Journal of Computer Applications ›› 2019, Vol. 39 ›› Issue (3): 756-762.DOI: 10.11772/j.issn.1001-9081.2018071604
Previous Articles Next Articles
NIU Ke1,2, ZHANG Shuo3, YANG Xiaoyuan1,2
Received:
2018-08-02
Revised:
2018-09-19
Online:
2019-03-11
Published:
2019-03-10
Contact:
杨晓元
Supported by:
作者简介:
钮可(1981-),男,浙江湖州人,副教授,博士研究生,主要研究方向:信息隐藏、多媒体安全;张硕(1988-),女,山东日照人,硕士研究生,主要研究方向:军事通信、信息隐藏;杨晓元(1959-),男,湖南湘潭人,教授,博士生导师,硕士,主要研究方向:信息安全、密码学。
基金资助:
CLC Number:
NIU Ke, ZHANG Shuo, YANG Xiaoyuan. Reversible data hiding scheme in encrypted videos based on vector histogram shifting[J]. Journal of Computer Applications, 2019, 39(3): 756-762.
钮可, 张硕, 杨晓元. 基于矢量直方图迁移的视频加密域可逆隐写方案[J]. 计算机应用, 2019, 39(3): 756-762.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2018071604
[1] AL-QERSHI O M, KHOO B E. Two-dimensional difference expansion (2D-DE) scheme with a characteristics-based threshold[J]. Signal Processing, 2013, 93(1):154-162. [2] ALATTAR A M. Reversible watermark using the difference expansion of a generalized integer transform[J]. IEEE Transactions on Image Processing, 2004, 13(8):1147-1156. [3] BARTON J M. Method and apparatus for embedding authentication information within digital data:US, 6523114[P]. 1997-07-08. [4] HONSINGER C W, JONES P W, RABBANI M, et al. Lossless recovery of an original image containing embedded data:US, 77102/E-D[P]. 2001-08-21. [5] COATRIEUX G, Le GUILLOU C, CAUVIN J-M, et al. Reversible watermarking for knowledge digest embedding and reliability control in medical images[J]. IEEE Transactions on Information Technology in Biomedicine, 2009, 13(2):158-165. [6] PENG F, LEI Y, LONG M, et al. A reversible watermarking scheme for two-dimensional CAD engineering graphics based on improved difference expansion[J]. Computer-Aided Design, 2011, 43(8):1018-1024. [7] HWANG K, LI D. Trusted cloud computing with secure resources and data coloring[J]. IEEE Internet Computing, 2010, 14(5):14-22. [8] SHI Y-Q, LI X, ZHANG X, et al. Reversible data hiding:advances in the past two decades[J]. IEEE Access, 2016, 4:3210-3237. [9] TIAN J. Reversible data embedding using a difference expansion[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2003, 13(8):890-896. [10] NI Z, SHI Y Q, ANSARI N, et al. Reversible data hiding[J]. IEEE Transactions on Circuits and System for Video Technology, 2006, 16(3):354-362. [11] LIU Y, JU L, HU M, et al. A robust reversible data hiding scheme for H.264 without distortion drift[J]. Neurocomputing, 2015,151:1053-1062. [12] ZHAO J, LI Z-T, FENG B. A novel two-dimensional histogram modification for reversible data embedding in to stereo H.264 video[J]. Multimedia Tools and Applications, 2016, 75(10):5959-5980. [13] VURAL C, BARAKLI B. Reversible video watermarking using motion-compensated frame interpolation error expansion[J]. Signal, Image and Video Processing, 2015, 9(7):1613-1623. [14] RICHARDSON I E G. H.264 and MPEG-4 Video Compression:Video Coding for Next-generation Multimedia[M]. Hoboken, NJ:John Wiley & Sons, 2003:171-172. [15] FALLAHPOUR M, SEDAAGHI M H. High capacity lossless data hiding based on histogram modification[J]. IEICE Electronics Express, 2007, 4(7):205-210. [16] LEE S-K, SUH Y-H, HO Y-S. Reversiblee image authentication based on watermarking[C]//Proceedings of the 2006 IEEE International Conference on Multimedia and Expo. Washington, DC:IEEE Computer Society, 2006:1321-1324. [17] WANG J, NI J, ZHANG X, et al. Rate and distortion optimization for reversible data hiding using multiple histogram shifting[J]. IEEE Transactions on Cybernetics, 2017, 47(2):315-326. [18] 毕厚杰,王健.新一代视频压缩编码标准:H.264/AVC[M].2版.北京:人民邮电出版社,2009:114.(BI H J, WANG J. New Generation Video Compression Coding Standard:H.264/AVC[M]. 2nd ed. Beijing:Posts & Telecom Press, 2009:114.) [19] WEI S-T, TIEN C-W, LIU B-D, et al. Adaptive truncation algorithm for Hadamard-transformed H.264/AVC lossless video coding[J]. IEEE Transactions on Circuits and System for Video Technology, 2011, 21(5):538-548. [20] XU D, WANG R, SHI Y Q. Data hiding in encrypted H.264/AVC video streams by codeword substitution[J]. IEEE Transactions on Information Forensics and Security, 2014, 9(4):596-606. [21] STUTZ T, UHL A. A survey of H.264 AVC/SVC encryption[J]. IEEE Transactions on Circuits and System for Video Technology, 2012, 22(3):325-339. [22] XU D, WANG R, SHI Y Q. Reversible data hiding in encrypted H.264/AVC video streams[C]//Proceedings of the 2013 International Workshop on Digital Watermarking, LNCS 8389. Berlin:Springer, 2013:141-152. [23] MUHIT A A, PICKERING M R, FRATER M R, et al. Video coding using elastic motion model and larger blocks[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2010, 20(5):661-672. [24] MUHIT A A, PICKERING M R, FRATER M R, et al. Video coding using fast geometry-adaptive partitioning and an elastic motion model[J]. Journal of Visual Communication and Image Representation, 2012, 23(1):31-41. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||