Main Article Content

Abstract

The paper presents that encryption of compressed video bit streams and hiding privacy information to protect videos during transmission or cloud storage. Digital video sometimes needs to be stored and processed in an encrypted format to maintain security and privacy. Here, data hiding directly in the encrypted version of H.264/AVC video stream is approached, which includes the following three parts. By analyzing he property of H.264/AVC codec, the code words of intra prediction modes, the code words of motion vector differences, and the code words of residual coefficients are encrypted with stream ciphers. Then, a data hider may embed additional data in the encrypted domain by using wrapping technique, without knowing the original video content. The paper results shows that used methods provides better performance in terms of computation efficiency, high data security and video quality after decryption. The parameters such as RMSE, PSNR, CC are evaluated to measure its efficiency

Keywords

Privacy H.264 Compression chaos encryption Bit wrapping based data hiding.

Article Details

How to Cite
Rajagopalan, P., & Gengaiyan, S. K. (2015). PRIVACY INFORMATION PROTECTION IN AN ENCRYPTED COMPRESSED H.264 VIDEO BITSTREAM. International Journal of Students’ Research in Technology & Management, 3(4), 343–345. https://doi.org/10.18510/ijsrtm.2015.349

References

  1. W. J. Lu, A. Varna, and M. Wu, “Secure video processing: Problems and challenges,†in Proc. IEEE Int. Conf. Acoust., Speech, Signal Processing, Prague, Czech Republic, May 2011, pp. 5856–5859.
  2. B. Zhao, W. D. Kou, and H. Li, “Effective watermarking scheme in the encrypted domain for buyer-seller watermarking protocol,†Inf. Sci., vol. 180, no. 23, pp. 4672–4684, 2010. DOI: https://doi.org/10.1016/j.ins.2010.08.003
  3. W. Puech, M. Chaumont, and O. Strauss, “A reversible data hiding method for encrypted images,†Proc. SPIE, vol. 6819, pp. 68191E-1–68191E-9, Jan. 2008 DOI: https://doi.org/10.1117/12.766754
  4. X. P. Zhang, “Reversible data hiding in encrypted image,†IEEE Signal Process. Lett., vol. 18, no. 4, pp. 255–258, Apr. 2011. DOI: https://doi.org/10.1109/LSP.2011.2114651
  5. W. Hong, T. S. Chen, and H. Y. Wu, “An improved reversible data hiding in encrypted images using side match,†IEEE Signal Process. Lett., vol. 19, no. 4, pp. 199–202, Apr. 2012. DOI: https://doi.org/10.1109/LSP.2012.2187334
  6. X. P. Zhang, “Separable reversible data hiding in encrypted image,†IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 826–832, Apr. 2012 DOI: https://doi.org/10.1109/TIFS.2011.2176120
  7. K. D. Ma, W. M. Zhang, X. F. Zhao, N. Yu, and F. Li, “Reversible data hiding in encrypted images by reserving room before encryption,†IEEE Trans. Inf. Forensics Security, vol. 8, no. 3, pp. 553–562, Mar. 2013. DOI: https://doi.org/10.1109/TIFS.2013.2248725