2_1 doi: 10.1016/j.ins.2016.08.059 – ident: e_1_2_6_26_1 doi: 10.1109/TMM.2017.2777470 – ident: e_1_2_6_28_1 – ident: e_1_2_6_19_1 doi: 10.1117/1.JEI.23.5.053022 – ident: e_1_2_6_7_1 doi: 10.1049/iet-ifs.2017.0092 – ident: e_1_2_6_6_1 doi: 10.1016/j.image.2016.04.002 – ident: e_1_2_6_10_1 doi: 10.1109/TIFS.2016.2598528 – ident: e_1_2_6_17_1 doi: 10.1117/1.JEI.24.3.033028 – ident: e_1_2_6_29_1 doi: 10.1007/s11554-010-0175-4 – ident: e_1_2_6_11_1 doi: 10.1109/TCYB.2015.2423678 – ident: e_1_2_6_8_1 doi: 10.1109/TIP.2014.2302681 – ident: e_1_2_6_30_1 doi: 10.1109/TCSVT.2012.2221526 – ident: e_1_2_6_16_1 doi: 10.1016/j.jvcir.2016.02.002 – ident: e_1_2_6_23_1 doi: 10.1109/TCSVT.2011.2129090 – ident: e_1_2_6_22_1 doi: 10.1109/TCSVT.2003.815173 – ident: e_1_2_6_20_1 doi: 10.1016/j.sigpro.2016.05.004 – ident: e_1_2_6_9_1 doi: 10.1109/TIFS.2011.2176120 – ident: e_1_2_6_14_1 doi: 10.1109/TCSVT.2007.896635 – ident: e_1_2_6_5_1 doi: 10.1109/TMM.2011.2181342 – ident: e_1_2_6_27_1 doi: 10.1109/TCSVT.2012.2223055 – ident: e_1_2_6_24_1 doi: 10.1109/TCSVT.2013.2248588 |
| SSID | ssj0020458 |
| Score | 2.26199 |
| Snippet | In this study, an efficient scheme for hiding data directly in partially encrypted versions of high efficiency video coding (HEVC) videos is proposed. The... |
| SourceID | nrf doaj crossref wiley |
| SourceType | Open Website Enrichment Source Index Database Publisher |
| StartPage | 446 |
| SubjectTerms | context adaptive binary arithmetic coding (CABAC) data hiding encrypted domain high efficiency video coding (HEVC) 전자/정보통신공학 |
| SummonAdditionalLinks | – databaseName: DOAJ Directory of Open Access Journals dbid: DOA link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LS8QwEA4iHvQgPnF9UcSDl7hpmybN0ceKXkRExVtI89DVpbvUVfDfO5NW0YN48VQICaTfDHzftMk3hOwbvOBYBE-FYIECXzNaFsJRb4233KRW5C42m5CXl-X9vbr61uoLz4S19sAtcP2geAWkZQQyt7UFKIJciOAz6bgpQvT5ZFJ9FlNdqYW__7DUgmylgou8NfXhwGd9bFT1hGe6SgrZy3_wUbTtB5apm_BTrEa2OVsii51MTI7a7S2TGV-vkIVv5oGrhJ6aqUkeh0g-ybBOJvguZjR6TyDxmvcJSMnkfHB3kuBNu_EauT0b3Jyc0675AbVAEYyayhUicBVKZxgzaAtfpKXPyqBcagrpPAiX3CjnjWQeqoYsN6USaZBVFV3f1slsPa79BkmCZUa6SrqUVdyDfkmlUFxVLg1ZkFneI4efEGjbOYNjg4qRhgoBMdMRM42YacSsRw6-FkxaU4zfpx4jpl_T0M06DkCMdRdj_VeMe2QPIqKf7TCux-fDWD83GjT_hVa5wvu9PdKPAftrR3pwcw18nUm2-R972yLzGZbg8cPMNpmdNq9-h8zZt-nwpdmNWfkBr0_gGA priority: 102 providerName: Directory of Open Access Journals |
| Title | Data hiding in partially encrypted HEVC video |
| URI | https://onlinelibrary.wiley.com/doi/abs/10.4218%2Fetrij.2018-0484 https://doaj.org/article/f94b190a62644cc5951366fe27d4a5f3 https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART002593479 |
| Volume | 42 |
| WOSCitedRecordID | wos000537540400013&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| ispartofPNX | ETRI Journal, 2020, 42(3), , pp.446-458 |
| journalDatabaseRights | – providerCode: PRVAON databaseName: DOAJ Directory of Open Access Journals customDbUrl: eissn: 2233-7326 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0020458 issn: 1225-6463 databaseCode: DOA dateStart: 20170101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVWIB databaseName: Wiley Online Library Free Content customDbUrl: eissn: 2233-7326 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0020458 issn: 1225-6463 databaseCode: WIN dateStart: 19970101 isFulltext: true titleUrlDefault: https://onlinelibrary.wiley.com providerName: Wiley-Blackwell |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3dS9xAEF9E-mAfaqstvVolSB982bpJNrvZx1ZP9OWQYtW3ZbIfNvXIHfFa8L93Zi89aqGUgk-BkAnLfGR-s9n5DWMfgBocqxi4UiJyzNeC15XyPDgITkLuVOnTsAk9mdTX1-Z8OE1IvTBLfojVhhtFRvpeU4BDk6aQSMxKZMRF336ns1k1Ry8kRtBcptC8OpusSi76DUglF3otV1KVS3IfesPhH_KP8lKi78ds0_XxMWhNWedk8wnW-5K9GCBn9mnpI6_YWui22PPfiAi3GT-GBWTfWkpkWdtlc3IomE7vM3Ti_n6OsDQ7HV8eZdS1N3vNvp6ML45O-TBIgTtMN4JD4ysVpYm1ByGAKOarvA5FHY3PodI-IAgqwfgAWgSsQIoSaqPyqJsmMci9YevdrAtvWRadAO0b7XPRyIBYKNfKSNP4PBZRF-WIffylRusGlnEadjG1WG2QJmzSgyU9WNLDiB2sBOZLgo2_P_qZ7LJ6jJix041Zf2OHQLPRyAZBDihCes5ViCBLpWIotJdQRVzgPlrV3ro2ydP1ZmZve4v1w5k1paFe4RE7TKb814rs-OIL5v5Ci3f_LbHDNgqq3dOOznu2vuh_hF32zP1ctHf9Xtob2EvO_ACP2PKh |
| linkProvider | Wiley-Blackwell |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1Lb9QwEB6VggQceCOWFogQBy6mTuLY8bG0W-2Kdg9oQb1Zjh8ldJVdhQWp_54Z73bVIiGE1FOkKLaseeT7xsl8BnhnqcGxioFJySNDvOasrqRnwdnghM2dLH06bEJNJvXpqb7aC7PSh9hsuFFmpPc1JThtSFOWC4Ql8uKyb7_Tz1k1wzAUt-C2kMjfqatkPNkUXfQhkIoujFsmhSxX8j40xd4fE1xDpiTgj3jT9fE6bU24c_TwJlb8CB6sWWe2vwqTx7AVuidw_4oW4VNgh3Zps28tYVnWdtmCYsrOZhcZxnF_sUBmmo2GXw8yatybP4MvR8PpwYitz1JgDhGHM9v4SkahY-0t55ZU5qu8DkUdtc9tpXxAHlRa7YNVPGARUpS21jKPqmmSiNxz2O7mXXgBWXTcKt8on_NGBKRDuZJa6MbnsYiqKAfw4dKOxq2Fxum8i5nBgoMsYZIdDNnBkB0G8H4zYLHS2Pj7ox_JMZvHSBw73Zj3Z2adayZq0SDPsZLInnMVkshSyhgK5YWtIi7wLbrVnLs2jafr2dyc9wZLiLHRpaZ24QHsJV_-a0VmOP2M8F8o_vK_R7yBu6PpybE5Hk8-7cC9gkr5tMGzC9vL_md4BXfcr2X7o3-dYvo3ROP13A |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1ba9RAFD7UKlIf6p2utRrEB1_GTpLJTOaxl126KItIlb4Nk7nU2CW7xFXov_ec2XVpBZFCnwIhMwznku87k5xvAN5aanCsYmBS8sgQrzmrK-lZcDY4YXMnS58Om1CTSX12pq_2wiz1IdYbbpQZ6X1NCR7mPlKWC4Ql8uKib7_Tz1k1wzAUd-CukAiA1FUynqyLLvoQSEUXxi2TQpZLeR-aYv-vCa4hUxLwR7zp-nidtibcGT28jRU_gu0V68wOlmHyGDZC9wQeXNEifArs2C5s9q0lLMvaLptTTNnp9DLDOO4v58hMs5Ph16OMGvdmz-DLaHh6dMJWZykwh4jDmW18JaPQsfaWc0sq81Veh6KO2ue2Uj4gDyqt9sEqHrAIKUpba5lH1TRJRO45bHazLuxAFh23yjfK57wRAelQrqQWuvF5LKIqygG8_2NH41ZC43TexdRgwUGWMMkOhuxgyA4DeLceMF9qbPz70UNyzPoxEsdON2b9uVnlmolaNMhzrCSy51yFJLKUMoZCeWGriAt8g241F65N4-l6PjMXvcESYmx0qaldeAD7yZf_W5EZnn5G-C8Uf3HjEa_h_qfjkfk4nnzYha2CKvm0v_MSNhf9z7AH99yvRfujf5VC-jfDivVO |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Data+hiding+in+partially+encrypted+HEVC+video&rft.jtitle=ETRI+journal&rft.au=Xu%2C+Dawen&rft.date=2020-06-01&rft.issn=1225-6463&rft.eissn=2233-7326&rft.volume=42&rft.issue=3&rft.spage=446&rft.epage=458&rft_id=info:doi/10.4218%2Fetrij.2018-0484&rft.externalDBID=n%2Fa&rft.externalDocID=10_4218_etrij_2018_0484 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1225-6463&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1225-6463&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1225-6463&client=summon |