Selective Embedding and Forbidden Zone Data Hiding for Strong Video Data Thrashing

  ijett-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2013 by IJETT Journal
Volume-4 Issue-9                      
Year of Publication : 2013
Authors : R. Ravi Kumar , V. Kesav Kumar

Citation 

R. Ravi Kumar , V. Kesav Kumar. "Selective Embedding and Forbidden Zone Data Hiding for Strong Video Data Thrashing". International Journal of Engineering Trends and Technology (IJETT). V4(9):4188-4192 Sep 2013. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group.

Abstract

A new method for high capacity data hiding in H.264 streams takes advantage of the different block sizes used by the H.264 encoder during the inter prediction stage in order to hide the desirable dat a. This fragile data hiding approach can be mainly used for content - based authentication and covert communication. Information - theoretic analyses for data hiding prescribe embedding the hidden data in the choice of quantizer for the host data. The hidden d ata can be recovered reliably under attacks, such as compression and limited amounts of image tampering and image resizing. The three main findings are as follows. 1) In order to limit perceivable distortion while hiding large amounts of data. 2) The use o f local criteria to choose where to hide data can potentially cause desynchronization of the encoder and decoder. 3) For simplicity, scalar quantization - based hiding is employed, even though information - theoretic guidelines prescribe vector quantization - ba sed methods. We begin with a review of two major types of embedding, based on which we propose a new multilevel embedding framework to allow the amount of extractable data to be adaptive according to the actual noise condition. We propose a new video data hiding method that makes use of erasure correction capability of repeat accumulate codes and superiority of forbidden zone data hiding . Selective embedding is utilized in the proposed method to determine host signal samples suitable for data hiding. The de coding error values are reported for typical system parameters. The simulation results indicate that the framework can be successfully utilized in video data hiding applications.

References

[1] S. K. Kapotas, E. E. Varsaki, and A. N. Skodras, “Data hiding in H - 264 encoded video sequences,” in Proc. IEEE 9 th Workshop Mul timedia Signal Process. , Oct. 2007, pp. 373 – 376.
[2] A. Sarkar, U. Madhow, S. Chandrasekaran, and B. S. Manjunath, “Adaptive MPEG - 2 video data hiding scheme,” in Proc. 9th SPIE Security Steganography Watermarking Multimedia Contents , 2007, pp. 373 – 376.
[3] K. Solanki, N. Jacobsen, U. Madhow, B. S. Manjunath, and S. Chandrasekaran, “Robust image - adaptive data hiding using erasure and error correction,” IEEE Trans. Image Process. , vol. 13, no. 12, pp. 1627 – 1639, Dec. 2004.
[4] M. Schlauweg, D. Profrock, and E. Muller, “Correction of insertions and deletions in selective watermarking,” in Proc. IEEE Int. Conf. SITIS , Nov. – Dec. 2008, pp. 277 – 284.
[5] H. Liu, J. Huang, and Y. Q. Shi, “DWT - based video data hiding robust to MPEG compression and frame loss,” Int. J. Image Graph. , vol. 5, no. 1, pp. 111 – 134, Jan. 2005.
[6] E. Esen and A. A. Alatan, “Forbidden zone data hiding,” in Proc. IEEE Int. Conf. Image Process. , Oct. 2006, pp. 1393 – 1396.
[7] B. Chen and G. W. Wornell, “Quantization index modulation: A class of provably good methods for digital watermarking and information embedding,” IEEE Trans. Inform. Theory , vol. 47, no. 4, pp. 1423 – 1443, May 2001.
[8] E. Esen, Z. Do ?gan, T. K. Ates, and A. A. Alatan, “Comparison of quantization index modulation and forbidden zone data hiding for compressed domain video data hiding,” in Proc. IEEE 17th Signal Process. Commun. Applicat. Conf. , Apr. 2009, pp. 404 – 407.
[9] M. Maes, T. K alker, J. Haitsma, and G. Depovere, “Exploiting shift invariance to obtain a high payload in digital image watermarking,” in Proc. IEEE ICMCS , vol. 1. Jul. 1999, pp. 7 – 12.
[10] T. Kalker, G. Depovere, J. Haitsma, and M. J. Maes, “Video watermarking system for broadcast monitoring,” in Proc. SPIE Security Watermarking Multimedia Contents Conf. , vol. 3657. 1999, pp. 103 – 112.
[11] G. Tardos, “Optimal probabilistic fingerprint codes,” in Proc. 35th Annu. ACM STOC , 2003, pp. 116 – 125.
[12] Y. Bodo, N. Laurent, J. - L. Dugelay, “Watermarking Video, Hierarchical Embedding in Motion Vectors”, Proc. Int. Conference on Image Processing, Sept. 2003.
[13] M. Wu, H. Yu, and B. Liu, “Data hiding in image and video: I. Fundamental issues and solutions, ” IEEE Trans. Image Process. , vol. 12, no. 6, pp. 685 – 695, Jun. 2003.

Keywords
Data Hiding, covert communication, authentication, Quantization, Selective Embedding, Forbidden Zone Data Hiding