References
- M. Usman, M. A. Jan, and X. J. He, Cryptography-based secure data storage and sharing using HEVC and public clouds, Inf. Sci. 387 (2017), 90-102. https://doi.org/10.1016/j.ins.2016.08.059
- B. Zhao, W. D. Kou, and H. Li, Effective watermarking scheme in the encrypted domain for buyer-seller watermarking protocol, Inf. Sci. 180 (2010), 4672-4684. https://doi.org/10.1016/j.ins.2010.08.003
- J. T. Guo, P. J. Zheng, and J. W. Huang, Secure watermarking scheme against watermark attacks in the encrypted domain, J. Vis. Commun. Image Represent. 30 (2015), 125-135. https://doi.org/10.1016/j.jvcir.2015.03.009
- A. V. Subramanyam, S. Emmanuel, and M. S. Kankanhalli, Robust watermarking of compressed and encrypted JPEG2000 images, IEEE Trnas. Multimedia 14 (2012), no. 3, 703-716. https://doi.org/10.1109/TMM.2011.2181342
- H. Liu et al., Robust and hierarchical watermarking of encrypted images based on compressive sensing, Signal Process. Image Commun. 45 (2016), 41-51. https://doi.org/10.1016/j.image.2016.04.002
- S. J. Xiang and J. Y. He, Database authentication watermarking scheme in encrypted domain, IET Inf. Secur. 12 (2018), no. 1, 42-51. https://doi.org/10.1049/iet-ifs.2017.0092
- R. M. Rad, K. S. Wong, and J. M. Guo, A unified data embedding and scrambling method, IEEE Trans. Image Process 23 (2014), no. 4, 1463-1475. https://doi.org/10.1109/TIP.2014.2302681
- X. P. Zhang, Separable reversible data hiding in encrypted image, IEEE Trans. Inf. Forensics Secur. 7 (2012), no. 2, 826-832. https://doi.org/10.1109/TIFS.2011.2176120
- F. J. Huang, J. W. Huang, and Y. Q. Shi, New framework for reversible data hiding in encrypted domain, IEEE Trans. Inf. Forensics Secur. 11 (2016), no. 12, 2777-2789. https://doi.org/10.1109/TIFS.2016.2598528
- X. C. Cao et al., High capacity reversible data hiding in encrypted images by patch-level sparse representation, IEEE Trans. Cybernetics 46 (2016), no. 5, 1132-1143. https://doi.org/10.1109/TCYB.2015.2423678
- Z. X. Qian and X. P. Zhang, Reversible data hiding in encrypted images with distributed source encoding, IEEE Trans. Circ. Syst. Vid. 26 (2016), no. 4, 636-646. https://doi.org/10.1109/TCSVT.2015.2418611
- D. W. Xu and R. D. Wang, Separable and error-free reversible data hiding in encrypted images, Signal Process. 123 (2016), 9-21. https://doi.org/10.1016/j.sigpro.2015.12.012
- S. G. Lian, Z. X. Liu, and Z. Ren, Commutative encryption and watermarking in video compression, IEEE Trans. Circ. Syst. Vid. 17 (2007), no. 6, 774-778. https://doi.org/10.1109/TCSVT.2007.896635
- D. W. Xu, R. D. Wang, and Y. Q. Shi, Data hiding in encrypted H.264/AVC video streams by codeword substitution, IEEE Trans. Inf. Forensics Secur. 9 (2014), no. 4, 596-606. https://doi.org/10.1109/TIFS.2014.2302899
- D. W. Xu, R. D. Wang, and Y. Q. Shi, An improved scheme for data hiding in encrypted H.264/AVC videos, J. Vis. Commun. Image Represent. 36 (2016), 229-242. https://doi.org/10.1016/j.jvcir.2016.02.002
- D. W. Xu and R. D. Wang, Context adaptive binary arithmetic coding-based data hiding in partially encrypted H.264/AVC videos, J. Electronic Imaging. 24 (2015), no. 3, 033028:1-13.
- D. W. Xu, R. D. Wang, and Y. N. Zhu, Tunable data hiding in partially encrypted H.264/AVC videos, J. Vis. Commun. Image Represent. 45 (2017), 34-45. https://doi.org/10.1016/j.jvcir.2017.02.008
- D. W. Xu and R. D. Wang, Efficient reversible data hiding in encrypted H.264/AVC videos, J. Electronic Imaging. 23 (2014), no. 5, 053022:1-14.
- Y. Z. Yao, W. M. Zhang, and N. H. Yu, Inter-frame distortion drift analysis for reversible data hiding in encrypted H.264AVC Video bitstreams, Signal Process. 128 (2016), 531-545. https://doi.org/10.1016/j.sigpro.2016.05.004
- M. Long, F. Peng, and H. Y. Li, Separable reversible data hiding and encryption for HEVC Video, J. Real-Time Image Process. 14 (2018), no. 1, 171-182. https://doi.org/10.1007/s11554-017-0727-y
- D. Marpe, H. Schwarz, and T. Wiegand, Context-based adaptive binary arithmetic coding in the H.264/AVC video, compression standard, IEEE Trans. Circ. Syst. Vid. 13 (2003), no. 7, 620-636. https://doi.org/10.1109/TCSVT.2003.815173
- Z. Shahid, M. Chaumont, and W. Puech, Fast protection of H.264/AVC by selective encryption of CAVLC and CABAC for I and P frames, IEEE Trans. Circ. Syst. Vid. 21 (2011), no. 5, 565-576. https://doi.org/10.1109/TCSVT.2011.2129090
- Y. S. Wang, M. O. Neill, and F. Kurugollu, A tunable encryption scheme and analysis of fast selective encryption for CAVLC and CABAC in H.264/AVC, IEEE Trans. Circ. Syst. Vid. 23 (2013), no. 9, 1476-1490. https://doi.org/10.1109/TCSVT.2013.2248588
- B. Boyadjis et al., Extended selective encryption of H.264/AVC (CABAC) and HEVC encoded video streams, IEEE Trans. Circ. Syst. Vid. 27 (2017), no. 4, 892-906. https://doi.org/10.1109/TCSVT.2015.2511879
- A. Sallam, O. Faragallah, and E. EL-Rabaie, HEVC selective encryption using RC6 block cipher technique, IEEE Trans. Multimedia. 20 (2018), no. 7, 1636-1644. https://doi.org/10.1109/TMM.2017.2777470
- J. Sole et al., Transform coefficient coding in HEVC, IEEE Trans. Circ. Syst. Vid. 22 (2012), no. 12, 1765-1777. https://doi.org/10.1109/TCSVT.2012.2223055
- HEVC Reference Software HM 12.0 [Online]. Available https://hevc.hhi.fraunhofer.de/trac/hevc/browser/tags [last accessed Oct. 2018].
- D. W. Xu, R. D. Wang, and J. C. Wang, Prediction mode modulated data-hiding algorithm for H.264/AVC, J. Real-Time Image Process. 7 (2012), no. 4, 205-214. https://doi.org/10.1007/s11554-010-0175-4
- V. Sze and M. Budagavi, High throughput CABAC entropy coding in HEVC, IEEE Trans. Circ. Syst. Vid. 22 (2012), no. 12, 1778-1791. https://doi.org/10.1109/TCSVT.2012.2221526
Cited by
- Genuine Reversible Data Hiding Technique for H.264 Bitstream Using Multi-Dimensional Histogram Shifting Technology on QDCT Coefficients vol.10, pp.18, 2020, https://doi.org/10.3390/app10186410
- A selective encryption for H.264/AVC videos based on scrambling vol.80, pp.2, 2020, https://doi.org/10.1007/s11042-020-09654-3