Data Hiding in AVI Video Files Using Multivariate Regression and Flexible Macro block Ordering

Authors(3) :-Siva Kumar L, Singara Srikanth, Nathiya Devi P

The H.264/AVC standard gives a few new slip flexible peculiarities to empower the dependable transmission of compacted feature motions over lossy bundle systems. Adaptable Macroblock Ordering (FMO) is a standout amongst the most fascinating strong peculiarities inside the H.264/AVC standard. Dissimilar to previous principles, in which cuts were built out of sequential raster check macroblocks, FMO recommends new cuts made out of spatially appropriated Macroblocks (MBs), and sorted out in a stirred up style. H.264/AVC points out seven sorts of FMO. The standard characterizes additionally an unequivocal FMO (Type 6), which permits expressly task of every MB inside the casing to any accessible cut gatherings. Subsequently new FMO sorts can be utilized and incorporated into H264/AVC without disregarding the standard. In this paper we propose another Explicit Chessboard-Wipe (ECW) Flexible Macroblocks Ordering (FMO) method, which beats all other FMO sorts. The new ECW requesting results in compelling blunder dissipating which augments the quantity of accurately got macroblocks placed around debased macroblocks, prompting better mistake disguise. Execution assessments show that the proposed Explicit FMO methodology beats all the FMO sorts. Both subjective and target visual quality similar study has been likewise completed keeping in mind the end goal to approve the proposed methodology.

Authors and Affiliations

Siva Kumar L
CSE, Dhanalakshmi College of Engineering, Chennai, Tamilnadu, India
Singara Srikanth
CSE, Dhanalakshmi College of Engineering, Chennai, Tamilnadu, India
Nathiya Devi P
CSE, Dhanalakshmi College of Engineering, Chennai, Tamilnadu, India

Data shuffle,Encrypted data,Information hiding,Data embedding,Decrypted data,Deshuffle data.

 [1] T. Wiegand, G. J. Sullivan, G. Bjontegaard, and A. Luthra, “Overview of the H.264/AVC video coding standard,” IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 7, pp. 560–576, Jul. 2003.

[2] G. J. Sullivan, J. Ohm, W.-J. Han, and T. Wiegand, “Overview of the High Efficiency Video Coding (HEVC) standard,” IEEE Trans. Circuits Syst. Video Technol., vol. 22, no. 12, pp. 1649–1668, Dec. 2012.

[3] I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker, Digital

Watermarking and Steganography, 2nd ed. San Francisco, CA, USA: Morgan Kaufmann Publishers Inc., 2008, ch. 3.

[4] A. Khan, S. A. Malik, A. Ali, R. Chamlawi, M. Hussain, M. T.

Mahmood, and I. Usman, “Intelligent reversible watermarking and authentication: Hiding depth map information for 3D cameras,” Inform. Sci., vol. 216, pp. 155–175, Dec. 2012.

[5] S. Bhattacharya, T. Chattopadhyay, and A. Pal, “A survey on different video watermarking techniques and comparative analysis with reference to H.264/AVC,” in IEEE 10th Int. Symp. on Consumer Electron., 2006, pp. 1–6.

[6] A. Alattar, E. Lin, and M. Celik, “Digital watermarking of low bitrate advanced simple profile MPEG-4 compressed video,” IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 787–800, Aug. 2003.

[7] M. Stamm, W. Lin, and K. Liu, “Temporal forensics and anti-forensics for motion compensated video,” IEEE Trans. Inf. Forensics Security, vol. 7, no. 4, pp. 1315–1329, Aug. 2012.

[8] O. Cetin and A. T. Ozcerit, “A new steganography algorithm based on color histograms for data embedding into raw video streams,” Comput. & Security, vol. 28, no. 7, pp. 670–682, Oct. 2009.

[9] A. Cheddad, J. Condell, K. Curran, and P. M. Kevitt, “Digital image steganography: Survey and analysis of current methods,” Signal Process., vol. 90, no. 3, pp. 727–752, Mar. 2010.

[10] I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker, Digital Watermarking and Steganography, 2nd ed. San Francisco, CA, USA: Morgan Kaufmann Publishers Inc., 2008, ch. Steganography.

[11] C. Adsumilli, S. Mitra, T. Oh, and Y. Kim, “Error concealment in video commun. by informed watermarking,” in Advances in Image and Video Technol., ser. Lecture Notes in Comput. Sci., L.-W. Chang and W.-N.

[12] K.-L. Chung, Y.-H. Huang, P.-C. Chang, and H.-Y. Liao, “Reversible data hiding-based approach for intra-frame error concealment in H.264/AVC,” IEEE Trans. Circuits Syst. Video Technol., vol. 20, no. 11, pp. 1643–1647, Nov. 2010.

[13] D. Stanescu, M. Stratulat, B. Ciubotaru, D. Chiciudean, R. Cioarga, and M. Micea, “Embedding data in video stream using steganography,” in 4th Int. Symp. on Applied Computational Intelligence and Informatics, pp. 241–244, May 2007.

[14] D. Mukherjee, J. J. Chae, and S. Mitra, “A source and channel coding approach to data hiding with application to hiding speech in video,” in Int. Conference on Image Process., vol. 1, pp. 348–352, Oct. 1998.

[15] J. K. Su, F. Hartung, and B. Girod, “Digital watermarking of text, image, and video documents,” Comput. & Graphics, vol. 22, no. 6, pp. 687–695, Dec. 1998.

[16] F. Petitcolas, R. Anderson, and M. Kuhn, “Information hiding–a survey,” Proc. IEEE, vol. 87, no. 7, pp. 1062–1078, Jul. 1999.

[17] H. Kayarkar and S. Sanyal, “A survey on various data hiding techniques and their comparative analysis,” ACTA Technica Corviniensis:Cryptography and Security, vol. 5, pp. 35–40, Jul.-Sep. 2012.

[18] E. Lin, A. Eskicioglu, R. Lagendijk, and E. Delp, “Advances in digital video content protection,” Proc. IEEE, vol. 93, no. 1, pp. 171–183, Jan. 2005.

[19] T. Stutz and A. Uhl, “A survey of H.264 AVC/SVC encryption,” IEEE  Trans. Circuits Syst. Video Technol., vol. 22, no. 3, pp. 325–339, Mar. 2012.

[20] ISO, “Information technology – Coding of audio-visual objects – Part 1: Systems,” Int. Organization for Standardization, Geneva, Switzerland, ISO/IEC 14496-1:2010, 2010.

[21] G. Yang, J. Li, Y. He, and Z. Kang, “An information hiding algorithm based on intra-prediction modes and matrix coding for H.264/AVC video stream,” AEU - Int. J. of Electron. and Commun., vol. 65, no. 4, pp. 331–337, Apr. 2011.

[22] T. Wedi, “Adaptive interpolation filter for motion compensated prediction,” in Int. Conference on Image Process., vol. 2, 2002, pp. 509–512.

[23] P. List, A. Joch, J. Lainema, G. Bjontegaard, and M. Karczewicz, “Adaptive deblocking filter,” IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 7, pp. 614–619, Jul. 2003.

[24] T. Shanableh, “Data hiding in MPEG video files using multivariate regression and flexible macroblock ordering,” IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 455–464, Apr. 2012.

[25] G. J. Sullivan, T. Wiegand, and P. Corporation, “Rate-distortion optimization for video compression,” IEEE Signal Process. Mag., vol. 15, pp. 74–90, Nov. 1998.

[26] G. Bjontegaard and K. Lillevold, “Context-adaptive VLC (CAVLC) coding of coefficients,” JVT-C028, 3rd Meeting: Fairfax, Virginia, USA, May 2002.

[27] D. Marpe, H. Schwarz, and T.Wiegand, “Context-based adaptive binary arithmetic coding in the H.264/AVC video compression standard,” IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 7, pp. 620–636, Jul. 2003.

[28] J. Mielikainen, “LSB matching revisited,” IEEE Signal Process. Lett., vol. 13, no. 5, pp. 285–287, May 2006.

[29] X. Li, B. Yang, D. Cheng, and T. Zeng, “A generalization of LSB matching,” IEEE Signal Process. Lett., vol. 16, no. 2, pp. 69–72, Feb. 2009.

[30] R.-Z. Wang, C.-F. Lin, and J.-C. Lin, “Image hiding by optimal LSB substitution and genetic algorithm,” Pattern Recognition, vol. 34, no. 3, pp. 671–683, Mar. 2001.

[31] C.-K. Chan and L. Cheng, “Hiding data in images by simple LSB substitution,” Pattern Recognition, vol. 37, no. 3, pp. 469–474, Mar. 2004.

[32] S. Kapotas and A. Skodras, “Real time data hiding by exploiting the IPCM macroblocks in H.264/AVC streams,” J. of Real-Time Image Process., vol. 4, pp. 33–41, Oct. 2009.

[33] Y.-H. Yu, C.-C. Chang, and Y.-C. Hu, “Hiding secret data in images via predictive coding,” Pattern Recognition, vol. 38, no. 5, pp. 691–705, Sep. 2005.

[34] I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Trans. Image Process., vol. 6, no. 12, pp. 1673–1687, Dec. 1997.

[35] L. M. Marvel, C. G. B. Jr., and C. T. Retter, “Spread spectrum image steganography,” IEEE Trans. Image Process., vol. 8, pp. 1075–1083, Aug. 1999.

[36] U. Budhia, D. Kundur, and T. Zourntos, “Digital video steganalysis exploiting statistical visibility in the temporal domain,” IEEE Trans. Inf. Forensics Security, vol. 1, no. 4, pp. 502–516, Dec. 2006.

[37] V. P., G. Doerr, and P. K. Bora, “Assessing motion-coherency in video watermarking,” in Proc. of the 8th workshop on Multimedia and security, ser. MM&Sec ’06. New York, NY, USA: ACM, 2006, pp. 114–119.

[38] A. Valizadeh and Z. Wang, “Correlation-and-bit-aware spread spectrum embedding for data hiding,” IEEE Trans. Inf. Forensics Security, vol. 6, no. 2, pp. 267–282, Jun. 2011.

[39] Z. Ni, Y.-Q. Shi, N. Ansari, and W. Su, “Reversible data hiding,” IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354–362, Mar. 2006.

[40] Z.-H. Wang, C.-F. Lee, and C.-Y. Chang, “Histogram-shifting-imitated reversible data hiding,” J. of Syst. and Software, vol. 86, no. 2, pp. 315–323, Feb. 2013.

[41] C. De Vleeschouwer, J.-F. Delaigle, and B. Macq, “Circular interpretation of bijective transformations in lossless watermarking for media asset management,” IEEE Trans. Multimedia, vol. 5, no. 1, pp. 97–105, Mar. 2003.

[42] Z. Zhao, H. Luo, Z.-M. Lu, and J.-S. Pan, “Reversible data hiding based on multilevel histogram modification and sequential recovery,” AEU - Int. J. of Electron. and Commun., vol. 65, no. 10, pp. 814–826, Oct. 2011.

[43] S. Ong, K. Wong, and K. Tanaka, “Reversible data embedding using reflective blocks with scalable visual quality degradation,” in 8th Int. Conference on Intell. Inform. Hiding and Multimedia Signal Process., pp. 363 –366, Jul. 2012.

[44] S. Kapotas, E. Varsaki, and A. Skodras, “Data hiding in H.264 encoded video sequences,” in IEEE 9th Workshop on Multimedia Signal Process., pp. 373–376, Oct. 2007.

[45] K. Wong and K. Tanaka, “DCT based scalable scrambling method with reversible data hiding functionality,” in 4th Int. Symp. on Commun., Control and Signal Process., pp. 1–4, Mar. 2010.

Publication Details

Published in : Volume 1 | Issue 2 | March-April 2015
Date of Publication : 2015-04-25
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 66-70
Manuscript Number : IJSRSET152226
Publisher : Technoscience Academy

Print ISSN : 2395-1990, Online ISSN : 2394-4099

Cite This Article :

Siva Kumar L, Singara Srikanth, Nathiya Devi P, " Data Hiding in AVI Video Files Using Multivariate Regression and Flexible Macro block Ordering, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 1, Issue 2, pp.66-70, March-April-2015. Citation Detection and Elimination     |     
Journal URL : https://ijsrset.com/IJSRSET152226

Article Preview