Abstract
This paper proposes a robust reversible data hiding scheme in H.264. We divide the original video into several groups by using the secret sharing technique to improve the robustness of the embedded data. Then we embed the embedded data into the coefficients of the 4 × 4 discrete cosine transform (DCT) block of the selected frames which meet our conditions to avert the distortion drift. The experimental results show that this new robust reversible data hiding algorithm can get more robustness, effectively avert intra-frame distortion drift.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Barton, J.: Method and apparatus for embedding authentication information within digital data. U.S. Patent 5 646 997 (1997)
Tian, J.: Reversible data embedding using a difference expansion. IEEE Trans. Circuits Syst. Video Technol. 13(8), 890–896 (2003)
Ni, Z.C., Shi, Y.Q., Ansari, N., Su, W.: Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol. 16(3), 354–362 (2006)
Hu, Y.J., Heung-K., L., Li, J.W.: DE-based reversible data hiding with improved overflow location map. IEEE Trans. Circuits Syst. Video Technol. 19(2), 250–260 (2009)
Fridrich, J., Goljan, M., Du, R.: Invertible authentication watermark for JPEG images. In: Proc. of the International Conference on Information Technology: Coding and Computing, pp. 223–227 (2001)
Rui, D., Fridrich, J.: Lossless authentication of MPEG-2 video. In: Proc. of the Internationa Conference on Image Processing, vol. 2, pp. 893–896 (2002)
Chen, H., Chen, Z.Y., Zeng, X., Fan, W., Xiong, Z.: A novel reversible semi-fragile watermarking algorithm of MPEG-4 video for content authentication. In: Proc. of the Second International Symposium on Intelligent Information Technology Application, vol. 3, pp. 37–41 (2008)
Zeng, X., Chen, Z.Y., Xiong, Z.: Issues and solution on distortion drift in reversible video data hiding. Multimed. Tools Appl. 52, 465–484 (2011)
Richardson, I.E.G.: H.264 and MPEG-4 video compression: video coding for next-generation multimedia. Wiley, U.K. (2003)
Piva, A., Caldelli, R., Filippini, F.: Data hiding for error concealment in H.264/AVC. In: IEEE. MMSP 2004, Siena, Italy, pp. 199–202 (2004)
Lie, W.N., Lin, T.C., Tsai, D.C., et al.: Error Resilient Coding Based on Reversible Data Embedding Technique for H.264/AVC Video. In: IEEE International Conference on Multimedia and Expo (2005)
Lin, S.D., Meng, H.C., Su, Y.L.: A novel error resilience using reversible data embedding in H.264/AVC. In: International Conference on Information, Communications and Signal Processing, ICICS 2007, Singapore, pp. 1–5 (2007)
Liu, Y.X., Ma, X.J., Li, Z.T.: A Reversible Data Hiding Scheme Based on H.264/AVC without Distortion Drift. Journal of Software 7(5), 1059–1065 (2012)
Wu, Y.S., Thien, C.C., Lin, J.C.: Sharing and hiding secret images with size constraint. Pattern Recognition 37(7), 1377–1385 (2004)
Chang, C.C., Lin, C.Y., Tseng, C.S.: Secret image hiding and sharing based on the (t, n)-threshold. Fundamenta Informaticae 73, 1–13 (2006)
Hartung, F., Girod, B.: Watermarking of uncompressed and compressed video. Signal Process. 66(3), 283–301 (1998)
Winne, D., Knowles, H., Bull, D., Canagarajah, C.: Spatial digital watermark for MPEG-2 video authentication and tamper detection. In: Proc. of International Conference on Acoustics, Speech, and Signal Processing (ICASSP), vol. 1(4), pp. 3457–3460 (2002)
Alattar, A., Lin, E., Celik, M.: Digital watermarking of low bit-rate advanced simple profile MPEG-4 compressed video. IEEE Trans. Circuits Syst. Video Technol. 13(8), 787–800(2003)
Biswas, S., Das, S., Petriu, E.: An adaptive compressed MPEG-2 video watermarking scheme. IEEE Trans. Instrum. Meas. 54(5), 1853–1861 (2005)
Chen, C., Gao, T.G., Li, L.Z.: A compressed video watermarking scheme with temporal synchronization. In: Proc. of the Congress on Image and Signal Processing (CISP), pp. 605–612 (2008)
Ma, X.J., Li, Z.T., Tu, H., Zhang, B.C.: A data hiding algorithm for H.264/AVC video streams Without Intraframe Distortion Drift. IEEE Trans. Circuits and Systems for Video Technology 20(10), 1320–1330 (2010)
Wang, X.F., Huang, D.S., Xu, H.: An efficient local Chan-Vese model for image segmentation. Pattern Recognition 43(3), 603–618 (2010)
Huang, D.S., Du, J.X.: A constructive hybrid structure optimization methodology for radial basis probabilistic neural networks. IEEE Transactions on Neural Networks 19(12), 2099–2115 (2008)
Huang, D.S.: Radial basis probabilistic neural networks: Model and application. International Journal of Pattern Recognition and Artificial Intelligence 13(7), 1083–1101 (1999)
Wang, X.F., Huang, D.S.: A novel density-based clustering framework by using level set method. IEEE Transactions on Knowledge and Data Engineering 21(11), 1515–1531 (2009)
Huang, D.S., Mi, J.X.: A new constrained independent component analysis method. IEEE Trans. on Neural Networks 18(5), 1532–1535 (2007)
Li, B., Huang, D.S., Wang, C., Liu, K.H.: Feature extraction using constrained maximum variance mapping. Pattern Recognition 41(11), 3287–3294 (2008)
Du, J.X., Huang, D.S., Wang, X.F., Gu, X.: Shape recognition based on neural networks trained by differential evolution algorithm. Neurocomputing 70(4-6), 896–903 (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Liu, Y., Jia, S., Hu, M., Jia, Z., Chen, L., Zhao, H. (2014). A Robust Reversible Data Hiding Scheme for H.264 Based on Secret Sharing. In: Huang, DS., Bevilacqua, V., Premaratne, P. (eds) Intelligent Computing Theory. ICIC 2014. Lecture Notes in Computer Science, vol 8588. Springer, Cham. https://doi.org/10.1007/978-3-319-09333-8_61
Download citation
DOI: https://doi.org/10.1007/978-3-319-09333-8_61
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-09332-1
Online ISBN: 978-3-319-09333-8
eBook Packages: Computer ScienceComputer Science (R0)