Abstract
H.264/Advanced Video Coding (AVC) video is one of the most used multimedia covers. In this paper, a novel scheme is proposed to embed secret data into the H.264/AVC video host. The main idea of the proposed scheme is that two secret digits in a (2n+1)-ary notational system are embedded into 2n nonzero Quantized Discrete Cosine Transform (QDCT) coefficients of luminance component in a macroblock and, at most, only two nonzero QDCT coefficients are increased or decreased by 2, respectively. Thus, the number of modified coefficients is small and it can guarantee a high Peak Signal-to-Noise Ratio (PSNR) value, low distortion and slight increase in bitrate after data embedding. Experimental results show that the average degradation in terms of PSNR is 2.48dB and the proposed algorithm can keep increase by no more than 0.35% in bitrate. When compared with several related schemes in the same embedding capacity, the proposed scheme indeed has an advantage in low bitrate growth.
Similar content being viewed by others
References
Ahmad AM, Sulong G, Rehman A, Alkawaz MH, Saba T (2014) Data hiding based on improved exploiting modification direction method and Huffman coding. J Intell Syst 23(4):451–459
Asikuzzaman M, Pickering MR (2017) An overview of digital video watermarking. IEEE Trans Circuits Syst Video Technol. https://doi.org/10.1109/TCSVT.2017.2712162
Balaji R, Naveen G (2011) Secure data transmission using video steganography. In: IEEE International Conference on Electro/Information Technology (EIT), Mankato, MN, USA, 15–17 May 2011
Chang C, Wu H (2014) A large payload information hiding scheme using two-level exploiting modification direction. In: 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), Kitakyushu, Japan, 27–29 August 2014
Elhadad A, Hamad S, Khalifa A, Ghareeb A (2016) High capacity information hiding for privacy protection in digital video files. Neural Comput & Applic:1–5
Fallahpour M, Shirmohammadi S, Ghanbari M (2015) A high capacity data hiding algorithm for H.264/AVC video. Security and Communication Networks 8(16):2947–2955
Feller T, Judas J, Fridrich J (2011) Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans Inf Forensics and Secur 6(3):920–935
H.264/AVC Reference Software JM8.6, available at: http://iphome.hhi.de/suehring/tml/download/old_jm/
Kim C (2014) Data hiding by an improved exploiting modification direction. Multimedia Tools and Applications 69(3):569–584
Kim C, Shin DK, Shin DI, Zhang X (2011) Improved steganographic embedding exploiting modification direction in multimedia communications. In: 8th FTRA International Conference on Secure and Trust Computing, Data Management, and Application, Loutraki, Greece, 28–30 June 2011
Li Y, Chen HX, Zhao Y (2010) A new method of data hiding based on H.264 encoded video sequences. In: 2010 IEEE 10th International Conference on Signal Processing (ICSP), Beijing, China, 24–28 October 2010
Lin ZH, Wang HX (2010) Efficient image encryption using a chaos-based PWL memristor. IETE Tech Rev 27(4):318–325
Lin YT, Wang CM, Chen WS, Lin FP, Lin W (2017) A novel data hiding algorithm for high dynamic range images. IEEE Trans Multimedia 19(1):196–211
Liu Y, Ju L, Hu M, Zhao H, Jia S, Jia Z (2016) A new data hiding method for H.264 based on secret sharing. Neurocomputing 188:113–119
Ma XJ, Li ZT, Tu H, Zhang BC (2010) A data hiding algorithm for H.264/AVC video streams without intra-frame distortion drift. IEEE transactions on circuits and systems for video. Technology 20(10):1320–1330
Pan ZQ, Lei JJ, Zhang Y, Sun XM, Kwong S (2016) Fast motion estimation based on content property for low-complexity H.265/HEVC encoder. IEEE Trans Broadcast 62(2):675–684
Peng Y, Lan H, Yue M, Xue Y (2017) Multipurpose watermarking for vector map protection and authentication. Multimedia Tools and Applications. https://doi.org/10.1007/s11042-017-4631-z
Pradhan C, Saxena V, Bisoi AK (2012) Imperceptible watermarking technique using Arnold’s transform and cross chaos map in DCT domain. Int J Comput Appl 55(12):50–53
Qin C, Chang CC, Hsu TJ (2015) Reversible data hiding scheme based on exploiting modification direction with two steganographic images. Multimedia Tools and Applications 74(12):5861–5872
Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613
Su PC, Chen WY, Shiau SY, Wu CY, Su AYS (2013) A privacy protection scheme in H.264/AVC by data hiding. In: 2013 Asia-Pacific signal and information processing association annual summit and conference, pp 1–7
Sweeney L (2002) Achieving k-anonymity privacy protection using generalization and suppression. Int J Uncertainty, Fuzziness and Knowledge-Based Syst 10(5):571–588
Wang J, Sun Y, Xu H, Chen K, Kim HJ, Joo SH (2010) An improved section-wise exploiting modification direction method. Signal Process 90(11):954–964
Wang XT, Chang CC, Lin MC (2012) A novel multi-group exploiting modification direction method based on switch map. Signal Process 92:1525–1535
Wang Y, Cao Y, Zhao X, Zhou L (2017) A prediction mode-based information hiding approach for H.264/AVC videos minimizing the impacts on rate-distortion optimization. In: International workshop on digital watermarking. Spring, Cham, pp 163–176
Xia ZH, Wang XH, Zhang LG, Qin Z, Sun XM, Ren K (2016) A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans Inf Forensics Secur 11(11):2594–2608
Xiang Y, Huang J, Pérez-González F, Hua G, Malik H (2016) IEEE access special section editorial: latest advances and emerging applications of data hiding. IEEE Access 4:9740–9742
Xu DW, Wang RD, Shi YQ (2014) Data hiding in encrypted H.264/AVC video streams by codeword substitution. IEEE Trans Inf Forensics Secur 9(4):596–606
Yang J, Li S (2017) An efficient information hiding method based on motion vector space encoding for HEVC. Multimedia Tools and Applications. https://doi.org/10.1007/s11042-017-4844-1
Zhang X, Wang S (2006) Efficient steganographic embedding by exploiting modification direction. IEEE Commun Lett 10(11):781–783
Zhang Y, Zhang M, Yang X, Guo D, Liu L (2017) Novel video steganography algorithm based on secret sharing and error-correcting code for H.264/AVC. Tsinghua Sci Technol 22(2):198–209
Acknowledgements
The authors would like to thank the reviewers for their insightful comments and helpful suggestions.This work was supported by the National Natural Science Foundation of China (NSFC) under the grant No. U1536110.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Chen, Y., Wang, H., Wu, H. et al. An adaptive data hiding algorithm with low bitrate growth for H.264/AVC video stream. Multimed Tools Appl 77, 20157–20175 (2018). https://doi.org/10.1007/s11042-017-5411-5
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-017-5411-5