Skip to main content
Log in

Reversible video data hiding using zero QDCT coefficient-pairs

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

H.264/Advanced Video Coding (AVC) is one of the most commonly used video compression standard currently. In this paper, we propose a Reversible Data Hiding (RDH) method based on H.264/AVC videos. In the proposed method, the macroblocks with intra-frame 4 × 4 prediction modes in intra frames are first selected as embeddable blocks. Then, the last zero Quantized Discrete Cosine Transform (QDCT) coefficients in all 4 × 4 blocks of the embeddable macroblocks are paired. In the following, a modification mapping rule based on making full use of modification directions are given. Finally, each zero coefficient-pair is changed by combining the given mapping rule with the to-be-embedded information bits. Since most of last QDCT coefficients in all 4 × 4 blocks are zero and they are located in high frequency area. Therefore, the proposed method can obtain high embedding capacity and low distortion.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Abu-Marie W, Gutub A, Abu-Mansour H (2010) Image based steganography using truth table based and determinate array on RGB indicator. International Journal of Signal and Image Processing 1(3)

  2. Alanizy N, Alanizy A, Baghoza N, AlGhamdi M, Gutub A (2018) 3-layer PC text security via combining compression, AES cryptography 2LSB image steganography. Journal of Research in Engineering and Applied Sciences 3(04):118–124

    Google Scholar 

  3. Alassaf N, Gutub A, Parah SA, Ghamdi MA (2018) Enhancing speed of SIMON: a light-weight-cryptographic algorithm for IoT applications. Multimed Tools Appl. https://doi.org/10.1007/s11042-018-6801-z

  4. Al-Ghamdi M, Al-Ghamdi M, Adnan G (2018) Security enhancement of shares generation process for multimedia counting-based secret-sharing technique. Multimedia Tools and Application. https://doi.org/10.1007/s11042-018-6977-2

  5. Al-Juaid N, Gutub A, Khan EA (2018) Enhancing PC data security via combing RSA cryptography and video based steganography. Journal of Information Security and Cybercrimes Research 1(1):8–18

    Google Scholar 

  6. Al-Otaibi N, Gutub A (2014) 2-leyer security system for hiding sensitive text data on personal computers. Lecture Notes on Information Theory 2(2):151–157

    Google Scholar 

  7. Al-Qurashi GA (2018) Reliable secret key generation for counting-based secret sharing. Journal of Computer Science and Computational Mathematics 8(4):87–101

    Article  Google Scholar 

  8. Alsaid A, Al-lehaibi K, Alzahrani H, AiGhamdi M, Gutub A (2018) Compression multi-level crypto stego security of texts utilizing colored email forwarding. Journal of Computer Science and Computational Mathematics 8(3):33–42

    Article  Google Scholar 

  9. Cao X, Du L, Wei X, Meng D, Guo X (2016) High capacity reversible data hiding in encrypted images by patch-level sparse representation. IEEE Transactions on Cybernetics 46(5):1132–1143

    Article  Google Scholar 

  10. Chen Y, Wang HX, Wu HZ, Liu Y (2018) An adaptive data hiding algorithm with low bitrate growth for H.264/AVC video stream. Multimed Tools Appl 77(15):20157–20175

    Article  Google Scholar 

  11. Chen Y, Wang HX, Wu HZ, Chen YL, Liu Y (2018) A data hiding scheme with high quality for H.264/AVC video streams. In: International conference on cloud computing and security. Springer, Cham, pp 99–110

    Chapter  Google Scholar 

  12. Chung KL, Huang YH, Chang PC, Liao HYM (2010) Reversible data hiding-based approach for intra-frame error concealment in H.264/AVC. IEEE Transactions on Circuits and Systems for Video Technology 20(11):1643–1647

    Article  Google Scholar 

  13. Dragoi IC, Coltuc D (2014) Local-prediction-based difference expansion reversible watermarking. IEEE Trans Image Process 23(4):1779–1790

    Article  MathSciNet  MATH  Google Scholar 

  14. Dragoi IC, Coltuc D (2016) Adaptive pairing reversible watermarking. IEEE Trans Image Process 25(5):2420–2422

    Article  MathSciNet  MATH  Google Scholar 

  15. Fallahpour M, Shirmohammadi S, Semsarzadeh M, Zhao J (2014) Tampering detection in compressed digital video using watermarking. IEEE Trans Instrum Meas 63(5):1057–1073

    Article  Google Scholar 

  16. Fallahpour M, Shirmohammadi S, Bhanbari M (2015) A high capacity data hiding algorithm for H.264/AVC video. Security and Communication Networks 8(16):2947–2955

    Article  Google Scholar 

  17. Gutub A (2010) Pixel indicator technique for RGB image steganography. Journal of Emerging Technologies in Web Intelligence Journal of Emerging Technologies in Web Intelligence 2(1):56–64

    Google Scholar 

  18. Gutub A, Al-Juaid N (2018) Multi-bits stego-system for hiding text in multimedia images based on user security priority. Journal of Computer Hardware Engineering 1(2):1–9

    Google Scholar 

  19. Gutub A, Al-Juaid N, Khan E (2018) Counting-based secret sharing technique for multimedia applications. Multimed Tools Appl. https://doi.org/10.1007/s11042-017-5293-6

  20. H.264/AVC Reference Software JM12.0. 2018. [Online]. Available at http://iphome.hhi.de/suehring/tml/download/old_jm/.

  21. Hu Y, Lee HK, Chen K, Li J (2008) Difference expansion based reversible data hiding using two embedding directions. IEEE Transactions on Multimedia 10(8):1500–1512

    Article  Google Scholar 

  22. Jung KH (2017) A high-capacity reversible data hiding scheme based on sorting and prediction in digital images. Multimed Tools Appl 76(11):13127–13137

    Article  Google Scholar 

  23. Kim H, Kang S (2018) Genuine reversible data hiding technology using compensation for H.264 bitstreams. Multimed Tools Appl 77(7):8043–8060

    Article  MathSciNet  Google Scholar 

  24. Li X, Zhang W, Gui X, Yang B (2013) A novel reversible data hiding scheme based on two-dimensional difference-histogram modification. IEEE Transactions on Information Forensics and Security 8(7):1091–1100

    Article  Google Scholar 

  25. Liu Y, Chen L, Hu M, Jia Z, Jia S, Zhao H (2016) A reversible data hiding method for H.264 with shamir’s (t,n)-threshold secret sharing. Neurocomputing 188:63–70

    Article  Google Scholar 

  26. Liu P, Li S, Wang H (2017) Steganography in vector quantization process of linear predictive coding for low-bit-rate speech codec. Multimedia Systems 23(4):485–497

    Article  Google Scholar 

  27. Ma XJ, Li Z, Tu H, Zhang B (2010) A data hiding algorithm for H.264/AVC video streams without intra-frame distortion drift. IEEE Transactions on Circuits and Systems for Video Technology 20(10):1320–1330

    Article  Google Scholar 

  28. Ma XJ, Yang LT, Xiang Y, Zeng WJ, Zou D, Jin H (2017) Fully reversible privacy region protection for cloud video surveillance. IEEE Transactions on Cloud Computing 5(3):510–522

    Article  Google Scholar 

  29. Ni Z, Shi YQ, Ansari N, Su W (2006) Reversible data hiding. IEEE Transactions on Circuits and Systems for Video Technology 16(3):354–362

    Article  Google Scholar 

  30. Parvez M, Gutub A (2011) Vibrant color image steganography using channel differences and secret data distribution. Kuwait J Sci Eng 38(1B):127–142

    Google Scholar 

  31. Qian ZX, Zhang XP (2016) Reversible data hiding in encrypted images with distributed source encoding. IEEE Transactions on Circuits and Systems for Video Technology 26(4):636–646

    Article  MathSciNet  Google Scholar 

  32. Rabbani M, Joshi R (2002) An overview of the JPEG 2000 still image compression standard. Signal Processing Image Communication 17(1):2–48

    Article  Google Scholar 

  33. Samira B, Hassina A, Latifa H (2012) H.264/AVC data hiding algorithm with a limitation of the drift distortion. In: 2012 IEEE 11th international conference on signal processing, pp 1682–1687

    Chapter  Google Scholar 

  34. Shi YQ, Li XL, Zhang XP, Wu HT, Ma B (2016) Reversible data hiding: advances in the past two decades. IEEE Access 4:3210–3236

    Article  Google Scholar 

  35. Sullivan GJ, Ohm JR, Han WJ et al (2012) Overview of the high efficiency video coding (HEVC) standard. IEEE Transactions on Circuits and Systems for Video Technology 22(12):1649–1668

    Article  Google Scholar 

  36. Wiegand T, Sullivan GJ, Bjontegaard G, Luthra A (2003) Overview of the H.264/AVC video coding standard. IEEE Transactions on Circuits and Systems for Video Technology 13(7):560–576

    Article  Google Scholar 

  37. Xu DW, Wang RD (2016) Two-dimensional reversible data hiding-based approach for intra-frame error concealment in H.264/AVC. Signal Process Image Commun 47:369–379

    Article  Google Scholar 

  38. Xu DW, Wang RD, Shi YQ (2014) An improved reversible data hiding-based approach for intra-frame error concealment in H.264/AVC. J Vis Commun Image Represent 25(2):410–422

    Article  Google Scholar 

  39. Zhang XP, Long J, Wang Z, Cheng H (2016) Lossless and reversible data hiding in encrypted images with public-key cryptography. IEEE Transactions on Circuits and Systems for Video Technology 26(9):1622–1631

    Article  Google Scholar 

  40. Zhang WM, Wang H, Hou D, Yu N (2016) Reversible data hiding in encrypted images by reversible image transformation. IEEE Transactions on Multimedia 18(8):1469–1479

    Article  Google Scholar 

  41. Zhou J, Sun W, Dong J, Liu X, Au OC, Tang YY (2016) Secure reversible image data hiding over encrypted domain via key modulation. IEEE Transactions on Circuits and Systems for Video Technology 26(3):441–452

    Article  Google Scholar 

Download references

Acknowledgements

The authors would like to thank the reviewers for their insightful comments and helpful suggestions. This work was supported by the National Natural Science Foundation of China (NSFC) under the grant No. U1536110 and Doctoral Innovation Fund Program of Southwest Jiaotong University.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Yi Chen or Hongxia Wang.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chen, Y., Wang, H., Wu, H. et al. Reversible video data hiding using zero QDCT coefficient-pairs. Multimed Tools Appl 78, 23097–23115 (2019). https://doi.org/10.1007/s11042-019-7635-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-7635-z

Keywords

Navigation