Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Considering the reconstruction loop for data hiding of intra- and inter-frames of H.264/AVC

  • Original Paper
  • Published:
Signal, Image and Video Processing Aims and scope Submit manuscript

Abstract

This paper presents and analyzes a new approach to data hiding that embeds in both the intra- and inter-frames from the H.264/AVC video codec. Most of the current video data hiding algorithms take into account only the intra-frames for message embedding. This may be attributed to the perception that inter-frames are highly compressed due to the motion compensation, and any embedding message inside these may adversely affect the compression efficiency significantly. Payload of the inter-frames is also thought to be less, compared with the intra-frames, because of the lesser residual data. We analyze data hiding in both intra- and inter-frames over a wide range of QP values and observe that the payload of the inter is comparable with that of the intra-frames. Message embedding, in only those non-zero quantized transform coefficients (QTCs) which are above a specific threshold, enables us to detect and extract the message on the decoding side. There is no significant effect on the overall bitrate and PSNR of the video bitstream because instead of embedding message in the compressed bitstream, we have embedded it during the encoding process by taking into account the reconstruction loop. For the non-zero QTCs, in the case of intra-frames, we benefit from the spatial masking, while in the case of inter-frames, we exploit the motion and texture masking. We can notice that the data hiding is done during the compression process and the proposed scheme takes into account the reconstruction loop. The proposed scheme does not target robustness and the obtained payload is higher, with a better trade-off in terms of quality and bitrate, as compared with previous works.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Alattar A.M., Lin E.T., Celik M.U.: Digital watermarking of low bit-rate advanced simple profile MPEG-4 compressed video. IEEE Trans. Circuits Syst. Video Technol. 13, 787–800 (2003)

    Article  Google Scholar 

  2. Chandramouli, R., Memon, N.: Analysis of LSB based image steganography Techniques. In: Proceedings of the IEEE International Conference on Image Processing, vol. 3, pp. 1019–1022. (2001)

  3. Chen, C., Ni, J., Huang, J.: Temporal statistic based video watermarking scheme robust against geometric attacks and frame dropping. In: IWDW ’09: Proceedings of the 8th International Workshop on Digital Watermarking, pp. 81–95. Springer, Heidelberg (2009)

  4. Chung, Y., Wang, P., Chen, X., Bae, C., Otoom, A., Tran, T.: A performance comparison of high capacity digital watermarking systems. In: KES, vol. 1, pp. 1193–1198. (2005)

  5. Cox I., Kilian J., Leighton F., Shamoon T.: Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process. 6, 1673–1687 (1997)

    Article  Google Scholar 

  6. Cox, R.D., Henri, C.J., Bret, P.M.: CD-based image archival and management on a hybrid radiology intranet. Can. J. Med. Radiat. Technol. 28(3), (1997)

  7. Dai, Y., Zhang, L., Yang, Y.: A new method of MPEG video watermarking technology. In: Proceedings of International Conference on Communication Technology, vol. 2, pp. 1845–1847. (2003)

  8. Deguillaume F., Csurka G., O’Ruanaidh J., Pun T.: Robust 3D DFT video watermarking. SPIE 3657, 113–124 (1999)

    Article  Google Scholar 

  9. Ejima, M., Miyazaki, A.: A wavelet-based watermarking for digital images and video. In: Proceedings of IEEE International Conference on Image Processing, vol. 3, pp. 678–681. (2000)

  10. Golikeri A., Nasiopoulos P., Wang Z.: Robust digital video watermarking scheme for H.264 advanced video coding standard. J. Electron. Imaging 16(4), 043008 (2007)

    Article  Google Scholar 

  11. Gong, X., Lu, H.: Towards fast and robust watermarking scheme for H.264 video. In: Proceedings of IEEE International Symposium on Multimedia, pp. 649–653. (2008)

  12. H264. Draft ITU-T Recommendation and Final Draft International Standard of Joint Video Specification (ITU-T Rec. H.264 ISO/IEC 14496-10 AVC). Technical report, Joint Video Team (JVT), Doc. JVT-G050, March (2003)

  13. Hartung F., Girod B.: Watermarking of uncompressed and compressed video. Signal Process 66, 283–333 (1998)

    Article  MATH  Google Scholar 

  14. He, D., Sun, Q., Tian, Q.: A semi-fragile object based video authentication system. In: Proceedings of International Symposium on Circuits and Systems, 3, pp. 814–817 (2003)

  15. Kang X., Huang J., Shi Y., Lin Y.: A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression. IEEE Trans. Circuits Syst. Video Technol. 13(8), 776–786 (2003)

    Article  Google Scholar 

  16. Kapotas, S., Varsaki, E., Skodras, A.: Data hiding in H.264 encoded video sequences. In: Proceedings of IEEE International Workshop on Multimedia Signal Processing, (2007)

  17. Katzenbeisser, S., Petitcolas, F. (eds): Information Hiding Techniques for Steganography and Digital Watermarking. Artech House Inc., Norwood (2000)

    Google Scholar 

  18. Kim, S., Kim, S., Hong, Y., Won, C.: Data hiding on H.264/AVC compressed video. In: Image Analysis and Recognition Lecture Notes in Computer Science, chapter 62, pp. 698–707 (2007)

  19. Langelaar G., Lagendijk R.: Differential energy watermarking of DCT encoded images and video. IEEE Trans. Image Process. 10, 148–158 (2001)

    Article  MATH  Google Scholar 

  20. Lee P., Chen M.: Robust error concealment algorithm for video decoder. IEEE Trans. Consumer Electron. 45(3), 851–859 (1999)

    Article  MathSciNet  Google Scholar 

  21. Li, J., Liu, H., Huang, J., Zhang, Y.: A robust watermarking scheme for H.264. In: Digital Watermarking volume 5450 of Lecture Notes in Computer Science, pp. 1–15. Springer, Heidelberg (2009)

  22. Li, K., Zhang X.: Reliable adaptive watermarking scheme integrated with JPEG2000. In: Proceedings of 3rd International Symposium on Image and Signal Processing and Analysis (ISPA 2003). Rome, Italy (2003)

  23. Li Q., Cox I.: Using perceptual models to improve fidelity and provide resistance to volumetric scaling for quantization index modulation watermarking. IEEE Trans. Inf. Forensics Security 2(2), 127–139 (2007)

    Article  Google Scholar 

  24. Lu C., Chen J., Fan K.: Real-time frame-dependent video watermarking in VLC domain. Signal Process. Image Commun. 20(7), 624–642 (2005)

    Article  Google Scholar 

  25. Malvar H., Hallapuro A., Karczewicz M., Kerofsky L.: Low-complexity transform and quantization in H.264/AVC. IEEE Trans. Circuits Syst. Video Technol. 13(7), 598–603 (2003)

    Article  Google Scholar 

  26. Miller M., Doerr G., Cox I.: Applying informed coding and embedding to design a robust high capacity watermark. IEEE Trans. Image Process. 13(2), 792–807 (2004)

    Article  Google Scholar 

  27. Mobasseri, B., Raikar, Y.: Authentication of H.264 streams by direct watermarking of CAVLC blocks. In: Proceedings of Security, Steganography, and Watermarking of Multimedia Contents IX volume 6505 SPIE, San Jose, CA (2007)

  28. Noorkami, M., Mersereau, R.: Compressed-domain video watermarking for h.264. In: Proceedings of IEEE International Conference on Image Processing, pp. 890–893. Genoa, Italy (2005)

  29. Noorkami M., Mersereau R.: Digital video watermarking in P-frames with controlled video bit-rate increase. IEEE Trans. Inf. Forensics Security 3(3), 441–455 (2008)

    Article  Google Scholar 

  30. Oostveen, J., Kalker, T., Haitsma J.: Visual hashing of digital video: applications and techniques. In: Proceedings of SPIE, Applications of Digital Image Processing XXIV. vol. 4472, pp. 121–131. San Diego CA, USA (2009)

  31. Pröfrock, D., Schlauweg, M., Müller, E.: A new uncompressed-domain video watermarking approach robust to H.264/AVC compression. In: Proceedings of IASTED International Conference on Signal Processing, Pattern Recognition, and Applications, pp. 99–104. Anaheim, CA, USA (2006)

  32. Qiu, G., Marziliano, P., Ho, A.T.S., He, D., Sun, Q.: A hybrid watermarking scheme for h.264/avc video. Pattern Recognition, International Conference on 4, pp. 865–869 (2004)

  33. Ramkumar, M., Akansu, A.: Robust protocols for proving ownership of images. In: Proceedings of International Conference on Information Technology: Coding and Computing, pp. 22–27 (2000)

  34. Wang, Q., Zhao, D., Ma, S., Lu, Y., Huang, Q., Ga, W.: Context-based 2D-VLC for video coding. In: Proceedings of IEEE International Conference on Multimedia and Expo, pp. 89–92 (2004)

  35. Watson, A.: DCT quantization matrices visually optimized for individual images. In: Proceedings of SPIE Society of Photo-Optical Instrumentation Engineers, vol. 1913, pp. 202–216 (1993)

  36. Wiegand T., Sullivan G., Bjntegaard G., Luthra A.: Overview of the H.264/AVC video coding standard. IEEE Trans. Circuits Syst. Video Technol. 13, 560–576 (2003)

    Article  Google Scholar 

  37. Wu, C., Zheng, Y., Ip, W., Chan, C., Yung, K., Lu, Z.: A fexible H.264/AVC compressed video watermarking scheme using particle swarm optimization based Dither modulation. AEU Int. J. Electron. Commun. (2010)

  38. Wu, G., Wang, Y., Hsu, W.: Robust watermark embedding/detection algorithm for H.264 video. J. Electron. Imaging 14(1), (2005)

  39. Xie, F., Furon, T., Fontaine, C.: On-Off keying modulation and Tardos fingerprinting. In: Proceedings of ACM Workshop on Multimedia and security, pp. 101–106. New York, NY, USA (2008)

  40. Zou, D., Bloom, J.: H.264/AVC stream replacement technique for video watermarking. In: Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 1749 –1752 (2008)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to William Puech.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Shahid, Z., Chaumont, M. & Puech, W. Considering the reconstruction loop for data hiding of intra- and inter-frames of H.264/AVC. SIViP 7, 75–93 (2013). https://doi.org/10.1007/s11760-011-0225-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11760-011-0225-9

Keywords