Information Thrashing in to Encrypted H.264/AVC Videotape Streams by Secret Code Exchange

  IJPTT-book-cover
 
International Journal of P2P Network Trends and Technology (IJPTT)          
 
© 2016 by IJPTT Journal
Volume - 6 Issue - 2
Year of Publication : 2016
Authors : Ms.N.Zahira Jahan, Mr. S.Sugankumar
DOI :  10.14445/22492615/IJPTT-V24P403

Citation

Ms.N.Zahira Jahan, Mr. S.Sugankumar "Information Thrashing in to Encrypted H.264/AVC Videotape Streams by Secret Code Exchange". International Journal of P2P Network Trends and Technology (IJPTT), V6(2):20-26 Mar - Apr 2016, ISSN:2249-2615, www.ijpttjournal.org, Published by Seventh Sense Research Group.

Abstract

Digital videotape at times requirements near be stored and processed in an encrypted layout to keep sanctuary and seclusion. Used for the principle of comfortable information with tampering appreciation, it is basic to complete information thrashing in these encrypted video. Into this system, information thrashing into encrypted sphere personal of decryption protects the privacy of the restful .In reckoning, it is additional inventive present decryption follow by data thrashing along with encryption. Into this serious newspaper, a original format of information thrashing openly in the encrypted description of H.264/AVC videotape river is projected, which include the subsequent three part, videotape encryption, information embed, and information removal. By analyzing the possessions of H.264/AVC code, the codeword’s of intraprediction and the codeword’s of enduring coefficients are encrypted with torrent ciphers. Then, a in turn hider may surround supplementary data in the encrypted domain by using code word substitution procedure, without perceptive the original videotape contented. In instruct to adapt to different application scenarios, information extraction can be done whichever in the encrypted domain or in the decrypted domain. Videotape dossier extent is harshly conserved even after encryption and data embed. Tentative grades comprise established the probability in addition to good organization of the planned methods.

References

[1] W. J. Lu, A. Varna, and M. Wu, ?Secure video processing: Problems and challenges, in Proc. IEEE Int. Conf. Account., Speech, Signal Processing, Prague, Czech Republic, May 2011, pp. 5856–5859.
[2] B. Zhao, W. D. Kou, and H. Li, ?Effective watermarking scheme in the encrypted domain for buyer-seller watermarking protocol, Inf. Sci., vol. 180, no. 23, pp. 4672–4684, 2010.
[3] P. J. Zhen and J. W. Huang, ?Walsh-Hadamard transform in the homomorphism encrypted domain and its application in image watermarking, in Proc. 14th Inf. Hiding Conf., Berkeley, CA, USA, 2012, pp. 1–15.
[4] W. Puech, M. Chaumont, and O. Strauss, ?A reversible data hiding method for encrypted images, Proc. SPIE, vol. 6819, pp. 68191E-1–68191E-9, Jan. 2008.
[5] X. P. Zhang, ?Reversible data hiding in encrypted image, IEEE Signal Process. Lett., vol. 18, no. 4, pp. 255–258, Apr. 2011.
[6] W. Hong, T. S. Chen, and H. Y. Wu, ?An improved reversible data hiding in encrypted images using side match, IEEE Signal Process.Lett., vol. 19, no. 4, pp. 199–202, Apr. 2012.
[7] X. P. Zhang, ?Separable reversible data hiding in encrypted image, IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 826–832, Apr. 2012.
[8] K. D. Ma, W. M. Zhang, X. F. Zhao, N. Yu, and F. Li, ?Reversible data hiding in encrypted images by reserving room before encryption, IEEETrans. Inf. Forensics Security, vol. 8, no. 3, pp. 553–562, Mar. 2013.
[9] A. V. Subramanyam, S. Emmanuel, and M. S. Kankanhalli, ?Robustwatermarking of compressed and encrypted JPEG2000 images, IEEETrans. Multimedia, vol. 14, no. 3, pp. 703–716, Jun. 2012.
[10] S. G. Lian, Z. X. Liu, and Z. Ren, ?Commutative encryption andwatermarking in video compression, IEEE Trans. Circuits Syst. VideoTechnol., vol. 17, no. 6, pp. 774–778, Jun. 2007.
[11] S. W. Park and S. U. Shin, ?Combined scheme of encryption andwatermarking in H.264/scalable video coding (SVC), New DirectionsIntell. Interact. Multimedia, vol. 142, no. 1, pp. 351– 361, 2008.
[12] T. Wiegand, G. J. Sullivan, G. Bjontegaard, and A. Luthra, ?Overviewed the H.264/AVC video coding standard, IEEE Trans. Circuits Syst.Video Technol., vol. 13, no. 7, pp. 560– 576, Jul. 2003

Keywords
Data hiding, encrypted domain, H.264/AVC, codeword substituting.