DOI QR코드

DOI QR Code

Data hiding in partially encrypted HEVC video

  • Xu, Dawen (School of Electronics and Information Engineering, Ningbo University of Technology)
  • Received : 2018.09.03
  • Accepted : 2019.10.01
  • Published : 2020.06.08

Abstract

In this study, an efficient scheme for hiding data directly in partially encrypted versions of high efficiency video coding (HEVC) videos is proposed. The content owner uses stream cipher to selectively encrypt some HEVC-CABAC bin strings in a format-compliant manner. Then, the data hider embeds the secret message into the encrypted HEVC videos using the specific coefficient modification technique. Consequently, it can be used in third-party computing environments (more generally, cloud computing). For security and privacy purposes, service providers cannot access the visual content of the host video. As the coefficient is only slightly modified, the quality of the decrypted video is satisfactory. The encrypted and marked bitstreams meet the requirements of format compatibility, and have the same bit rate. At the receiving end, data extraction can be performed in the encrypted domain or decrypted domain that can be adapted to different application scenarios. Several standard video sequences with different resolutions and contents have been used for experimental evaluation.

Keywords

References

  1. M. Usman, M. A. Jan, and X. J. He, Cryptography-based secure data storage and sharing using HEVC and public clouds, Inf. Sci. 387 (2017), 90-102. https://doi.org/10.1016/j.ins.2016.08.059
  2. B. Zhao, W. D. Kou, and H. Li, Effective watermarking scheme in the encrypted domain for buyer-seller watermarking protocol, Inf. Sci. 180 (2010), 4672-4684. https://doi.org/10.1016/j.ins.2010.08.003
  3. J. T. Guo, P. J. Zheng, and J. W. Huang, Secure watermarking scheme against watermark attacks in the encrypted domain, J. Vis. Commun. Image Represent. 30 (2015), 125-135. https://doi.org/10.1016/j.jvcir.2015.03.009
  4. A. V. Subramanyam, S. Emmanuel, and M. S. Kankanhalli, Robust watermarking of compressed and encrypted JPEG2000 images, IEEE Trnas. Multimedia 14 (2012), no. 3, 703-716. https://doi.org/10.1109/TMM.2011.2181342
  5. H. Liu et al., Robust and hierarchical watermarking of encrypted images based on compressive sensing, Signal Process. Image Commun. 45 (2016), 41-51. https://doi.org/10.1016/j.image.2016.04.002
  6. S. J. Xiang and J. Y. He, Database authentication watermarking scheme in encrypted domain, IET Inf. Secur. 12 (2018), no. 1, 42-51. https://doi.org/10.1049/iet-ifs.2017.0092
  7. R. M. Rad, K. S. Wong, and J. M. Guo, A unified data embedding and scrambling method, IEEE Trans. Image Process 23 (2014), no. 4, 1463-1475. https://doi.org/10.1109/TIP.2014.2302681
  8. X. P. Zhang, Separable reversible data hiding in encrypted image, IEEE Trans. Inf. Forensics Secur. 7 (2012), no. 2, 826-832. https://doi.org/10.1109/TIFS.2011.2176120
  9. F. J. Huang, J. W. Huang, and Y. Q. Shi, New framework for reversible data hiding in encrypted domain, IEEE Trans. Inf. Forensics Secur. 11 (2016), no. 12, 2777-2789. https://doi.org/10.1109/TIFS.2016.2598528
  10. X. C. Cao et al., High capacity reversible data hiding in encrypted images by patch-level sparse representation, IEEE Trans. Cybernetics 46 (2016), no. 5, 1132-1143. https://doi.org/10.1109/TCYB.2015.2423678
  11. Z. X. Qian and X. P. Zhang, Reversible data hiding in encrypted images with distributed source encoding, IEEE Trans. Circ. Syst. Vid. 26 (2016), no. 4, 636-646. https://doi.org/10.1109/TCSVT.2015.2418611
  12. D. W. Xu and R. D. Wang, Separable and error-free reversible data hiding in encrypted images, Signal Process. 123 (2016), 9-21. https://doi.org/10.1016/j.sigpro.2015.12.012
  13. S. G. Lian, Z. X. Liu, and Z. Ren, Commutative encryption and watermarking in video compression, IEEE Trans. Circ. Syst. Vid. 17 (2007), no. 6, 774-778. https://doi.org/10.1109/TCSVT.2007.896635
  14. D. W. Xu, R. D. Wang, and Y. Q. Shi, Data hiding in encrypted H.264/AVC video streams by codeword substitution, IEEE Trans. Inf. Forensics Secur. 9 (2014), no. 4, 596-606. https://doi.org/10.1109/TIFS.2014.2302899
  15. D. W. Xu, R. D. Wang, and Y. Q. Shi, An improved scheme for data hiding in encrypted H.264/AVC videos, J. Vis. Commun. Image Represent. 36 (2016), 229-242. https://doi.org/10.1016/j.jvcir.2016.02.002
  16. D. W. Xu and R. D. Wang, Context adaptive binary arithmetic coding-based data hiding in partially encrypted H.264/AVC videos, J. Electronic Imaging. 24 (2015), no. 3, 033028:1-13.
  17. D. W. Xu, R. D. Wang, and Y. N. Zhu, Tunable data hiding in partially encrypted H.264/AVC videos, J. Vis. Commun. Image Represent. 45 (2017), 34-45. https://doi.org/10.1016/j.jvcir.2017.02.008
  18. D. W. Xu and R. D. Wang, Efficient reversible data hiding in encrypted H.264/AVC videos, J. Electronic Imaging. 23 (2014), no. 5, 053022:1-14.
  19. Y. Z. Yao, W. M. Zhang, and N. H. Yu, Inter-frame distortion drift analysis for reversible data hiding in encrypted H.264AVC Video bitstreams, Signal Process. 128 (2016), 531-545. https://doi.org/10.1016/j.sigpro.2016.05.004
  20. M. Long, F. Peng, and H. Y. Li, Separable reversible data hiding and encryption for HEVC Video, J. Real-Time Image Process. 14 (2018), no. 1, 171-182. https://doi.org/10.1007/s11554-017-0727-y
  21. D. Marpe, H. Schwarz, and T. Wiegand, Context-based adaptive binary arithmetic coding in the H.264/AVC video, compression standard, IEEE Trans. Circ. Syst. Vid. 13 (2003), no. 7, 620-636. https://doi.org/10.1109/TCSVT.2003.815173
  22. Z. Shahid, M. Chaumont, and W. Puech, Fast protection of H.264/AVC by selective encryption of CAVLC and CABAC for I and P frames, IEEE Trans. Circ. Syst. Vid. 21 (2011), no. 5, 565-576. https://doi.org/10.1109/TCSVT.2011.2129090
  23. Y. S. Wang, M. O. Neill, and F. Kurugollu, A tunable encryption scheme and analysis of fast selective encryption for CAVLC and CABAC in H.264/AVC, IEEE Trans. Circ. Syst. Vid. 23 (2013), no. 9, 1476-1490. https://doi.org/10.1109/TCSVT.2013.2248588
  24. B. Boyadjis et al., Extended selective encryption of H.264/AVC (CABAC) and HEVC encoded video streams, IEEE Trans. Circ. Syst. Vid. 27 (2017), no. 4, 892-906. https://doi.org/10.1109/TCSVT.2015.2511879
  25. A. Sallam, O. Faragallah, and E. EL-Rabaie, HEVC selective encryption using RC6 block cipher technique, IEEE Trans. Multimedia. 20 (2018), no. 7, 1636-1644. https://doi.org/10.1109/TMM.2017.2777470
  26. J. Sole et al., Transform coefficient coding in HEVC, IEEE Trans. Circ. Syst. Vid. 22 (2012), no. 12, 1765-1777. https://doi.org/10.1109/TCSVT.2012.2223055
  27. HEVC Reference Software HM 12.0 [Online]. Available https://hevc.hhi.fraunhofer.de/trac/hevc/browser/tags [last accessed Oct. 2018].
  28. D. W. Xu, R. D. Wang, and J. C. Wang, Prediction mode modulated data-hiding algorithm for H.264/AVC, J. Real-Time Image Process. 7 (2012), no. 4, 205-214. https://doi.org/10.1007/s11554-010-0175-4
  29. V. Sze and M. Budagavi, High throughput CABAC entropy coding in HEVC, IEEE Trans. Circ. Syst. Vid. 22 (2012), no. 12, 1778-1791. https://doi.org/10.1109/TCSVT.2012.2221526

Cited by

  1. Genuine Reversible Data Hiding Technique for H.264 Bitstream Using Multi-Dimensional Histogram Shifting Technology on QDCT Coefficients vol.10, pp.18, 2020, https://doi.org/10.3390/app10186410
  2. A selective encryption for H.264/AVC videos based on scrambling vol.80, pp.2, 2020, https://doi.org/10.1007/s11042-020-09654-3