16 October 2014 Efficient reversible data hiding in encrypted H.264/AVC videos
Dawen Xu, Rangding Wang
Author Affiliations +
Abstract
Due to the security and privacy-preserving requirements for cloud data management, it is sometimes desired that video content is accessible in an encrypted form. Reversible data hiding in the encrypted domain is an emerging technology, as it can perform data hiding in encrypted videos without decryption, which preserves the confidentiality of the content. Furthermore, the original cover can be losslessly restored after decryption and data extraction. An efficient reversible data hiding scheme for encrypted H.264/AVC videos is proposed. During H.264/AVC encoding, the intraprediction mode, motion vector difference, and the sign bits of the residue coefficients are encrypted using a standard stream cipher. Then, the data-hider who does not know the original video content, may reversibly embed secret data into the encrypted H.264/AVC video by using a modified version of the histogram shifting technique. A scale factor is utilized for selecting the embedding zone, which is scalable for different capacity requirements. With an encrypted video containing hidden data, data extraction can be carried out either in the encrypted or decrypted domain. In addition, real reversibility is realized so that data extraction and video recovery are free of any error. Experimental results demonstrate the feasibility and efficiency of the proposed scheme.
© 2014 SPIE and IS&T 0091-3286/2014/$25.00 © 2014 SPIE and IS&T
Dawen Xu and Rangding Wang "Efficient reversible data hiding in encrypted H.264/AVC videos," Journal of Electronic Imaging 23(5), 053022 (16 October 2014). https://doi.org/10.1117/1.JEI.23.5.053022
Published: 16 October 2014
Lens.org Logo
CITATIONS
Cited by 25 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Video

Data hiding

Video compression

Video surveillance

Image encryption

Computer security

Computer programming

Back to Top