In recent years, multimedia techniques have rapidly advanced. Video discs with massive storage capacities exemplify widely used multimedia storage mediums. However, online multimedia services face strict storage limits, and compression rates impact streaming quality. This poses a dilemma—data hiding risks exceeding storage limits and affecting the quality of video streams. To address this, we propose a lossless data hiding technique focusing on cover data size. The technique embeds new data into compressed cover video data, decreasing data size post-embedding. Extraction requires no key. In addition, the processing time is short enough that the technique can be used in real-time applications. We verified the technique through experiments with MPEG-2 videos. Video data size decreased after hiding data, and quality degradation remained acceptable. Results confirm the technique’s efficacy. |
1.IntroductionMultimedia, merging different types of media, such as video, audio, context, and interaction, have become a non-splittable part of people’s lives. In recent years, multimedia techniques have developed significantly and rapidly. As representative examples of multimedia contents, movies and dramas have been entertaining people for a number of decades. Those contents are usually the composition of video, audio, and sometimes subtitles. Video discs, including capacitance electronic disc (CED), video high density (VHD), video compact disc (VCD), digital versatile disc (DVD), Blu-ray disc (BD), UHD BD (ultra HD Blu-ray disc), etc., are portable storages for multimedia contents. DVDs and BDs are digital storage formats widely used in the world currently, and UHD BDs that support 4K videos are considered the major digital storage formats in the coming years. On the other hand, online video on demand (VOD) services keep massive multimedia data in their storage while streaming services provide streaming data with acceptable quality to users. Data hiding for videos,1,2 by the way, is a developing field of technology that has been emerging recently. Video data hiding techniques and image data hiding techniques that can be utilized for videos have been actively studied3,4 while some basic ones have been proposed before.5–7 However, because the video discs and the online services use lossily compressed video data, the additional data embedded into raw data (e.g., YUV sequences) before compression have a great risk of loss after quantization. Thus, it is reasonable to embed data into compressed data. In DVD and BD videos, formats, such as MPEG-2 and H.264/AVC, are commonly used; while in UHD BD videos, H.265/MPEG-H part 2 (HEVC) is used. These formats are also generally used by online VOD and streaming services. In those formats, orthogonal transformations including discrete cosine transform (DCT) and discrete sine transform (DST) are performed in units of blocks to generate coefficients in frequency domain, then the coefficients are quantized in the purpose of compression. Note that the processes after quantization are totally lossless. Therefore, quantized transform coefficients (qTCs) are possible targets for lossless data hiding in compressed videos. Techniques embedding data using qTCs have also been proposed.8–14 According to the reversibility of the cover data (image or video), data hiding techniques can be classified as the reversible type and the irreversible type. In general, reversible data hiding techniques need high redundancy in order to restore the original data and will lead to an significant file-size overhead of the cover data, which is not ideal for video discs because of the strict capacity limit.15–18 On the other hand, irreversible data hiding techniques do not need high redundancy and will not lead to significant file-size overhead.19–22 In fact, any existing multimedia storage has a strict capacity limit, and the compression rate of online VOD and streaming services are of importance. Despite of that, data hiding processes for compressed videos generally increase the data size of the contents. Consequently, the increased data size has a risk of exceeding the capacity limit of the storage and affecting the quality of video streaming. Therefore, in order to preserve the integrity of both the contents and the additional data and maintain the quality of video streaming, data hiding techniques that never cause the increase of the data size are expected. Some techniques that never cause the increase of the data size have been proposed before.20–24 Least significant bit (LSB) replacement technique as well as its variants is one of the data hiding techniques which can save data size for uncompressed images or videos.20–23 Another technique24 losslessly embedding some qTC blocks into others is for compressed images, but it cannot embed additional data except for the cover images themselves (it is actually a compression technique using data hiding). In this paper, we propose a novel data hiding technique for compressed videos. The proposed technique is lossless and the data size of the videos never increases. Several related works and the proposed technique will be explained in Secs. 2 and 3, respectively, and the experiments with results will be introduced and discussed in Sec. 4. 2.Related WorksIn this section, after the introduction of investigation on cover data size, three conventional data hiding techniques—the classical LSB replacement technique, the modulo addition technique, and the modified modulo addition technique will be explained first, and several other conventional techniques will be introduced next. 2.1.Impact on Data SizeMost natural (i.e., not artificial) images have a great spatial redundancy. Therefore, the orthogonal transformations are performed to reduce the effects of the redundancy. As a result, the values of the AC coefficients have the tendency of a Laplacian distribution where the location parameter , as shown in Fig. 1.25,26 Utilizing the characteristics of the Laplacian distribution, the qTCs will then be coded by applying two entropy coding methods: context adaptive variable length coding (CAVLC) or context adaptive binary arithmetic coding (CABAC). MPEG-2 supports only CAVLC, HEVC supports only CABAC while H.264/AVC supports both. In general, entropy coding methods distribute shorter code to more frequent data. In the case of CAVLC, qTCs are broken down into level values and zero run-length values before applying CAVLC. Afterwards, the level values and the zero run-length values are coded (as run-level pairs in MPEG-2; separately in H.264/AVC) using the VLC tables. According to the tables, as long as the amount of the zero coefficients in one block remains unchanged, the data size will decrease when the absolute values of the AC coefficients decrease. In the case of CABAC, only the levels and the positions of the non-zero AC coefficients are coded. Those values are broken down into several syntaxes and then binarized and coded. The same as in the case of CAVLC, as long as the amount of the zero coefficients in one block remains unchanged, the data size will decrease when the absolute values of the AC coefficients decrease. Consequently, in order to decrease the data size, it is reasonable to decrease the absolute values of the non-zero AC coefficients without reducing the amount of zero AC coefficients. 2.2.Classical LSB Replacement TechniqueFor one piece of data, its bit plane can be arranged in a from-most-to-least significant order, and the last bit in that order is expressed as an LSB. For example, the rightmost bit of an eight-bit binary number is its LSB. In the classical LSB replacement technique, the LSB of the target of data hiding will be replaced with one bit of additional data, and this process may cause the original value of the target to change by one. The embedded one bit of data can be extracted by directly referring to the LSB of the target. An example of the classical LSB replacement technique is shown in Fig. 2. 2.3.Modulo Addition TechniqueFor one piece of integer data, the value of it could be expressed as . The process embedding one bit of additional data, which has a value of will change to as follows: where indicates the rounding down operation.The embedded data bit could be extracted as follows: where mod indicates the modulo operation.In fact, the modulo addition technique can be considered as a variant of the classical LSB replacement technique, in particular the two techniques are sometimes totally the same depending on the representation method of the bit plane of negative numbers. According to Sec. 2.1, in MPEG-2, H.264/AVC, and HEVC formats, the same as in some other image and video formats using orthogonal transformations, such as JPEG, turning an AC coefficient with a value of 0 into a non-zero value will directly increase the data size. Obviously, the classical LSB replacement technique and the modulo addition technique will inevitably increase the number of non-zero AC coefficients. In addition, according to Eq. (1), if is positive and is a multiple of 2, the absolute value of will be greater than that of when . Those features pose a risk of massive data size increase, which is undesirable in most scenarios of data hiding, e.g., in the case that the remaining capacity of the video disc is insufficient. This technique will be expressed as “MA” since then. 2.4.Modified Modulo Addition TechniqueAs a modified version of the modulo addition technique, an approach has been proposed before.27 In that approach, in order to avoid the risk of increasing the absolute value of an AC coefficient, the algorithm of embedding was modified as follows: where indicates the integer part of and can be defined as where indicates the rounding up operation.The embedded data bit could be extracted with Eq. (2) as well. This technique avoids the risk to increase the absolute value of a non-zero AC coefficient. On the other hand, it changes the value of some AC coefficients from 0 to 1. As a result, the data size of the video may increase after data hiding process. This technique will be expressed as “mMA” since then. The ideal positions to embed additional data in a block have been studied before.28 The qTCs of a block could be divided into three regions, which are (low frequencies), (medium frequencies), and (high frequencies) as shown in Fig. 3. The band of frequencies suitable for embedding purpose is .28 However, the mMA technique performs data hiding mainly in . In order to develop this technique, AC coefficients in should be chosen for embedding when the payload is slight. 2.5.Other Related TechniquesSome other data hiding techniques proposed for compressed images and videos have also been proposed.29–32 Mobasseri et al. proposed a data hiding technique for MPEG-2 videos using VLC mapping,29 which will not increase the data size of the videos. However, it only supports CAVLC and but also requires detection process beforehand. In addition, the maximum payload size depends on the cover video. Chaumont et al. proposed a DCT-based data hiding technique that spreads the payload data into a group of DCT coefficients.30 The technique can realize a better image quality, but it also leads to a data size increase. Hartung et al. can embed additional data into MPEG-2 videos without data size increase,31 yet it has a risk of losing the additional data because it embeds the additional data into the inverse quantized DCT coefficients and quantize them again (the quantization process is lossy). Those techniques are effective respectively in some scenarios, but any one of them has obvious defects in other scenarios, especially in the cases of data hiding into capacity-limited multimedia storages. F4, the base of F5,32 is a technique that embeds data into nonzero AC coefficients of cover data while reducing the cover data size. However, this technique inevitably turns some 1 and AC coefficients into zeros, thus in order to acquire the embedded data, a unique key for each cover data is needed to be produced to record which zeros are unchanged, which are changed from 1 and which are changed from −1. This key has to be merged with any other keys for data extraction of each cover data and the key-sharing is costly in most data hiding situations. F5 is an improved version of F4 and also has this characteristic. 3.Proposed Technique3.1.OverviewIn MPEG-2, H.264/AVC, and HEVC, frames (pictures) are classified as I (intra) pictures, P (predictive) pictures, and B (bidirectionally predictive) pictures. Each frame is divided into blocks and the blocks are classified roughly as intra-blocks and inter-blocks of luminance and chrominance. Orthogonal transformations and quantization are then performed within each block and qTCs are acquired. Because inter-blocks are basically predicted from intra-blocks, the degradation of the intra-blocks will be propagated to inter-blocks and accumulated.33 At the same time, human eyes are more sensitive to direct current (DC) coefficients than alternating current (AC) coefficients. Thus, it is conceivable that AC ingredients of qTCs in intra-blocks are proper targets of data hiding process. The flowcharts of the proposed processes are shown in Fig. 4. 3.2.Details of the Proposed TechniqueIn this section, the proposed polarized LSB replacement technique will be explained and discussed. What we have already discussed is that the video data size may increase after data hiding process in MA and mMA, and key-sharing is costly in F4. Here, we propose a novel technique, polarized LSB replacement, to avoid data size increase and key-sharing, which will be expressed as “PLSB-r” since then. Before the algorithm is explained, a partial lookup table including several original qTCs and the corresponding modified qTCs for MA, mMA, and PLSB-r is shown as Table 1. The changes of the qTC values are shown in Fig. 5: where the red arrows refer to the changes which increase the absolute value of qTCs, green arrows for changes which decrease the absolute value of qTCs, and white ones for no change of the absolute value. From Table 1 and Fig. 5, we can conclude that different from MA and mMA, the proposed technique never increases the absolute value of any qTC. Further, as long as any qTC which has a value greater than 1 or less than −1 exists (this condition is basically satisfied in all natural images and videos with sufficient quality), the video data size decreases due to the decrease of the absolute value of those qTCs. Table 1Modified qTC lookup table.
The algorithm of the proposed PLSB-r technique is explained below. First, only in the cases where , is acquired as follows: Next, if , it will be reduced by 1 as follows: The value of one qTC is changed to finally. Note that , the additional data bit could be extracted as follows: In other words, the same as F4, “1” is extracted if the modified qTC has a positive odd value or a negative even value; “0” is extracted if the modified qTC has a positive even value or a negative odd value. In this way, the original video is not required for the extraction. Different from F4, zero AC coefficients are skipped so that the amount of zero AC coefficients remains the same, thus no unique key for each cover data is required for data extraction.In the proposed technique, the sign of a qTC with a value of 1 or may invert, i.e., becomes 1; 1 becomes , and the parity of the positive modified qTCs and negative modified qTCs conflict when the same data bit is embedded. The histogram for AC coefficients of cover data remains symmetrical and nearly remains a Laplacian distribution, therefore whether the cover data carry hidden data is difficult to detect by attackers. These characteristics make the proposed technique totally different from conventional LSB replacement and modulo addition techniques, in which the parity of the positive modified qTCs and negative modified qTCs are generally the same. Due to that feature of the proposed technique, although the robustness of the proposed technique is relatively weak, it is more effective to use it in steganography situations, in which the lack of detectability is rather important, or enrichment situations, in which the robustness can be disrespected to a certain extent. The time-complexity of both the data hiding process and the data extraction process is . The processing time of the proposed technique is generally negligible, which is of the video coding or decoding time in our experiments. Thus, the proposed technique is suitable for real-time situations where an information timeline is important. The scheme of the proposed technique is simple so that it can be combined with other data hiding techniques that enhance security and other aspects. As defect of the proposed technique, the maximum payload will be less than MA and mMA because embedding process is only performed to non-zero qTCs, and the quality will be slightly worse than F4 because the change of the absolute value of 1 and AC coefficients is greater. As shown in Table 1, when , the absolute value of an AC coefficient will never increase after the embedding process is performed. 4.Experiments and Results4.1.OverviewTo verify the effectiveness of the proposed technique, we conducted several experiments with the MPEG-2 format. In the experiments, the 15 videos we used were uncompressed raw videos in YUV format.34 The first frames of the experimental videos are shown in Fig. 6. The 15 raw videos were compressed to common DVD and BD formats that are also generally used in the videos of online services with the specifications shown in Table 2, respectively. The compressed videos with no data embedded will be represented as baseline videos since then. In order to compare the videos with data embedded and the baseline videos objectively, fixed quantization parameter (QP) values are used to keep the coding process the same for the comparison objects. The QP values of different videos vary in order to keep the bit rates similar for different videos as shown in Table 3. The bit rates of the baseline videos and the average of them are shown in Fig. 7. The additional data to be embedded are a randomly generated bit-sequence and all experiments use the same . Table 2Details of the experimental videos.
Table 3QP of the experimental videos.
To compare the proposed technique with the conventional ones, we performed MA, mMA, and PLSB-r to the experimental videos. Two conventional techniques using qTCs were also performed with the goal of comparison,13,14 which are expressed as Adap and Psy since then, respectively. For the purpose of comparing the techniques with similar payload values, in MA and mMA, four bits of additional data are embedded in the of one block, while in PLSB-r, all non-zero quantized AC coefficients in intra-blocks are used for embedding, in Adap, the payload is adjusted to be similar as the proposed technique. However, Psy cannot achieve a similar payload as the proposed technique, so we maximized the payload in Psy. 4.2.Losslessness Verification ExperimentTo verify the losslessness of the proposed technique, we calculated the mean squared error (MSE) value of the extracted data and . The MSE value is calculated as follows: where indicates the ’th bit of the extracted data and indicates the ’th bit of .The MSE values were all 0, which corroborated that the data hiding processes of the three techniques are lossless. 4.3.Effectiveness Verification ExperimentFor the purpose of verifying the effectiveness of the proposed techniques, we evaluated the cover videos in viewpoints of quality, payload, and file-size overhead. (payload) stands for the size of embedded data. (file-size overhead) stands for the increase of the video data size and is defined as: , where is the data size after data hiding and is the data size before data hiding. The quality is evaluated using peak signal-to-noise ratio (PSNR) and structural similarity (SSIM),35 which are both calculated between the enriched videos and the baseline videos. Both PSNR value and SSIM value for a pair of videos are the average of all frames. The payload and file-size overhead results are represented as payload per second and overhead per second in order to help the users of the proposed system to understand them in a kind of practical manner. The overhead-to-payload ratios are calculated as . The overhead-to-payload ratio could be considered as a payload efficiency evaluation index of data hiding in the viewpoint of overhead. The file-size increase rates are calculated as and the payload rates are calculated as , where stands for the file-size of the baseline video. Negative file-size increase rate values indicate that the file-size of the cover video decreases after data hiding process. The average values of the experiment results of all the 15 experimental videos for both DVD and BD are shown in Figs. 8Fig. 9–10, and the comparison of the proposed technique with MA, mMA, Adap, and Psy are shown in Table 4. As an example, the output videos of Adap, Psy, and PLSB-r for “aspen,” “ducks take off,” “factory,” “pedestrian area,” and “west wind easy” after data hiding process are shown in Fig. 11 with the baseline video. Table 4Average results of the comparison between conventional and proposed techniques.
4.4.DiscussionFrom Figs. 8Fig. 9Fig. 10–11, we can conclude that the quality of the output videos with data hidden in them are acceptable. From Fig. 10, we can conclude that the data sizes of all the videos decrease after data hiding. On the other hand, as shown in Fig. 12, note that Psy has much smaller payload which suggests that it is not suitable for comparison. Compared with the rest three techniques with similar payload (in the case of DVD videos, 68.6 Kbps for MA and mMA, 69.4 Kbps for Adap, and 66.6 Kbps for PLSB-r), the proposed technique realizes data size decrease in exchange for a certain degree of the video quality degradation. However, the PSNR values are around 35 dB while the SSIM values are around 0.99, due to which we can consider that the video quality is sufficient. Furthermore, Fig. 11 indicates that the video quality degradation is visually insensitive. 5.ConclusionIn this paper, we proposed a novel data hiding technique for videos using qTCs. In the proposed system, newly added data are embedded into AC ingredients of qTCs of the cover data. The quality degradation of the cover data is controlled to be acceptable, and the video data size decreases after the data hiding process. No key is needed for extraction of embedded data. However, even though the proposed technique is suitable for other formats using qTCs such as H264/AVC and HEVC theoretically, the experimental proof is required. In the future, the experiments for H264/AVC, HEVC, and other formats using qTCs with the proposed technique will be a topic for us. DisclosuresWe have no relevant financial interests in the manuscript and no other potential conflicts of interest to disclose. Code and Data AvailabilityIn the proposed technique, the experiments are conducted with FFMPEG https://ffmpeg.org/ 2.4.2, where our code is implemented in two source c files: mpegvideo_enc.c and mpeg4videodec.c in the libavcodec folder before compiling FFMPEG. However, as the version of the FFMPEG we used is out of date, we recommend installing up-to-date versions of FFMPEG or other up-to-date tools to implement the proposed technique. If the files we used in our experiments are needed, contact us for them. ReferencesI. Cox et al., Digital Watermarking and Steganography, Morgan Kaufmann Publishers Inc., San Francisco, California
(2008). Google Scholar
Y. Tew and K. Wong,
“An overview of information hiding in H.264/AVC compressed video,”
IEEE Trans. Circuits Syst. Video Technol., 24
(2), 305
–319 https://doi.org/10.1109/TCSVT.2013.2276710
(2014).
Google Scholar
S. Roop, M. Himanshu and P. Raju,
“Optimal keyframe selection-based lossless video-watermarking technique using IGSA in LWT domain for copyright protection,”
Complex Intell. Syst., 8
(2), 1047
–1070 https://doi.org/10.1007/s40747-021-00569-6
(2021).
Google Scholar
K. Sahib et al.,
“A modulo function-based robust asymmetric variable data hiding using DCT,”
Symmetry, 12
(10), 1659 https://doi.org/10.3390/sym12101659 SYMMAM 2073-8994
(2020).
Google Scholar
P. W. Wong,
“A watermark for image integrity and ownership verification,”
in Image Process., Image Quality, Image Capture Syst. Conf.,
(1998). Google Scholar
J. Fridrich, M. Goljan and R. Du,
“Lossless data embedding: new paradigm in digital watermarking,”
EURASIP J. Adv. Signal Process., 2002
(2), 185
–196 https://doi.org/10.1155/s1110865702000537
(2002).
Google Scholar
T. Kalker and F. Willems,
“Capacity bounds and constructions for reversible data-hiding,”
in 14th Int. Conf. on Digit. Signal Process. Proc. DSP 2002 (Cat. No. 02TH8628),
(2002). https://doi.org/10.1109/icdsp.2002.1027818 Google Scholar
G. Xuan et al.,
“Reversible data hiding for JPEG images based on histogram pairs,”
Lect. Notes Comput. Sci., 4633 715
–727 https://doi.org/10.1007/978-3-540-74260-9_64 LNCSD9 0302-9743
(2007).
Google Scholar
P. Zheng, B. Zhao and M. Liu,
“An efficient method to hide information in MPEG video sequences,”
in Int. Conf. Multimedia Inf. Netw. and Security,
(2009). https://doi.org/10.1109/mines.2009.123 Google Scholar
Z. Shahid, M. Chaumont and W. Puech,
“Considering the reconstruction loop for data hiding of intra- and inter-frames of H.264/AVC,”
Signal Image Video Process., 7
(1), 75
–93 https://doi.org/10.1007/s11760-011-0225-9
(2011).
Google Scholar
S. Gujjunoori and B. B. Amberker,
“A DCT based near reversible data embedding scheme for MPEG-4 video,”
in Proc. Fourth Int. Conf. Signal and Image Process.,
69
–79
(2013). https://doi.org/10.1007/978-81-322-0997-3_7 Google Scholar
F. Huang et al.,
“Reversible data hiding in JPEG images,”
IEEE Trans. Circuits Syst. Video Technol., 26
(9), 1610
–1621 https://doi.org/10.1109/TCSVT.2015.2473235
(2016).
Google Scholar
Y. Chen et al.,
“Adaptive video data hiding through cost assignment and STCS,”
IEEE Trans. Depend. Secure Comput., 18
(3), 1320
–1335 https://doi.org/10.1109/TDSC.2019.2932983
(2019).
Google Scholar
F. Muhammad and E. Ferda,
“Video steganography based on DCT psychovisual and object motion,”
Bull. Electr. Eng. Inf., 9
(3), 1015
–1023 https://doi.org/10.11591/eei.v9i3.1859
(2020).
Google Scholar
Z. Ni et al.,
“Reversible data hiding,”
IEEE Trans. Circuits Syst. Video Technol., 16
(3), 354
–362 https://doi.org/10.1109/TCSVT.2006.869964
(2006).
Google Scholar
J. Tian,
“Reversible watermarking by difference expansion,”
in Proc. Workshop on Multimedia and Security,
(2002). Google Scholar
L. R. Mathews and V. A. C. Haran,
“Histogram shifting based reversible data hiding using block division and pixel differences,”
in Int. Conf. on Control, Instrum., Commun. and Computat. Technol. (ICCICCT),
(2014). https://doi.org/10.1109/iccicct.2014.6993092 Google Scholar
Z. Shahid and W. Puech,
“A histogram shifting based RDH scheme for H.264/AVC with controllable drift,”
Proc. SPIE, 8665 86650S https://doi.org/10.1117/12.2012741 PSISDG 0277-786X
(2013).
Google Scholar
S. M. Kim et al.,
“Data hiding on H.264/AVC compressed video,”
Lect. Notes Comput. Sci., 4633 698
–707 https://doi.org/10.1007/978-3-540-74260-9_62 LNCSD9 0302-9743
(2007).
Google Scholar
Y. K. Lee and L. H. Chen,
“High capacity image steganographic model,”
in IEE Proc. – Vis., Image, and Signal Process.,
288
(2000). https://doi.org/10.1049/ip-vis:20000341 Google Scholar
M. U. Celik et al.,
“Lossless generalized-LSB data embedding,”
IEEE Trans. Image Process., 14
(2), 253
–266 https://doi.org/10.1109/tip.2004.840686 IIPRE4 1057-7149
(2005).
Google Scholar
C. Lalengmawia, A. Bhattacharya and A. Datta,
“Image steganography using advanced encryption standard for implantation of audio/video data,”
in Int. Conf. Recent Trends in Inf. Technol. (ICRTIT),
(2016). https://doi.org/10.1109/icrtit.2016.7569552 Google Scholar
M. T. Al-Bayati and M. M. Al-Jarrah,
“DuoHide: a secure system for hiding multimedia files in dual cover images,”
in 9th Int. Conf. Dev. in eSystems Eng. (DeSE),
(2016). https://doi.org/10.1109/dese.2016.23 Google Scholar
R. Jafari, D. Ziou and A. Mammeri,
“Increasing compression of JPEG images using steganography,”
in IEEE Int. Symp. Rob. and Sens. Environ. (ROSE),
(2011). https://doi.org/10.1109/rose.2011.6058519 Google Scholar
E. Y. Lam and J. W. Goodman,
“A mathematical analysis of the DCT coefficient distributions for images,”
IEEE Trans. Image Process., 9
(10), 1661
–1666 https://doi.org/10.1109/83.869177 IIPRE4 1057-7149
(2000).
Google Scholar
N. Kamaci and G. AlRegib,
“Improved DCT coefficient distribution modeling for h.264-like video coders based on block classification,”
in 18th IEEE Int. Conf. on Image Process.,
(2011). https://doi.org/10.1109/icip.2011.6115704 Google Scholar
Y. Miura et al.,
“Additional data hiding technique for specified regions of JPEG image,”
(2016). Google Scholar
S. A. Parah et al.,
“Hiding in encrypted images: a three tier security data hiding technique,”
Multidimens. Syst. Signal Process., 28
(2), 549
–572 MUSPE5 0923-6082
(2015).
Google Scholar
B. G. Mobasseri and M. P. Marcinak,
“Watermarking of MPEG-2 video in compressed domain using VLC mapping,”
in Proc. 7th Workshop on Multimedia and Security,
(2005). https://doi.org/10.1145/1073170.1073187 Google Scholar
M. Chaumont and W. Puech,
“A DCT-based data-hiding method to embed the color information in a JPEG grey level image,”
in 14th Eur. Signal Process. Conf.,
(2006). Google Scholar
F. Hartung and B. Girod,
“Digital watermarking of MPEG-2 coded video in the bitstream domain,”
in IEEE Int. Conf. on Acoust., Speech, and Signal Process.,
(1997). https://doi.org/10.1109/icassp.1997.595326 Google Scholar
A. Westfeld,
“F5: a steganographic algorithm,”
Lect. Notes Comput. Sci., 2137 289
–302 https://doi.org/10.1007/3-540-45496-9_21 LNCSD9 0302-9743
(2001).
Google Scholar
Y. Nemoto et al., A study on video scrambling considering inter-frame prediction
(2006). Google Scholar
Xiph open source community, “Derf’s test media collection,”
https://media.xiph.org/video/derf/
(2023).
Google Scholar
Z. Wang et al.,
“Image quality assessment: from error visibility to structural similarity,”
IEEE Trans. Image Process., 13
(4), 600
–612 https://doi.org/10.1109/tip.2003.819861 IIPRE4 1057-7149
(2004).
Google Scholar
BiographyXuefei Li received his BS degree in engineering from Zhejiang University in 2013 and his MS degree in information science and engineering from Hokkaido University in 2015. He is now in the doctor course of Graduate School of Information Science and Technology, Hokkaido University. His research interests are scrambling and data hiding techniques in images and videos. |