Data Hiding in AVI Video Files Using Multivariate Regression and Flexible Macro block Ordering
Keywords:
Data shuffle,Encrypted data,Information hiding,Data embedding,Decrypted data,Deshuffle data.Abstract
The H.264/AVC standard gives a few new slip flexible peculiarities to empower the dependable transmission of compacted feature motions over lossy bundle systems. Adaptable Macroblock Ordering (FMO) is a standout amongst the most fascinating strong peculiarities inside the H.264/AVC standard. Dissimilar to previous principles, in which cuts were built out of sequential raster check macroblocks, FMO recommends new cuts made out of spatially appropriated Macroblocks (MBs), and sorted out in a stirred up style. H.264/AVC points out seven sorts of FMO. The standard characterizes additionally an unequivocal FMO (Type 6), which permits expressly task of every MB inside the casing to any accessible cut gatherings. Subsequently new FMO sorts can be utilized and incorporated into H264/AVC without disregarding the standard. In this paper we propose another Explicit Chessboard-Wipe (ECW) Flexible Macroblocks Ordering (FMO) method, which beats all other FMO sorts. The new ECW requesting results in compelling blunder dissipating which augments the quantity of accurately got macroblocks placed around debased macroblocks, prompting better mistake disguise. Execution assessments show that the proposed Explicit FMO methodology beats all the FMO sorts. Both subjective and target visual quality similar study has been likewise completed keeping in mind the end goal to approve the proposed methodology.
References
[1] T. Wiegand, G. J. Sullivan, G. Bjontegaard, and A. Luthra, “Overview of the H.264/AVC video coding standard,†IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 7, pp. 560–576, Jul. 2003.
[2] G. J. Sullivan, J. Ohm, W.-J.
Han, and T. Wiegand, “Overview of the High Efficiency Video Coding (HEVC)
standard,†IEEE Trans. Circuits Syst. Video Technol., vol. 22, no. 12, pp.
1649–1668, Dec. 2012.
[3] I. Cox, M. Miller, J. Bloom,
J. Fridrich, and T. Kalker, Digital
Watermarking and
Steganography, 2nd ed. San Francisco, CA, USA: Morgan Kaufmann Publishers Inc.,
2008, ch. 3.
[4] A. Khan, S. A. Malik, A. Ali,
R. Chamlawi, M. Hussain, M. T.
Mahmood, and I. Usman,
“Intelligent reversible watermarking and authentication: Hiding depth map
information for 3D cameras,†Inform. Sci., vol. 216, pp. 155–175, Dec. 2012.
[5] S. Bhattacharya, T.
Chattopadhyay, and A. Pal, “A survey on different video watermarking techniques
and comparative analysis with reference to H.264/AVC,†in IEEE 10th Int. Symp.
on Consumer Electron., 2006, pp. 1–6.
[6] A. Alattar, E. Lin, and M.
Celik, “Digital watermarking of low bitrate advanced simple profile MPEG-4
compressed video,†IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8,
pp. 787–800, Aug. 2003.
[7] M. Stamm, W. Lin, and K. Liu,
“Temporal forensics and anti-forensics for motion compensated video,†IEEE
Trans. Inf. Forensics Security, vol. 7, no. 4, pp. 1315–1329, Aug. 2012.
[8] O. Cetin and A. T. Ozcerit, “A
new steganography algorithm based on color histograms for data embedding into
raw video streams,†Comput. & Security, vol. 28, no. 7, pp. 670–682, Oct.
2009.
[9] A. Cheddad, J. Condell, K.
Curran, and P. M. Kevitt, “Digital image steganography: Survey and analysis of
current methods,†Signal Process., vol. 90, no. 3, pp. 727–752, Mar. 2010.
[10] I. Cox, M. Miller, J. Bloom,
J. Fridrich, and T. Kalker, Digital Watermarking and Steganography, 2nd ed. San
Francisco, CA, USA: Morgan Kaufmann Publishers Inc., 2008, ch. Steganography.
[11] C. Adsumilli, S. Mitra, T. Oh,
and Y. Kim, “Error concealment in video commun. by informed watermarking,†in
Advances in Image and Video Technol., ser. Lecture Notes in Comput. Sci., L.-W.
Chang and W.-N.
[12] K.-L. Chung, Y.-H. Huang,
P.-C. Chang, and H.-Y. Liao, “Reversible data hiding-based approach for
intra-frame error concealment in H.264/AVC,†IEEE Trans. Circuits Syst. Video
Technol., vol. 20, no. 11, pp. 1643–1647, Nov. 2010.
[13] D. Stanescu, M. Stratulat, B.
Ciubotaru, D. Chiciudean, R. Cioarga, and M. Micea, “Embedding data in video
stream using steganography,†in 4th Int. Symp. on Applied Computational
Intelligence and Informatics, pp. 241–244, May 2007.
[14] D. Mukherjee, J. J. Chae, and
S. Mitra, “A source and channel coding approach to data hiding with application
to hiding speech in video,†in Int. Conference on Image Process., vol. 1, pp.
348–352, Oct. 1998.
[15] J. K. Su, F. Hartung, and B.
Girod, “Digital watermarking of text, image, and video documents,†Comput.
& Graphics, vol. 22, no. 6, pp. 687–695, Dec. 1998.
[16] F. Petitcolas, R. Anderson,
and M. Kuhn, “Information hiding–a survey,†Proc. IEEE, vol. 87, no. 7, pp.
1062–1078, Jul. 1999.
[17] H. Kayarkar and S. Sanyal, “A
survey on various data hiding techniques and their comparative analysis,†ACTA
Technica Corviniensis:Cryptography and Security, vol. 5, pp. 35–40, Jul.-Sep.
2012.
[18] E. Lin, A. Eskicioglu, R.
Lagendijk, and E. Delp, “Advances in digital video content protection,†Proc.
IEEE, vol. 93, no. 1, pp. 171–183, Jan. 2005.
[19] T. Stutz and A. Uhl, “A survey
of H.264 AVC/SVC encryption,†IEEEÂ
Trans. Circuits Syst. Video Technol., vol. 22, no. 3, pp. 325–339, Mar.
2012.
[20] ISO, “Information technology –
Coding of audio-visual objects – Part 1: Systems,†Int. Organization for
Standardization, Geneva, Switzerland, ISO/IEC 14496-1:2010, 2010.
[21] G. Yang, J. Li, Y. He, and Z.
Kang, “An information hiding algorithm based on intra-prediction modes and
matrix coding for H.264/AVC video stream,†AEU - Int. J. of Electron. and
Commun., vol. 65, no. 4, pp. 331–337, Apr. 2011.
[22] T. Wedi, “Adaptive
interpolation filter for motion compensated prediction,†in Int. Conference on
Image Process., vol. 2, 2002, pp. 509–512.
[23] P. List, A. Joch, J. Lainema,
G. Bjontegaard, and M. Karczewicz, “Adaptive deblocking filter,†IEEE Trans.
Circuits Syst. Video Technol., vol. 13, no. 7, pp. 614–619, Jul. 2003.
[24] T. Shanableh, “Data hiding in
MPEG video files using multivariate regression and flexible macroblock
ordering,†IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 455–464,
Apr. 2012.
[25] G. J. Sullivan, T. Wiegand,
and P. Corporation, “Rate-distortion optimization for video compression,†IEEE
Signal Process. Mag., vol. 15, pp. 74–90, Nov. 1998.
[26] G. Bjontegaard and K.
Lillevold, “Context-adaptive VLC (CAVLC) coding of coefficients,†JVT-C028, 3rd
Meeting: Fairfax, Virginia, USA, May 2002.
[27] D. Marpe, H. Schwarz, and
T.Wiegand, “Context-based adaptive binary arithmetic coding in the H.264/AVC
video compression standard,†IEEE Trans. Circuits Syst. Video Technol., vol.
13, no. 7, pp. 620–636, Jul. 2003.
[28] J. Mielikainen, “LSB matching
revisited,†IEEE Signal Process. Lett., vol. 13, no. 5, pp. 285–287, May 2006.
[29] X. Li, B. Yang, D. Cheng, and
T. Zeng, “A generalization of LSB matching,†IEEE Signal Process. Lett., vol.
16, no. 2, pp. 69–72, Feb. 2009.
[30] R.-Z. Wang, C.-F. Lin, and
J.-C. Lin, “Image hiding by optimal LSB substitution and genetic algorithm,â€
Pattern Recognition, vol. 34, no. 3, pp. 671–683, Mar. 2001.
[31] C.-K. Chan and L. Cheng,
“Hiding data in images by simple LSB substitution,†Pattern Recognition, vol.
37, no. 3, pp. 469–474, Mar. 2004.
[32] S. Kapotas and A. Skodras,
“Real time data hiding by exploiting the IPCM macroblocks in H.264/AVC
streams,†J. of Real-Time Image Process., vol. 4, pp. 33–41, Oct. 2009.
[33] Y.-H. Yu, C.-C. Chang, and
Y.-C. Hu, “Hiding secret data in images via predictive coding,†Pattern
Recognition, vol. 38, no. 5, pp. 691–705, Sep. 2005.
[34] I. J. Cox, J. Kilian, F. T.
Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,â€
IEEE Trans. Image Process., vol. 6, no. 12, pp. 1673–1687, Dec. 1997.
[35] L. M. Marvel, C. G. B. Jr.,
and C. T. Retter, “Spread spectrum image steganography,†IEEE Trans. Image
Process., vol. 8, pp. 1075–1083, Aug. 1999.
[36] U. Budhia, D. Kundur, and T.
Zourntos, “Digital video steganalysis exploiting statistical visibility in the
temporal domain,†IEEE Trans. Inf. Forensics Security, vol. 1, no. 4, pp.
502–516, Dec. 2006.
[37] V. P., G. Doerr, and P. K.
Bora, “Assessing motion-coherency in video watermarking,†in Proc. of the 8th
workshop on Multimedia and security, ser. MM&Sec ’06. New York, NY, USA:
ACM, 2006, pp. 114–119.
[38] A. Valizadeh and Z. Wang,
“Correlation-and-bit-aware spread spectrum embedding for data hiding,†IEEE
Trans. Inf. Forensics Security, vol. 6, no. 2, pp. 267–282, Jun. 2011.
[39] Z. Ni, Y.-Q. Shi, N. Ansari,
and W. Su, “Reversible data hiding,†IEEE Trans. Circuits Syst. Video Technol.,
vol. 16, no. 3, pp. 354–362, Mar. 2006.
[40] Z.-H. Wang, C.-F. Lee, and
C.-Y. Chang, “Histogram-shifting-imitated reversible data hiding,†J. of Syst.
and Software, vol. 86, no. 2, pp. 315–323, Feb. 2013.
[41] C. De Vleeschouwer, J.-F.
Delaigle, and B. Macq, “Circular interpretation of bijective transformations in
lossless watermarking for media asset management,†IEEE Trans. Multimedia, vol.
5, no. 1, pp. 97–105, Mar. 2003.
[42] Z. Zhao, H. Luo, Z.-M. Lu, and
J.-S. Pan, “Reversible data hiding based on multilevel histogram modification
and sequential recovery,†AEU - Int. J. of Electron. and Commun., vol. 65, no.
10, pp. 814–826, Oct. 2011.
[43] S. Ong, K. Wong, and K.
Tanaka, “Reversible data embedding using reflective blocks with scalable visual
quality degradation,†in 8th Int. Conference on Intell. Inform. Hiding and
Multimedia Signal Process., pp. 363 –366, Jul. 2012.
[44] S. Kapotas, E. Varsaki, and A.
Skodras, “Data hiding in H.264 encoded video sequences,†in IEEE 9th Workshop
on Multimedia Signal Process., pp. 373–376, Oct. 2007.
[45] K. Wong and K. Tanaka, “DCT
based scalable scrambling method with reversible data hiding functionality,†in
4th Int. Symp. on Commun., Control and Signal Process., pp. 1–4, Mar. 2010.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.