Access the full text.
Sign up today, get DeepDyve free for 14 days.
(2002)
Mihcak, “A framework for evaluating the datahiding capacity of image sources,
J. Scharinger (1997)
Fast encryption of image data using chaotic Kolmogorov flows, 3022
Ming Yang, N. Bourbakis (2005)
A high bitrate information hiding algorithm for digital video content under H.264/AVC compression48th Midwest Symposium on Circuits and Systems, 2005.
Lei Tang (1997)
Methods for encrypting and decrypting MPEG video data efficiently
Frank Gadegast (1998)
Securitymechanisms for Multimedia-Data with the Example MPEG-I-Video
G. Spanos, Tracy Maples (1995)
Performance Study of a Selective Encryption Scheme for the Security of Networked, Real-Time VideoProceedings of Fourth International Conference on Computer Communications and Networks - IC3N'95
M. Hassan, I. Abuhaiba (2011)
Image Encryption Using Differential Evolution Approach in Frequency DomainArXiv, abs/1103.5783
Chuhong Fei, D. Kundur, R. Kwong (2001)
The choice of watermark domain in the presence of compressionProceedings International Conference on Information Technology: Coding and Computing
EncryptionLintian Qiao, K. Nahrstedt (1997)
A New Algorithm for MPEG Video
H. Chang, Jiang-Long Liu (1997)
A linear quadtree compression scheme for image encryptionSignal Process. Image Commun., 10
D. Kundur (2000)
Implications for high capacity data hiding in the presence of lossy compressionProceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540)
S. Westen, R. Lagendijk, J. Biemond (1995)
Perceptual optimization of image coding algorithmsProceedings., International Conference on Image Processing, 2
K. Solanki, N. Jacobsen, S. Chandrasekaran, Upamanyu Madhow, B. Manjunath (2002)
High-volume data hiding in images: Introducing perceptual criteria into quantization based embedding2002 IEEE International Conference on Acoustics, Speech, and Signal Processing, 4
Changgui Shi, B. Bhargava (1998)
A fast MPEG video encryption algorithm
M. Swanson, B. Zhu, A. Tewfik (1997)
Data hiding for video-in-videoProceedings of International Conference on Image Processing, 2
A. Tekalp (1995)
Digital Video Processing
Zhicheng Ni, Y. Shi, N. Ansari, W. Su, Qibin Sun, Xiao Lin (2004)
Robust lossless image data hiding2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763), 3
Faisal Alturki, R. Mersereau (2001)
A novel approach for increasing security and data embedding capacity in images for data hiding applicationsProceedings International Conference on Information Technology: Coding and Computing
Changgui Shi, B. Bhargava (1998)
An efficient MPEG video encryption algorithmProceedings Seventeenth IEEE Symposium on Reliable Distributed Systems (Cat. No.98CB36281)
J. Solomon, A. Watson, A. Ahumada (1994)
Visibility of DCT basis functions: effects of contrast maskingProceedings of IEEE Data Compression Conference (DCC'94)
M. Yang, N. Bourbakis, Shujun Li (2004)
Data-image-video encryptionIEEE Potentials, 23
Ching-Yung Lin, Shih-Fu Chang (2001)
Watermarking capacity of digital images based on domain-specific masking effectsProceedings International Conference on Information Technology: Coding and Computing
D. Mukherjee, J. Chae, S. Mitra (1998)
A source and channel coding approach to data hiding with application to hiding speech in videoProceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269), 1
(1995)
Gadegast, “Security mechanisms for multimedia-data with the example MPEG-I video,
Bilge Günsel, U. Uludag, A. Tekalp (2002)
Robust watermarking of fingerprint imagesPattern Recognit., 35
J. Chae, B. Manjunath (1999)
Data hiding in videoProceedings 1999 International Conference on Image Processing (Cat. 99CH36348), 1
Yu-Lun Wang, E. Izquierdo (2002)
High-capacity data hiding in MPEG-2 compressed video
(1999)
A new multi-resolution approach to still image encryption,
A. Watson (1993)
DCT quantization matrices visually optimized for individual images, 1913
J. Briffa, M. Das (2003)
Channel models for high-capacity information hiding in images, 4793
(2005)
A high bitrate multimedia information hiding algorithm in DCT domain,
S. Maniccam, N. Bourbakis (2004)
Lossless compression and information hiding in imagesPattern Recognit., 37
P. Moulin, M. Mihçak (2002)
A framework for evaluating the data-hiding capacity of image sourcesIEEE transactions on image processing : a publication of the IEEE Signal Processing Society, 11 9
With the proliferation of digital multimedia content, information hiding techniques have attracted more and more research interests. Information hiding not only hides the content and location of the protected data, but also hides its very existence. High-bitrate information hiding is different from digital watermarking in that it tries to hide relatively large amounts of auxiliary information instead of just one or a few verification bits. This research is mainly concerned with channel capacity and robustness to lossy image/video codec. In the proposed DCT (discrete cosine transformation) domain algorithm, 1 bit is hidden within each 8×8 DCT coefficient block by means of vector quantization. A mathematical model has been proposed to predict the bit error rate (BER) of the algorithm under transformation-based lossy compression. The channel capacity can be increased 4-fold with further performance improvement. Digital video information hiding is a natural extension of digital image information hiding. Experimental results show that the proposed algorithm is very robust to lossy image/video codec. It is also observed that hidden information within different types of frames/slices have different levels of robustness against H.264/AVC compression. The proposed algorithm shall be very useful in practical applications such as side information delivery, captioning, video-in-video, and speech-in-video.
Journal of Electronic Imaging – SPIE
Published: Jan 1, 2007
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.