Data Hiding In Encrypted Video Stream By Code-Word Substitution

Authors

  • Hajare S Computer Engineering, SavitribaiPhule Pune University, India
  • Nikam S Computer Engineering, SavitribaiPhule Pune University, India
  • Vispute K Computer Engineering, SavitribaiPhule Pune University, India
  • Bodke R Computer Engineering, SavitribaiPhule Pune University, India

Keywords:

Data hiding, encrypted domain, H.264/AVC, codeword substituting

Abstract

Inspired by the SMVQ technique, this dissertation proposes a reversible data hiding based on VQ-compressed images.This scheme can completely recover the original VQ cover image from an embedded image after the embedded message is extracted. Compared to the SMVQ technique that is very time consuming to set up a state codebook and then search the nearest codeword, the proposed scheme employs block match coding (BMC) to reduce the complexity and preserve a satisfactory embedding capacity. The main problems in the former works are low embedding capacities, low embedding rates, high complexities, or high bit rates. To improve these problems, the proposed scheme applies the BMC prediction to encode indices, and thus can obtain a higher embedding capacity, higher embedding rate, higher processing efficiency, and lower bit rate simultaneously. This chapter describes the method used for data hiding that is vector quantization and its type side match vector quantization in detail.

References

DawenXu, Rangding Wang, and Yun Q. Shi, Fellow,“Data Hiding in Encrypted H.264/AVC Video Streams by CodewordSubstitution”IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 9, NO. 4, APRIL 2014.

D. W. Xu and R. D. Wang, “Watermarking in H.264/AVC compressed domain using Exp-Golomb code words mapping,” Opt. Eng., vol. 50, no. 9, p. 097402, 2011.

D. K. Zou and J. A. Bloom, “H.264 stream replacement watermarking with CABAC encoding,” in Proc. IEEE ICME, Singapore, Jul. 2010, pp. 117–121.

C. C. Chang, W. C. Wu, and Y. C. Hu, “Lossless recovery of a VQ index table with embedded secret data,” J. Visual Commun. Image Representation, vol. 18, no. 3, pp. 207–216, 2007.

C. C. Chang, Y. P. Hsieh, and C. Y. Lin, “Lossless data embedding with high embedding capacity based on de-clustering for VQ-compresse dcodes,” IEEE Trans. Informat. Forensics Security, vol. 2, no. 3,pp. 341–349, Sep. 2007.

S. C. Shie, S. D. Lin, and C. M. Fang, “Adaptive data hiding based on SMVQprediction,”IEICE Trans. Informat. Syst., vol. E89-D, no. 1, pp.358–362, 2006.

C. C. Chang and C. Y. Lin, “Reversible steganography for VQ compressed images using side matching and relocation,” IEEE Trans. Inform. Forensics Security, vol. 1, no. 4, pp. 493–501, Dec. 2006.

S. G. Lian, Z. X. Liu, Z. Ren, and H. L. Wang, “Secure advanced video coding based on selective encryption algorithms,” IEEE Trans.Consumer Electron., vol. 52, no. 2, pp. 621–629, May 2006.

C. C. Chang, G. M. Chen, and M. H. Lin, “Information hiding basedon search-order coding for VQ indices,” Pattern Recognnit. Lett., vol.25, no. 11, pp. 1253–1261, 2004.

J. Tian, “Reversible data embedding using a difference expansion,” IEEETrans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890–896, Aug.2003.

I. E. G. Richardson, H.264 and MPEG-4 Video Compression: VideoCoding for Next Generation Multimedia. Hoboken, NJ, USA: Wiley,2003.

Downloads

Published

2025-11-10

How to Cite

[1]
S. Hajare, S. Nikam, K. Vispute, and R. Bodke, “Data Hiding In Encrypted Video Stream By Code-Word Substitution”, Int. J. Comp. Sci. Eng., vol. 3, no. 9, pp. 256–260, Nov. 2025.