2017
DOI: 10.1007/s11554-017-0727-y
|View full text |Cite
|
Sign up to set email alerts
|

Separable reversible data hiding and encryption for HEVC video

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
47
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 71 publications
(47 citation statements)
references
References 27 publications
0
47
0
Order By: Relevance
“…In the last paper of the second theme entitled ''Separable Reversible Data Hiding and Encryption for HEVC Video'' by Long et al [15], one can encrypt the signs and amplitudes of motion vector differences (MVD) and the signs of residual coefficients with an encryption key by using RC4, while another can hide data into nonzero AC residual coefficients with a hiding key. For the decoding phase, one can decrypt the HEVC video and obtain a HEVC video similar to the original one if he only has the encryption key; he can extract the hiding data without knowing the HEVC video content if he only has the hiding key; he can extract the hiding data and recover the original HEVC video if he has both the encryption key and hiding key.…”
Section: Real-time Data Hiding and Visual Cryptographymentioning
confidence: 99%
“…In the last paper of the second theme entitled ''Separable Reversible Data Hiding and Encryption for HEVC Video'' by Long et al [15], one can encrypt the signs and amplitudes of motion vector differences (MVD) and the signs of residual coefficients with an encryption key by using RC4, while another can hide data into nonzero AC residual coefficients with a hiding key. For the decoding phase, one can decrypt the HEVC video and obtain a HEVC video similar to the original one if he only has the encryption key; he can extract the hiding data without knowing the HEVC video content if he only has the hiding key; he can extract the hiding data and recover the original HEVC video if he has both the encryption key and hiding key.…”
Section: Real-time Data Hiding and Visual Cryptographymentioning
confidence: 99%
“…Therefore, compared with images, videos have much more research room to develop the techniques of RDH and DH. Recently, as the development of video compression standard, such as H.264/advanced video coding (AVC) 9 and high-efficiency video coding (HEVC), 10 some video DH methods 2,[11][12][13][14][15][16] and video RDH methods [17][18][19][20][21][22][23] are reported. For these DH methods, they are proposed for improving embedding capacity, 12,14 stopping intra-frame drift, 11,13,16 and reducing bit-rate increase.…”
Section: Introductionmentioning
confidence: 99%
“…For these DH methods, they are proposed for improving embedding capacity, 12,14 stopping intra-frame drift, 11,13,16 and reducing bit-rate increase. 24 For these RDH methods, they are proposed for improving error concealments performance, 18 making embedding capacity larger, 17 protecting privacy, 20,23 and preventing inter-frame distortion drift. 19 However, compared with the development of RDH technique in images, it is not enough.…”
Section: Introductionmentioning
confidence: 99%
“…In recent years, various technologies have been broadly used for data privacy protection, such as private information retrieval [6][7][8][9][10][11], searchable encryption [12][13][14][15][16][17], and secure multi-party computation [18][19][20][21][22][23], but these technologies can only provide limited functions, such as keyword search, order search, range query, and subset search. However, for many application scenarios in the cloud environment, it requires various types operations of ciphertext data.…”
Section: Introductionmentioning
confidence: 99%