2016
DOI: 10.1016/j.sigpro.2016.05.004
|View full text |Cite
|
Sign up to set email alerts
|

Inter-frame distortion drift analysis for reversible data hiding in encrypted H.264/AVC video bitstreams

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
37
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 58 publications
(37 citation statements)
references
References 25 publications
0
37
0
Order By: Relevance
“…In previous work , some efficient algorithms for embedding data into encrypted H.264/AVC video using code word/bin‐string substitution were proposed. In H.264/AVC, when the absolute value of the nonzero QTCs do not exceed 15, there are no suitable bin strings to be used for data hiding .…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…In previous work , some efficient algorithms for embedding data into encrypted H.264/AVC video using code word/bin‐string substitution were proposed. In H.264/AVC, when the absolute value of the nonzero QTCs do not exceed 15, there are no suitable bin strings to be used for data hiding .…”
Section: Resultsmentioning
confidence: 99%
“…Therefore, we subsequently proposed some data hiding methods for encrypted H.264/AVC videos based on the CABAC bin‐string substitution . It should be noted that reversible data hiding in encrypted H.264/AVC videos were designed in .…”
Section: Introductionmentioning
confidence: 99%
“…where d A 1 , d A 2 , and d A 3 denote average modification rate per coefficient-pair corresponding to the sets A 1 , A 2 , and A 3 , respectively. Thereby, equation (19) can be rewritten as In fact, the embedding distortion cannot be measured by equation (19) since H.264/AVC has intraframe and inter-frame predictions. Equation (19) can stand for total number of modification on QDCT coefficients but not embedding distortion.…”
Section: Analysis Of Embedding Capacity and Distortionmentioning
confidence: 99%
“…Steganalysis is used to detect the stego objects and extract the secret messages. Among steganographic algorithms ; Zhang, Qin, Zhang et al (2018); Yao, Zhang and Yu (2016); Tang, Chen, Zhang et al (2015)] with text, image, and video as cover, the image steganographic algorithms attract widespread attention from steganalysts. Steganalysts have designed numerous effective steganalysis algorithms [Yang, Liu, Luo et al (2013); Pevný, Bas and Fridrich (2010)] for a number of classic image steganographic algorithms such as least significant bit steganography (LSB), F5 [Westfeld (2001)], and MB [Sallee (2005)], where many steganalysis algorithms could even locate or extract the secret messages in certain cases [Yang, Luo, Lu et al (2018)].…”
Section: Introductionmentioning
confidence: 99%