Early research works have been done on image. Due to few features of images, such as high correlation among pixels and bulk data capacity , previous encryption algorithms are not suitable. Cloud computing has become an important technology trend, which can provide large-scale storage solution and highly efficient computation for video data. It is desired that the video content is accessible in encrypted form to protect from untrustworthy system administrators. The capability of performing data hiding is done in encrypted H.264/AVC video bitstreams which would avoid the leakage of video information also can help to maintain security and privacy concerns with cloud computing. During H.264/AVC compression, the intra-prediction mode (IPM), motion vector difference (MVD) and DCT coefficients’ signs are encrypted. For the purpose of content notation and tampering detection, it is necessary to perform data hiding in these encrypted videos. In system, a novel scheme of data hiding is proposed, which includes three section as follows, i.e., H.264/AVC video encryption, data encryption , and data decryption. Chaos crypto system is used here to encrypt/decrypt secret text data before/after data embedding/extraction. video file size is strictly preserved even after encryption and data embedding .
[1]
Mohan S. Kankanhalli,et al.
Robust Watermarking of Compressed and Encrypted JPEG2000 Images
,
2012,
IEEE Transactions on Multimedia.
[2]
Jun Zhang,et al.
Effective watermarking scheme in the encrypted domain for buyer-seller watermarking protocol
,
2010,
Inf. Sci..
[3]
Peijia Zheng,et al.
Walsh-Hadamard Transform in the Homomorphic Encrypted Domain and Its Application in Image Watermarking
,
2012,
Information Hiding.
[4]
Min Wu,et al.
Secure video processing: Problems and challenges
,
2011,
2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[5]
Po-Yueh Chen,et al.
A DWT Based Approach for Image Steganography
,
2006
.
[6]
S. Mishra,et al.
Chaos based encryption technique for digital images
,
2011,
ICWET.
[7]
Rangding Wang,et al.
Data Hiding in Encrypted H.264/AVC Video Streams by Codeword Substitution
,
2014,
IEEE Transactions on Information Forensics and Security.