Data hiding in partially encrypted HEVC video

In this study, an efficient scheme for hiding data directly in partially encrypted versions of high efficiency video coding (HEVC) videos is proposed. The content owner uses stream cipher to selectively encrypt some HEVC‐CABAC bin strings in a format‐compliant manner. Then, the data hider embeds the...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:ETRI journal Ročník 42; číslo 3; s. 446 - 458
Hlavní autor: Xu, Dawen
Médium: Journal Article
Jazyk:angličtina
Vydáno: Electronics and Telecommunications Research Institute (ETRI) 01.06.2020
한국전자통신연구원
Témata:
ISSN:1225-6463, 2233-7326
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract In this study, an efficient scheme for hiding data directly in partially encrypted versions of high efficiency video coding (HEVC) videos is proposed. The content owner uses stream cipher to selectively encrypt some HEVC‐CABAC bin strings in a format‐compliant manner. Then, the data hider embeds the secret message into the encrypted HEVC videos using the specific coefficient modification technique. Consequently, it can be used in third‐party computing environments (more generally, cloud computing). For security and privacy purposes, service providers cannot access the visual content of the host video. As the coefficient is only slightly modified, the quality of the decrypted video is satisfactory. The encrypted and marked bitstreams meet the requirements of format compatibility, and have the same bit rate. At the receiving end, data extraction can be performed in the encrypted domain or decrypted domain that can be adapted to different application scenarios. Several standard video sequences with different resolutions and contents have been used for experimental evaluation.
AbstractList In this study, an efficient scheme for hiding data directly in partially encrypted versions of high efficiency video coding (HEVC) videos is proposed. The content owner uses stream cipher to selectively encrypt some HEVC‐CABAC bin strings in a format‐compliant manner. Then, the data hider embeds the secret message into the encrypted HEVC videos using the specific coefficient modification technique. Consequently, it can be used in third‐party computing environments (more generally, cloud computing). For security and privacy purposes, service providers cannot access the visual content of the host video. As the coefficient is only slightly modified, the quality of the decrypted video is satisfactory. The encrypted and marked bitstreams meet the requirements of format compatibility, and have the same bit rate. At the receiving end, data extraction can be performed in the encrypted domain or decrypted domain that can be adapted to different application scenarios. Several standard video sequences with different resolutions and contents have been used for experimental evaluation.
In this study, an efficient scheme for hiding data directly in partially encrypted versions of high efficiency video coding (HEVC) videos is proposed. The content owner uses stream cipher to selectively encrypt some HEVC‐CABAC bin strings in a format‐compliant manner. Then, the data hider embeds the secret message into the encrypted HEVC videos using the specific coefficient modification technique. Consequently, it can be used in third‐party computing environments (more generally, cloud computing). For security and privacy purposes, service providers cannot access the visual content of the host video. As the coefficient is only slightly modified, the quality of the decrypted video is satisfactory. The encrypted and marked bitstreams meet the requirements of format compatibility, and have the same bit rate. At the receiving end, data extraction can be performed in the encrypted domain or decrypted domain that can be adapted to different application scenarios. Several standard video sequences with different resolutions and contents have been used for experimental evaluation. KCI Citation Count: 5
Author Xu, Dawen
Author_xml – sequence: 1
  givenname: Dawen
  orcidid: 0000-0002-9619-8407
  surname: Xu
  fullname: Xu, Dawen
  email: dawenxu@126.com
  organization: Ningbo University of Technology
BackLink https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART002593479$$DAccess content in National Research Foundation of Korea (NRF)
BookMark eNqFkc1PwkAQxTcGExE9e-3VQ2G_P44EUUhITAh63QzdXVyoLdk2Gv57C-jFxHiazOT9XmbeXKNeVVceoTuCh5wSPfJtitshxUTnmGt-gfqUMpYrRmUP9QmlIpdcsit03TRbjCnmQvdR_gAtZG_RxWqTxSrbQ2ojlOUh81WRDvvWu2w2fZ1kH9H5-gZdBigbf_tdB-jlcbqazPLF89N8Ml7kBacG57B2QgZugnaAMWistCDaUx2MIyCU87JbDYzzoLAXqutAG0mCWq-JMpwN0P3Zt0rB7opoa4inuqntLtnxcjW3hhnMmem087PW1bC1-xTfIR1OwGlQp4093lSU3gbD18RgkFRyXhTCCMKkDJ4qx0EE1nmJs1eR6qZJPtgittDGumoTxNISbI9Z21PW9pi1PWbdcaNf3M8efxPyTHzG0h_-k9vpakm7FyrMvgAh_ZKH
CitedBy_id crossref_primary_10_1109_ACCESS_2022_3149599
crossref_primary_10_1007_s11042_020_09654_3
crossref_primary_10_1109_ACCESS_2020_3019840
crossref_primary_10_1109_ACCESS_2022_3152548
crossref_primary_10_3390_app10186410
Cites_doi 10.1007/s11554-017-0727-y
10.1109/TIFS.2014.2302899
10.1109/TCSVT.2015.2511879
10.1109/TCSVT.2015.2418611
10.1016/j.jvcir.2015.03.009
10.1016/j.jvcir.2017.02.008
10.1016/j.sigpro.2015.12.012
10.1016/j.ins.2010.08.003
10.1016/j.ins.2016.08.059
10.1109/TMM.2017.2777470
10.1117/1.JEI.23.5.053022
10.1049/iet-ifs.2017.0092
10.1016/j.image.2016.04.002
10.1109/TIFS.2016.2598528
10.1117/1.JEI.24.3.033028
10.1007/s11554-010-0175-4
10.1109/TCYB.2015.2423678
10.1109/TIP.2014.2302681
10.1109/TCSVT.2012.2221526
10.1016/j.jvcir.2016.02.002
10.1109/TCSVT.2011.2129090
10.1109/TCSVT.2003.815173
10.1016/j.sigpro.2016.05.004
10.1109/TIFS.2011.2176120
10.1109/TCSVT.2007.896635
10.1109/TMM.2011.2181342
10.1109/TCSVT.2012.2223055
10.1109/TCSVT.2013.2248588
ContentType Journal Article
Copyright 2020 ETRI
Copyright_xml – notice: 2020 ETRI
DBID AAYXX
CITATION
DOA
ACYCR
DOI 10.4218/etrij.2018-0484
DatabaseName CrossRef
DOAJ Directory of Open Access Journals
Korean Citation Index
DatabaseTitle CrossRef
DatabaseTitleList


Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 2233-7326
EndPage 458
ExternalDocumentID oai_kci_go_kr_ARTI_9390439
oai_doaj_org_article_f94b190a62644cc5951366fe27d4a5f3
10_4218_etrij_2018_0484
ETR212270
Genre article
GrantInformation_xml – fundername: Ningbo Natural Science Foundation
  funderid: 2018A610054
– fundername: National Natural Science Foundation of China
  funderid: 61771270
– fundername: Zhejiang Provincial Natural Science Foundation of China
  funderid: LY17F020013; LR20F020001
GroupedDBID -~X
.4S
.DC
.UV
0R~
1OC
29G
2WC
5GY
5VS
9ZL
AAKPC
AAYBS
ACGFS
ACXQS
ACYCR
ADBBV
ADDVE
AENEX
ALMA_UNASSIGNED_HOLDINGS
ARCSS
AVUZU
BCNDV
DU5
E3Z
EBS
EDO
EJD
GROUPED_DOAJ
IPNFZ
ITG
ITH
JDI
KQ8
KVFHK
MK~
ML~
O9-
OK1
P5Y
RIG
RNS
TR2
TUS
WIN
XSB
AAMMB
AAYXX
ADMLS
AEFGJ
AGXDD
AIDQK
AIDYY
ALUQN
CITATION
OVT
ID FETCH-LOGICAL-c4290-abd56f49f8da00a8078518e28f9d1a57de6233a9dea70e57623a8961f7bb17943
IEDL.DBID WIN
ISICitedReferencesCount 7
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000537540400013&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1225-6463
IngestDate Sat Oct 25 08:02:50 EDT 2025
Fri Oct 03 12:45:01 EDT 2025
Tue Nov 18 21:31:34 EST 2025
Sat Nov 29 03:21:28 EST 2025
Wed Jan 22 16:35:21 EST 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 3
Language English
License http://doi.wiley.com/10.1002/tdm_license_1.1
http://onlinelibrary.wiley.com/termsAndConditions#vor
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c4290-abd56f49f8da00a8078518e28f9d1a57de6233a9dea70e57623a8961f7bb17943
Notes Funding information
This research was supported by the National Natural Science Foundation of China (61771270), Zhejiang Provincial Natural Science Foundation of China (LY17F020013, LR20F020001), and Ningbo Natural Science Foundation (2018A610054).
https://doi.org/10.4218/etrij.2018-0484
ORCID 0000-0002-9619-8407
OpenAccessLink https://doaj.org/article/f94b190a62644cc5951366fe27d4a5f3
PageCount 13
ParticipantIDs nrf_kci_oai_kci_go_kr_ARTI_9390439
doaj_primary_oai_doaj_org_article_f94b190a62644cc5951366fe27d4a5f3
crossref_citationtrail_10_4218_etrij_2018_0484
crossref_primary_10_4218_etrij_2018_0484
wiley_primary_10_4218_etrij_2018_0484_ETR212270
PublicationCentury 2000
PublicationDate June 2020
PublicationDateYYYYMMDD 2020-06-01
PublicationDate_xml – month: 06
  year: 2020
  text: June 2020
PublicationDecade 2020
PublicationTitle ETRI journal
PublicationYear 2020
Publisher Electronics and Telecommunications Research Institute (ETRI)
한국전자통신연구원
Publisher_xml – name: Electronics and Telecommunications Research Institute (ETRI)
– name: 한국전자통신연구원
References 2007; 17
2013; 23
2017; 27
2015; 30
2017; 45
2003; 13
2016; 123
2016; 128
2012; 14
2010; 180
2018; 20
2014; 23
2016; 36
2016; 11
2015; 24
2011; 21
2018; 12
2014; 9
2017; 387
2012; 7
2016; 26
2012; 22
2016; 46
2016; 45
2018; 14
e_1_2_6_10_1
e_1_2_6_30_1
e_1_2_6_19_1
e_1_2_6_13_1
e_1_2_6_14_1
e_1_2_6_11_1
e_1_2_6_12_1
e_1_2_6_17_1
e_1_2_6_18_1
e_1_2_6_15_1
e_1_2_6_16_1
e_1_2_6_21_1
e_1_2_6_20_1
e_1_2_6_9_1
e_1_2_6_8_1
e_1_2_6_5_1
e_1_2_6_4_1
e_1_2_6_7_1
e_1_2_6_6_1
e_1_2_6_25_1
e_1_2_6_24_1
e_1_2_6_3_1
e_1_2_6_23_1
e_1_2_6_2_1
e_1_2_6_22_1
e_1_2_6_29_1
e_1_2_6_28_1
e_1_2_6_27_1
e_1_2_6_26_1
References_xml – volume: 27
  start-page: 892
  issue: 4
  year: 2017
  end-page: 906
  article-title: Extended selective encryption of H.264/AVC (CABAC) and HEVC encoded video streams
  publication-title: IEEE Trans. Circ. Syst. Vid.
– volume: 22
  start-page: 1778
  issue: 12
  year: 2012
  end-page: 1791
  article-title: High throughput CABAC entropy coding in HEVC
  publication-title: IEEE Trans. Circ. Syst. Vid.
– volume: 11
  start-page: 2777
  issue: 12
  year: 2016
  end-page: 2789
  article-title: New framework for reversible data hiding in encrypted domain
  publication-title: IEEE Trans. Inf. Forensics Secur.
– volume: 7
  start-page: 205
  issue: 4
  year: 2012
  end-page: 214
  article-title: Prediction mode modulated data‐hiding algorithm for H.264/AVC
  publication-title: J. Real‐Time Image Process.
– volume: 45
  start-page: 41
  year: 2016
  end-page: 51
  article-title: Robust and hierarchical watermarking of encrypted images based on compressive sensing
  publication-title: Signal Process. Image Commun.
– volume: 12
  start-page: 42
  issue: 1
  year: 2018
  end-page: 51
  article-title: Database authentication watermarking scheme in encrypted domain
  publication-title: IET Inf. Secur.
– volume: 30
  start-page: 125
  year: 2015
  end-page: 135
  article-title: Secure watermarking scheme against watermark attacks in the encrypted domain
  publication-title: J. Vis. Commun. Image Represent.
– volume: 46
  start-page: 1132
  issue: 5
  year: 2016
  end-page: 1143
  article-title: High capacity reversible data hiding in encrypted images by patch‐level sparse representation
  publication-title: IEEE Trans. Cybernetics
– volume: 26
  start-page: 636
  issue: 4
  year: 2016
  end-page: 646
  article-title: Reversible data hiding in encrypted images with distributed source encoding
  publication-title: IEEE Trans. Circ. Syst. Vid.
– volume: 23
  issue: 5
  year: 2014
  article-title: Efficient reversible data hiding in encrypted H.264/AVC videos
  publication-title: J. Electronic Imaging.
– volume: 21
  start-page: 565
  issue: 5
  year: 2011
  end-page: 576
  article-title: Fast protection of H.264/AVC by selective encryption of CAVLC and CABAC for I and P frames
  publication-title: IEEE Trans. Circ. Syst. Vid.
– volume: 20
  start-page: 1636
  issue: 7
  year: 2018
  end-page: 1644
  article-title: HEVC selective encryption using RC6 block cipher technique
  publication-title: IEEE Trans. Multimedia.
– volume: 387
  start-page: 90
  year: 2017
  end-page: 102
  article-title: Cryptography‐based secure data storage and sharing using HEVC and public clouds
  publication-title: Inf. Sci.
– volume: 45
  start-page: 34
  year: 2017
  end-page: 45
  article-title: Tunable data hiding in partially encrypted H.264/AVC videos
  publication-title: J. Vis. Commun. Image Represent.
– volume: 22
  start-page: 1765
  issue: 12
  year: 2012
  end-page: 1777
  article-title: Transform coefficient coding in HEVC
  publication-title: IEEE Trans. Circ. Syst. Vid.
– volume: 14
  start-page: 703
  issue: 3
  year: 2012
  end-page: 716
  article-title: Robust watermarking of compressed and encrypted JPEG2000 images
  publication-title: IEEE Trnas. Multimedia
– volume: 17
  start-page: 774
  issue: 6
  year: 2007
  end-page: 778
  article-title: Commutative encryption and watermarking in video compression
  publication-title: IEEE Trans. Circ. Syst. Vid.
– volume: 128
  start-page: 531
  year: 2016
  end-page: 545
  article-title: Inter‐frame distortion drift analysis for reversible data hiding in encrypted H.264AVC Video bitstreams
  publication-title: Signal Process.
– volume: 7
  start-page: 826
  issue: 2
  year: 2012
  end-page: 832
  article-title: Separable reversible data hiding in encrypted image
  publication-title: IEEE Trans. Inf. Forensics Secur.
– volume: 13
  start-page: 620
  issue: 7
  year: 2003
  end-page: 636
  article-title: Context‐based adaptive binary arithmetic coding in the H.264/AVC video, compression standard
  publication-title: IEEE Trans. Circ. Syst. Vid.
– volume: 180
  start-page: 4672
  year: 2010
  end-page: 4684
  article-title: Effective watermarking scheme in the encrypted domain for buyer–seller watermarking protocol
  publication-title: Inf. Sci.
– volume: 36
  start-page: 229
  year: 2016
  end-page: 242
  article-title: An improved scheme for data hiding in encrypted H.264/AVC videos
  publication-title: J. Vis. Commun. Image Represent.
– volume: 23
  start-page: 1476
  issue: 9
  year: 2013
  end-page: 1490
  article-title: A tunable encryption scheme and analysis of fast selective encryption for CAVLC and CABAC in H.264/AVC
  publication-title: IEEE Trans. Circ. Syst. Vid.
– volume: 14
  start-page: 171
  issue: 1
  year: 2018
  end-page: 182
  article-title: Separable reversible data hiding and encryption for HEVC Video
  publication-title: J. Real‐Time Image Process.
– volume: 24
  issue: 3
  year: 2015
  article-title: Context adaptive binary arithmetic coding‐based data hiding in partially encrypted H.264/AVC videos
  publication-title: J. Electronic Imaging.
– volume: 9
  start-page: 596
  issue: 4
  year: 2014
  end-page: 606
  article-title: Data hiding in encrypted H.264/AVC video streams by codeword substitution
  publication-title: IEEE Trans. Inf. Forensics Secur.
– volume: 123
  start-page: 9
  year: 2016
  end-page: 21
  article-title: Separable and error‐free reversible data hiding in encrypted images
  publication-title: Signal Process.
– volume: 23
  start-page: 1463
  issue: 4
  year: 2014
  end-page: 1475
  article-title: A unified data embedding and scrambling method
  publication-title: IEEE Trans. Image Process
– ident: e_1_2_6_21_1
  doi: 10.1007/s11554-017-0727-y
– ident: e_1_2_6_15_1
  doi: 10.1109/TIFS.2014.2302899
– ident: e_1_2_6_25_1
  doi: 10.1109/TCSVT.2015.2511879
– ident: e_1_2_6_12_1
  doi: 10.1109/TCSVT.2015.2418611
– ident: e_1_2_6_4_1
  doi: 10.1016/j.jvcir.2015.03.009
– ident: e_1_2_6_18_1
  doi: 10.1016/j.jvcir.2017.02.008
– ident: e_1_2_6_13_1
  doi: 10.1016/j.sigpro.2015.12.012
– ident: e_1_2_6_3_1
  doi: 10.1016/j.ins.2010.08.003
– ident: e_1_2_6_2_1
  doi: 10.1016/j.ins.2016.08.059
– ident: e_1_2_6_26_1
  doi: 10.1109/TMM.2017.2777470
– ident: e_1_2_6_28_1
– ident: e_1_2_6_19_1
  doi: 10.1117/1.JEI.23.5.053022
– ident: e_1_2_6_7_1
  doi: 10.1049/iet-ifs.2017.0092
– ident: e_1_2_6_6_1
  doi: 10.1016/j.image.2016.04.002
– ident: e_1_2_6_10_1
  doi: 10.1109/TIFS.2016.2598528
– ident: e_1_2_6_17_1
  doi: 10.1117/1.JEI.24.3.033028
– ident: e_1_2_6_29_1
  doi: 10.1007/s11554-010-0175-4
– ident: e_1_2_6_11_1
  doi: 10.1109/TCYB.2015.2423678
– ident: e_1_2_6_8_1
  doi: 10.1109/TIP.2014.2302681
– ident: e_1_2_6_30_1
  doi: 10.1109/TCSVT.2012.2221526
– ident: e_1_2_6_16_1
  doi: 10.1016/j.jvcir.2016.02.002
– ident: e_1_2_6_23_1
  doi: 10.1109/TCSVT.2011.2129090
– ident: e_1_2_6_22_1
  doi: 10.1109/TCSVT.2003.815173
– ident: e_1_2_6_20_1
  doi: 10.1016/j.sigpro.2016.05.004
– ident: e_1_2_6_9_1
  doi: 10.1109/TIFS.2011.2176120
– ident: e_1_2_6_14_1
  doi: 10.1109/TCSVT.2007.896635
– ident: e_1_2_6_5_1
  doi: 10.1109/TMM.2011.2181342
– ident: e_1_2_6_27_1
  doi: 10.1109/TCSVT.2012.2223055
– ident: e_1_2_6_24_1
  doi: 10.1109/TCSVT.2013.2248588
SSID ssj0020458
Score 2.26199
Snippet In this study, an efficient scheme for hiding data directly in partially encrypted versions of high efficiency video coding (HEVC) videos is proposed. The...
SourceID nrf
doaj
crossref
wiley
SourceType Open Website
Enrichment Source
Index Database
Publisher
StartPage 446
SubjectTerms context adaptive binary arithmetic coding (CABAC)
data hiding
encrypted domain
high efficiency video coding (HEVC)
전자/정보통신공학
SummonAdditionalLinks – databaseName: DOAJ Directory of Open Access Journals
  dbid: DOA
  link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LS8QwEA4iHvQgPnF9UcSDl7hpmybN0ceKXkRExVtI89DVpbvUVfDfO5NW0YN48VQICaTfDHzftMk3hOwbvOBYBE-FYIECXzNaFsJRb4233KRW5C42m5CXl-X9vbr61uoLz4S19sAtcP2geAWkZQQyt7UFKIJciOAz6bgpQvT5ZFJ9FlNdqYW__7DUgmylgou8NfXhwGd9bFT1hGe6SgrZy3_wUbTtB5apm_BTrEa2OVsii51MTI7a7S2TGV-vkIVv5oGrhJ6aqUkeh0g-ybBOJvguZjR6TyDxmvcJSMnkfHB3kuBNu_EauT0b3Jyc0675AbVAEYyayhUicBVKZxgzaAtfpKXPyqBcagrpPAiX3CjnjWQeqoYsN6USaZBVFV3f1slsPa79BkmCZUa6SrqUVdyDfkmlUFxVLg1ZkFneI4efEGjbOYNjg4qRhgoBMdMRM42YacSsRw6-FkxaU4zfpx4jpl_T0M06DkCMdRdj_VeMe2QPIqKf7TCux-fDWD83GjT_hVa5wvu9PdKPAftrR3pwcw18nUm2-R972yLzGZbg8cPMNpmdNq9-h8zZt-nwpdmNWfkBr0_gGA
  priority: 102
  providerName: Directory of Open Access Journals
Title Data hiding in partially encrypted HEVC video
URI https://onlinelibrary.wiley.com/doi/abs/10.4218%2Fetrij.2018-0484
https://doaj.org/article/f94b190a62644cc5951366fe27d4a5f3
https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART002593479
Volume 42
WOSCitedRecordID wos000537540400013&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
ispartofPNX ETRI Journal, 2020, 42(3), , pp.446-458
journalDatabaseRights – providerCode: PRVAON
  databaseName: DOAJ Directory of Open Access Journals
  customDbUrl:
  eissn: 2233-7326
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0020458
  issn: 1225-6463
  databaseCode: DOA
  dateStart: 20170101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVWIB
  databaseName: Wiley Online Library Free Content
  customDbUrl:
  eissn: 2233-7326
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0020458
  issn: 1225-6463
  databaseCode: WIN
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: https://onlinelibrary.wiley.com
  providerName: Wiley-Blackwell
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3dS9xAEF9E-mAfaqstvVolSB982bpJNrvZx1ZP9OWQYtW3ZbIfNvXIHfFa8L93Zi89aqGUgk-BkAnLfGR-s9n5DWMfgBocqxi4UiJyzNeC15XyPDgITkLuVOnTsAk9mdTX1-Z8OE1IvTBLfojVhhtFRvpeU4BDk6aQSMxKZMRF336ns1k1Ry8kRtBcptC8OpusSi76DUglF3otV1KVS3IfesPhH_KP8lKi78ds0_XxMWhNWedk8wnW-5K9GCBn9mnpI6_YWui22PPfiAi3GT-GBWTfWkpkWdtlc3IomE7vM3Ti_n6OsDQ7HV8eZdS1N3vNvp6ML45O-TBIgTtMN4JD4ysVpYm1ByGAKOarvA5FHY3PodI-IAgqwfgAWgSsQIoSaqPyqJsmMci9YevdrAtvWRadAO0b7XPRyIBYKNfKSNP4PBZRF-WIffylRusGlnEadjG1WG2QJmzSgyU9WNLDiB2sBOZLgo2_P_qZ7LJ6jJix041Zf2OHQLPRyAZBDihCes5ViCBLpWIotJdQRVzgPlrV3ro2ydP1ZmZve4v1w5k1paFe4RE7TKb814rs-OIL5v5Ci3f_LbHDNgqq3dOOznu2vuh_hF32zP1ctHf9Xtob2EvO_ACP2PKh
linkProvider Wiley-Blackwell
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1Lb9QwEB6VggQceCOWFogQBy6mTuLY8bG0W-2Kdg9oQb1Zjh8ldJVdhQWp_54Z73bVIiGE1FOkKLaseeT7xsl8BnhnqcGxioFJySNDvOasrqRnwdnghM2dLH06bEJNJvXpqb7aC7PSh9hsuFFmpPc1JThtSFOWC4Ql8uKyb7_Tz1k1wzAUt-C2kMjfqatkPNkUXfQhkIoujFsmhSxX8j40xd4fE1xDpiTgj3jT9fE6bU24c_TwJlb8CB6sWWe2vwqTx7AVuidw_4oW4VNgh3Zps28tYVnWdtmCYsrOZhcZxnF_sUBmmo2GXw8yatybP4MvR8PpwYitz1JgDhGHM9v4SkahY-0t55ZU5qu8DkUdtc9tpXxAHlRa7YNVPGARUpS21jKPqmmSiNxz2O7mXXgBWXTcKt8on_NGBKRDuZJa6MbnsYiqKAfw4dKOxq2Fxum8i5nBgoMsYZIdDNnBkB0G8H4zYLHS2Pj7ox_JMZvHSBw73Zj3Z2adayZq0SDPsZLInnMVkshSyhgK5YWtIi7wLbrVnLs2jafr2dyc9wZLiLHRpaZ24QHsJV_-a0VmOP2M8F8o_vK_R7yBu6PpybE5Hk8-7cC9gkr5tMGzC9vL_md4BXfcr2X7o3-dYvo3ROP13A
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1ba9RAFD7UKlIf6p2utRrEB1_GTpLJTOaxl126KItIlb4Nk7nU2CW7xFXov_ec2XVpBZFCnwIhMwznku87k5xvAN5aanCsYmBS8sgQrzmrK-lZcDY4YXMnS58Om1CTSX12pq_2wiz1IdYbbpQZ6X1NCR7mPlKWC4Ql8uKib7_Tz1k1wzAUd-CukAiA1FUynqyLLvoQSEUXxi2TQpZLeR-aYv-vCa4hUxLwR7zp-nidtibcGT28jRU_gu0V68wOlmHyGDZC9wQeXNEifArs2C5s9q0lLMvaLptTTNnp9DLDOO4v58hMs5Ph16OMGvdmz-DLaHh6dMJWZykwh4jDmW18JaPQsfaWc0sq81Veh6KO2ue2Uj4gDyqt9sEqHrAIKUpba5lH1TRJRO45bHazLuxAFh23yjfK57wRAelQrqQWuvF5LKIqygG8_2NH41ZC43TexdRgwUGWMMkOhuxgyA4DeLceMF9qbPz70UNyzPoxEsdON2b9uVnlmolaNMhzrCSy51yFJLKUMoZCeWGriAt8g241F65N4-l6PjMXvcESYmx0qaldeAD7yZf_W5EZnn5G-C8Uf3HjEa_h_qfjkfk4nnzYha2CKvm0v_MSNhf9z7AH99yvRfujf5VC-jfDivVO
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Data+hiding+in+partially+encrypted+HEVC+video&rft.jtitle=ETRI+journal&rft.au=Xu%2C+Dawen&rft.date=2020-06-01&rft.issn=1225-6463&rft.eissn=2233-7326&rft.volume=42&rft.issue=3&rft.spage=446&rft.epage=458&rft_id=info:doi/10.4218%2Fetrij.2018-0484&rft.externalDBID=n%2Fa&rft.externalDocID=10_4218_etrij_2018_0484
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1225-6463&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1225-6463&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1225-6463&client=summon