Skip to main content

A Robust Reversible Data Hiding Scheme for H.264 Based on Secret Sharing

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 8588))

Abstract

This paper proposes a robust reversible data hiding scheme in H.264. We divide the original video into several groups by using the secret sharing technique to improve the robustness of the embedded data. Then we embed the embedded data into the coefficients of the 4 × 4 discrete cosine transform (DCT) block of the selected frames which meet our conditions to avert the distortion drift. The experimental results show that this new robust reversible data hiding algorithm can get more robustness, effectively avert intra-frame distortion drift.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Barton, J.: Method and apparatus for embedding authentication information within digital data. U.S. Patent 5 646 997 (1997)

    Google Scholar 

  2. Tian, J.: Reversible data embedding using a difference expansion. IEEE Trans. Circuits Syst. Video Technol. 13(8), 890–896 (2003)

    Article  Google Scholar 

  3. Ni, Z.C., Shi, Y.Q., Ansari, N., Su, W.: Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol. 16(3), 354–362 (2006)

    Article  Google Scholar 

  4. Hu, Y.J., Heung-K., L., Li, J.W.: DE-based reversible data hiding with improved overflow location map. IEEE Trans. Circuits Syst. Video Technol. 19(2), 250–260 (2009)

    Article  Google Scholar 

  5. Fridrich, J., Goljan, M., Du, R.: Invertible authentication watermark for JPEG images. In: Proc. of the International Conference on Information Technology: Coding and Computing, pp. 223–227 (2001)

    Google Scholar 

  6. Rui, D., Fridrich, J.: Lossless authentication of MPEG-2 video. In: Proc. of the Internationa Conference on Image Processing, vol. 2, pp. 893–896 (2002)

    Google Scholar 

  7. Chen, H., Chen, Z.Y., Zeng, X., Fan, W., Xiong, Z.: A novel reversible semi-fragile watermarking algorithm of MPEG-4 video for content authentication. In: Proc. of the Second International Symposium on Intelligent Information Technology Application, vol. 3, pp. 37–41 (2008)

    Google Scholar 

  8. Zeng, X., Chen, Z.Y., Xiong, Z.: Issues and solution on distortion drift in reversible video data hiding. Multimed. Tools Appl. 52, 465–484 (2011)

    Article  Google Scholar 

  9. Richardson, I.E.G.: H.264 and MPEG-4 video compression: video coding for next-generation multimedia. Wiley, U.K. (2003)

    Book  Google Scholar 

  10. Piva, A., Caldelli, R., Filippini, F.: Data hiding for error concealment in H.264/AVC. In: IEEE. MMSP 2004, Siena, Italy, pp. 199–202 (2004)

    Google Scholar 

  11. Lie, W.N., Lin, T.C., Tsai, D.C., et al.: Error Resilient Coding Based on Reversible Data Embedding Technique for H.264/AVC Video. In: IEEE International Conference on Multimedia and Expo (2005)

    Google Scholar 

  12. Lin, S.D., Meng, H.C., Su, Y.L.: A novel error resilience using reversible data embedding in H.264/AVC. In: International Conference on Information, Communications and Signal Processing, ICICS 2007, Singapore, pp. 1–5 (2007)

    Google Scholar 

  13. Liu, Y.X., Ma, X.J., Li, Z.T.: A Reversible Data Hiding Scheme Based on H.264/AVC without Distortion Drift. Journal of Software 7(5), 1059–1065 (2012)

    Article  MathSciNet  Google Scholar 

  14. Wu, Y.S., Thien, C.C., Lin, J.C.: Sharing and hiding secret images with size constraint. Pattern Recognition 37(7), 1377–1385 (2004)

    Article  Google Scholar 

  15. Chang, C.C., Lin, C.Y., Tseng, C.S.: Secret image hiding and sharing based on the (t, n)-threshold. Fundamenta Informaticae 73, 1–13 (2006)

    MathSciNet  Google Scholar 

  16. Hartung, F., Girod, B.: Watermarking of uncompressed and compressed video. Signal Process. 66(3), 283–301 (1998)

    Article  MATH  Google Scholar 

  17. Winne, D., Knowles, H., Bull, D., Canagarajah, C.: Spatial digital watermark for MPEG-2 video authentication and tamper detection. In: Proc. of International Conference on Acoustics, Speech, and Signal Processing (ICASSP), vol. 1(4), pp. 3457–3460 (2002)

    Google Scholar 

  18. Alattar, A., Lin, E., Celik, M.: Digital watermarking of low bit-rate advanced simple profile MPEG-4 compressed video. IEEE Trans. Circuits Syst. Video Technol. 13(8), 787–800(2003)

    Google Scholar 

  19. Biswas, S., Das, S., Petriu, E.: An adaptive compressed MPEG-2 video watermarking scheme. IEEE Trans. Instrum. Meas. 54(5), 1853–1861 (2005)

    Article  Google Scholar 

  20. Chen, C., Gao, T.G., Li, L.Z.: A compressed video watermarking scheme with temporal synchronization. In: Proc. of the Congress on Image and Signal Processing (CISP), pp. 605–612 (2008)

    Google Scholar 

  21. Ma, X.J., Li, Z.T., Tu, H., Zhang, B.C.: A data hiding algorithm for H.264/AVC video streams Without Intraframe Distortion Drift. IEEE Trans. Circuits and Systems for Video Technology 20(10), 1320–1330 (2010)

    Article  Google Scholar 

  22. Wang, X.F., Huang, D.S., Xu, H.: An efficient local Chan-Vese model for image segmentation. Pattern Recognition 43(3), 603–618 (2010)

    Article  MATH  Google Scholar 

  23. Huang, D.S., Du, J.X.: A constructive hybrid structure optimization methodology for radial basis probabilistic neural networks. IEEE Transactions on Neural Networks 19(12), 2099–2115 (2008)

    Article  Google Scholar 

  24. Huang, D.S.: Radial basis probabilistic neural networks: Model and application. International Journal of Pattern Recognition and Artificial Intelligence 13(7), 1083–1101 (1999)

    Article  Google Scholar 

  25. Wang, X.F., Huang, D.S.: A novel density-based clustering framework by using level set method. IEEE Transactions on Knowledge and Data Engineering 21(11), 1515–1531 (2009)

    Article  Google Scholar 

  26. Huang, D.S., Mi, J.X.: A new constrained independent component analysis method. IEEE Trans. on Neural Networks 18(5), 1532–1535 (2007)

    Article  Google Scholar 

  27. Li, B., Huang, D.S., Wang, C., Liu, K.H.: Feature extraction using constrained maximum variance mapping. Pattern Recognition 41(11), 3287–3294 (2008)

    Article  MATH  Google Scholar 

  28. Du, J.X., Huang, D.S., Wang, X.F., Gu, X.: Shape recognition based on neural networks trained by differential evolution algorithm. Neurocomputing 70(4-6), 896–903 (2007)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Liu, Y., Jia, S., Hu, M., Jia, Z., Chen, L., Zhao, H. (2014). A Robust Reversible Data Hiding Scheme for H.264 Based on Secret Sharing. In: Huang, DS., Bevilacqua, V., Premaratne, P. (eds) Intelligent Computing Theory. ICIC 2014. Lecture Notes in Computer Science, vol 8588. Springer, Cham. https://doi.org/10.1007/978-3-319-09333-8_61

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-09333-8_61

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-09332-1

  • Online ISBN: 978-3-319-09333-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics