Data Hiding in Encrypted Compressed Videos for Privacy Information Protection

Sivappagari Chandra Mohan Reddy*, M. Manasa**
* Assistant Professor, Department of ECE, JNTUA College of Engineering, Pulivendula, Kadapa, India
** M.Tech Student, Department of ECE, JNTUA College of Engineering, Pulivendula, Kadapa, India
Periodicity:April - June'2015
DOI : https://doi.org/10.26634/jip.2.2.3404

Abstract

The large size of video data makes it desirable to be stored and processed in the cloud. To provide security and privacy for the data in the cloud, the video data must be stored in encrypted form. It is also necessary to perform data hiding to avoid the leakage of video content. This paper proposes a novel method of embedding additional data in H.264/AVC video bit streams to meet the privacy preserving requirements of cloud data management. This method proposes three processes namely: H.264/AVC video encryption, Embedding of encrypted data and extraction of original data. Depending upon the property of H.264/AVC codec, the code words of I-frames and P-frames are encrypted with stream ciphers. The data to be embedded into the encrypted video is also encrypted by Chaos encryption technique and hidden into the video by bit replacement method. Data extraction is done both in encrypted domain and in decrypted domain. Experimental results show that the proposed method preserves file size, whereas degradation in video quality caused by data embedding is less.

Keywords

Data Hiding, H.264/AVC Codec, Chaos Data Encryption.

How to Cite this Article?

Reddy, S.C.M., and Manasa, M. (2015). Data Hiding in Encrypted Compressed Videos for Privacy Information Protection. i-manager’s Journal on Image Processing, 2(2), 26-31. https://doi.org/10.26634/jip.2.2.3404

References

[1]. X. P. Zhang, (2011). “Reversible data hiding in encrypted image,” IEEE Signal Processing Letters, Vol.18, No.4, pp.255-258.
[2]. W. J. Lu, A. Varna and M. Wu, (2011). “Secure video processing: Problems and challenges,” Proceedings of IEEE International Conference on Acoustic, Speech, Signal Processing, Prague, Czech Republic, pp. 5856–5859.
[3]. Z. Erkin, A. Piva, S. Katzenbeisser, R. L. Lagendijk, J. Shokrollahi, G. Neven, and M. Barni, (2007). “Protection and retrieval of encrypted multimedia content: when cryptography meets signal processing,” EURASIP Journal on Information Security, Vol. 7, No. 2, pp. 1–20.
[4]. Sadeghi, T. Schneider, and I. Wehrenberg, (2009). “Efficient privacy-preser ving face recognition,” International Conference on Information Security and Cryptology.
[5]. Zhao, W. D. Kou, and H. Li, (2010). “Effective watermarking scheme in the encrypted domain for buyer-seller watermarking protocol,” Information Science, Vol. 180, No. 23, pp. 4672–4684.
[6]. W. Puech, M. Chaumont, and O. Strauss, (2008). “A reversible data hiding method for encrypted images,” Proceedings of SPIE, Vol. 6819, pp. 68191E-1–68191E-9.
[7]. X. P. Zhang, (2011). “Reversible data hiding in encrypted image,” IEEE Signal Processing Letters, Vol. 18, No. 4, pp. 255–258.
[8]. W. Hong, T. S. Chen, and H. Y. Wu, (2012). “An improved reversible data hiding in encrypted images using side match,” IEEE Signal Processing Letters, Vol. 19, No. 4, pp. 199–202.
[9]. K. D. Ma, W. M. Zhang, X. F. Zhao, N. Yu, and F. Li, (2013). “Reversible data hiding in encrypted images by reserving room before encryption,” IEEE Transactions on Information Forensics Security, Vol. 8, No. 3, pp. 553–562.
[10]. S. G. Lian, Z. X. Liu, and Z. Ren, (2007). “Commutative encryption and watermarking in video compression,” IEEE Transactions on Circuits Systems Video Technology, Vol. 17, No. 6, pp. 774–778.
[11]. V. Manjula, J. Rajani, and K. Radhika, (2012). “A Secure Data Hiding Technique in Compressed Video Using a Secret Key,” International Journal of Computer Science and Information Technologies, Vol. 3, No. 5, pp. 5097 – 5100.
[12]. S. W. Park and S. U. Shin, (2008). “Combined scheme of encryption and watermarking in H.264/scalable video coding (SVC),” New Directions Intellectual Interactive Multimedia, Vol. 142, No. 1, pp. 351–361.
[13]. D. K. Zou and J. A. Bloom, (2010). “H.264 stream replacement watermarking with CABAC encoding,” Proceedings of IEEE ICME, Singapore, pp. 117–121.
[14]. D. W. Xu and R. D. Wang, “Watermarking in H.264/AVC compressed domain using Exp-Golomb code words mapping,” Optical Engineering, Vol. 50, No. 9, pp. 097402.

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

If you have access to this article please login to view the article or kindly login to purchase the article
Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.