Next Article in Journal
New Analytical Solutions for Coupled Stochastic Korteweg–de Vries Equations via Generalized Derivatives
Previous Article in Journal
Highly Efficient Numerical Integrator for the Circular Restricted Three-Body Problem
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Reversible Data Hiding Scheme Based on Coefficient Pair Mapping for Videos H.264/AVC without Distortion Drift

School of Engineering and Technology, Tra Vinh University, Tra Vinh 87110, Vietnam
Symmetry 2022, 14(9), 1768; https://doi.org/10.3390/sym14091768
Submission received: 19 July 2022 / Revised: 10 August 2022 / Accepted: 17 August 2022 / Published: 25 August 2022
(This article belongs to the Section Computer)

Abstract

:
Reversible data hiding is a technique for embedding secret data into a cover media. Such technique has the ability to recover marked cover media to its original version after extracting the secret data. In this paper, a new reversible data hiding algorithm for videos H.264/AVC is proposed to improve the embedding capacity while the distortion drift is prevented. To embed the secret data into videos H.264/AVC without any intra-frame distortion drift, in our proposed scheme, the relationship of QDCT coefficients is explored. Then, a coefficient pair mapping mechanism in 2D histogram is introduced for embedding data. The experimental results demonstrated that the proposed scheme obtains reversibility. The proposed scheme prevents intra-frame distortion drift on the marked videos. In addition, the embedding capacity of the proposed scheme is superior to that of existing schemes while guaranteeing the high visual quality of marked videos.

1. Introduction

A huge amount of digital data containing private information is transmitted through the Internet each second. To prevent third parties from accessing the private information, many studies [1,2,3,4,5,6,7,8,9,10,11,12,13,14,15] have been proposed. Data hiding is one of the promising techniques to conceal digital secret message into the cover media i.e., audios, images, videos, database, DNA sequence, etc., to protect the security and privacy of such digital information from malicious attacks. Many data hiding algorithms [1,2,3,4,5,6,7,16,17,18,19,20] have been proposed for digital cover media in the last ten years.
Recently, Video, one of digital media, is used for data hiding due to its wide applications, i.e., surveillance camera and YouTube channels. In 2003, I.E.G. Richardson [8], proposed a new compression technique for video, called H.264/AVC (advanced video coding) for compressing the video sequences to save storage space. Recently, many data hiding schemes based on H.264/AVC coding [9,10,11,12,13,14,15,21,22,23] have been proposed to enhance the security of video sequences. In [9], Nguyen et al. embedded the secret data into motion vectors. However, their scheme obtained the low embedding capacity (EC), always smaller than 2 Kbit. Later on, to improve robustness, Zhang et al. [10] proposed a new scheme to embed a 2-D 8-bit watermark into the videos. Noorkami and Mersereau [11] used the quantized AC coefficients to conceal the watermark into H.264/AVC videos. Later, to enhance the robustness, Gong and Lu [12] employed a texture-masking-based perceptual model to hide the secret data. However, in two aforementioned schemes [11,12], the original version of embedded watermark is required to evaluate the existence of the embedded watermark in the marked video sequences.
Discrete cosine transform (DCT) coefficients of I-frames were used in all state-of-the-art schemes for embedding data into video sequences. However, these schemes suffered the intra-frame distortion drift issue. In order to solve this problem, Ma et al. [13] proposed a novel DCT-based data hiding algorithm by selecting three quantized DCT paired-coefficients (QDCT) for carrying the secret data. Nevertheless, their scheme provided the low visual quality of marked video sequences, and unsatisfied embedding capacity. In 2011, Huo et al. [14] applied controllable error-drift elimination for a new data hiding scheme to enhance the quality of the marked videos. However, their scheme offered a low embedding capacity. In 2013, to increase embedding capacity of Ma et al.’s scheme [13], in [15], Lin et al. explored the QDCT coefficients’ characteristic for data embedding. Lin et al.’s scheme obtained a higher embedding capacity than that of Ma et al.’s scheme. However, the scheme [15] obtained the unsatisfactory quality of marked videos. To enhance visual quality of marked videos while keeping high EC, Nguyen et al. [23] partitioned the blocks into two coefficient groups, i.e., hiding coefficient group and preventing coefficient group. Then, the coefficients in the hiding group are applied to conceal the secret information while the other group is utilized to avoid the distortion drift in the marked video sequences. Their scheme obtained high performance in terms of EC while maintaining good quality of marked videos. However, their cover videos are affected permanently and cannot be restored to their original version.
In order to solve this shortcoming, in 2006, Ni et al. [21] introduced histogram shifting (HS) to reversible data hiding (RDH) scheme for still images. In their scheme, zero-point values and peak-point values of the histogram are utilized to hide data. Ni et al.’s scheme guaranteed the reversibility. However, their visual quality of marked images is always smaller than 49 dB for different kinds of images. To improve the visual quality further, some RDH schemes based on histogram shifting [4,7] are proposed. Recently, several RDH studies are proposed for H.264/AVC videos [22,24,25,26,27,28]. The secret data can be embedded into the QDCT coefficients of intra-frames, which meet the directions of intra-frame prediction, therefore they could avert the distortion drift [24,25]. The algorithm [24] could achieve good visual distortion while the algorithm [25] improved the robustness by using BCH syndrome code before data hiding. However, these schemes [24,25] obtained the low EC. Later on, RDH schemes [26,27] applied motion vector (MV) data pre-processing, the selection of most suitable embedding region for H.264/AVC code. However, Chung et al.’s method [26] only embedded MVs of MBs into zero QDCT coefficients. To solve the shortcoming in Chung et al.’s scheme, in [28]. Xu et al. fully exploited the number of coefficients and produced extra nonzero residual blocks for embedding data. Although, these schemes [26,27,28] achieved the good quality of marked videos, however, their schemes suffered the distortion drift. To avert the distortion drift, in [22], Liu et al. used Shamir’s (t, n)-threshold secret sharing to embed the secret data into videos H.264/AVC. However, the EC of Liu et al.’s scheme is too low, when it is always smaller than 200 bits.
To avoid distortion drift, many data hiding schemes [13,15,22,23] have been proposed. However, most of them suffered from the low EC. Moreover, after containing the secret data, the marked videos obtained by these previous schemes are affected permanently and cannot be restored to their original version to improve. Inspired from the histogram shifting-based RDH scheme [21] for the still images, in this paper, to further improve embedding capacity while obtaining reversibility, a new RDH scheme is proposed for H.264/AVC videos. In the proposed scheme, to prevent the distortion drift, QDCT coefficient pairs of H.264/AVC videos are selected according to its context. Then, to achieve reversibility, a 2D histogram is generated by counting suitable QDCT coefficient pairs. The CPM mapping, injective mapping, is defined to project a coefficient pair to another pair for embedding the secret data. To enhance the security, the secret data are encrypted by using symmetric key cryptography. Finally, RDH algorithm is implemented by using CPM mapping. By using the 2D histogram and the CPM mapping, more pairs are applied to contain the secret bits while the distortion drift is avoided as well. Experimental results illustrated that our proposed scheme obtains reversibility. In addition, the proposed scheme outperforms some previous schemes in terms of the EC while maintaining good visual quality of marked videos.
The remainder of our paper is organized as follows. In Section 2, related works are briefly introduced. Then, our proposed scheme based on CPM and 2D histogram mechanisms is described in Section 3. Section 4 presents the experimental results. Finally, conclusions are drawn in Section 5.

2. Related Works

2.1. Intra-Frame Prediction

H.264/AVC coding [8] is proposed to decrease the redundancy of Intra-frames. H.264/AVC algorithm partitions intra-frames into 4 × 4 or 16 × 16 macroblocks (MBs). However, the alternation of 16 × 16 intra MBs is easy to be recognized in a human eye system. Therefore, to overcome this shortcoming, 4 × 4 intra MB blocks are usually used for further processing. In the H.264/AVC algorithm, the left block and the upper block are used to predict the values of the current luminance block. Sixteen samples of the current block in Figure 1, labeled from a to p in the current luminance block, will be predicted according to the boundary pixels of the left and upper blocks, labeled from A to M. The prediction of current luminance block B i , j ^ is calculated by one of nine modes, shown as in Figure 2.

2.2. DCT-Based Data Hiding Schemes for Video H.264/AVC

In [13], Ma et al. divided 4 × 4 blocks into three different conditions, i.e., Condition 1, Condition 2, and Condition 3, as shown in Table 1. Condition 1, named Right-Mode, is defined by prediction of the right block, effects by mode 0, 3, or 7. Meanwhile, Condition 2 is determined by Under-Left-Mode ∈ {0, 1, 2, 3, 4, 5, 6, 8} and Under-Mode ∈ {1, 8} in 4 × 4 block mode. The determination of Condition 3 is performed by Under-Right-Mode ∈ {0, 1, 2, 3, 7, 8}. By doing so, Ma et al.’s scheme [13] prevented the distortion drift in the MB blocks during the embedding process. However, Ma et al.’s scheme offered the low EC.
Later on, to increase the EC of Ma et al.’s scheme, in [15], Lin et al. fully exploited the characteristic of MB blocks; up to the remaining 54% MB blocks are used for embedding. For embedding data, Lin et al. re-classified 4 × 4 blocks into five different categories, i.e., Cat1, Cat2, Cat3, Cat4, and Cat5. Then, the Cat3 has no reference pixels, thus, they can embed more secret bits, up to 16 bits into one block. While the reference pixels in Cat5 are all of the pixels at under and right of the block, so only one bit can be embedded. According to schemes [13,15], three types can be launched as shown in Table 2. In Type 1, Condition 1 is equal to True (T) and Condition 2 is equal to False (F), respectively. This type refers to pixels d, h, l, and p. The Case2, with the reference pixels m, n, o and p, is used if the Condition 2 is True, and Condition 1 is False. For the Type 3, by reference pixel is p, the Condition 3 must be True, but the Condition 1 and Condition 2 are both False.
By applying five categories, Lin et al.’s scheme [15] obtained the higher EC when the remaining 54% of MB blocks are exploited. However, Lin et al.’s scheme suffered losing a part of the video stream which cannot be completely recovered after extracting the secret data. Therefore, to reconstruct the marked videos to its original version completely, the new RDH scheme for videos H.264/AVC is proposed and described in the next section to obtain reversibility while maintaining the high EC and good quality of marked videos.

3. Proposed Scheme

In this section, the RDH scheme is proposed without intra-frame distortion drift. In the proposed scheme, an 2D QDCT histogram is constructed. Then, a coefficient pair mapping (CPM) which is an injective mapping defined on QDCT pairs is used for embedding data. In this section, we first introduce the CPM technique defined on QDCT coefficient pairs in Section 3.1. Then in Section 3.2, we present our CPM-based RDH scheme. By using the 2D QDCT histogram, the secret data can be embedded by our approach without any distortion drift while the reversibility is maintained. Then, the detailed embedding and extracting algorithms of our proposed scheme are summarized in Section 3.3 and 3.4, respectively.

3.1. Coefficient Pair Mapping

In H.264/AVC coding, integer discrete cosine transform (IDCT) is used for the 4 × 4 residual block Ri,j. Then, Equation (1) is applied to generate quantized DCT (QDCT) coefficients.
R i , j q d c t = C f R i , j C f T P F Q = Y 1 , 1 Y 1 , 2 Y 1 , 3 Y 1 , 4 Y 2 , 1 Y 2 , 2 Y 2 , 3 Y 2 , 4 Y 3 , 1 Y 3 , 2 Y 3 , 3 Y 3 , 4 Y 4 , 1 Y 4 , 2 Y 4 , 3 Y 4 , 4
where R i , j q d c t is the QDCT coefficients of the residual block Ri,j; the matrix CTf is transformed from the matrix Cf,
C f = 1 1 1 1 2 1 1 2 1 1 1 1 1 2 2 1
P F = a 2 a b 2 a 2 a b 2 a b 2 b 2 4 a b 2 b 2 4 a 2 a b 2 a 2 a b 2 a b 2 b 2 4 a b 2 b 2 4 ,     a = 1 2 ,   b = 2 5
The ⊗ operator denotes an element-by-element product of two matrices, and Q is the step size of quantizer which is determined by a quantization parameter.
Then, a dequantization mechanism is used to reconstruct the residual block Ri,j, and inverse IDCT operation is performed by using Equation (2).
R i , j = C r T ( R i , j q d c t Q E r C r )
where C r = 1 1 1 1 1 1 / 2 1 / 2 1 1 1 1 1 1 / 2 1 1 1 / 2 ,
E r = a 2 a b a 2 a b a b b 2 a b b 2 a 2 a b a 2 a b a b b 2 a b b 2 , a = 1 2 ,   b = 2 5
To avoid distortion drift, in Ma et al.’s scheme, the pair of coefficients is perturbed. Take a pair of coefficients (Y11, Y31) belonging to Type 2 in Table 2 as an example. It can be seen that after permutation, (Y11 + 1, Y31 − 1) is obtained. Then, the difference value between two matrices, R i , j q d c t and R i , j q d c t , is presented in Equation (3).
Δ R i , j q d c t = R i , j q d c t R i , j q d c t = 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0
Assume that the block R i , j is perturbed to generate R i , j , then their difference value Δ R i , j can be computed by Equation (4).
Δ R i , j = R i , j R i , j = C r T ( Δ R i , j q d c t Q E r C r ) = Q × 0 0 0 0 2 a 2 2 a 2 2 a 2 2 a 2 2 a 2 2 a 2 2 a 2 2 a 2 0 0 0 0
It is obvious that in Δ R i , j , the fourth row is a zero vector and B i , j r = R i , j + B i , j p + Δ R i , j . Obviously the fourth row of both B i , j r and B i , j r is the same value, as a result, in this type, the reference pixels are kept unchanged during the process, meaning that distortion drift is free. Taking these characteristics, to achieve the reversibility, in the proposed scheme, coefficient pair mapping (CPM) is used. All suitable coefficient pairs in three types in Table 2 are selected for containing the secret bits. In addition, to prevent the distortion drift, an 2D histogram is constructed according to the frequency of pairs of coefficients. Then, the secret data are hidden by shifting the 2D histogram. It is obvious that the pair of coefficients is an element of Z 2 . Then, we need to partition Z 2 into three disjoint subsets in Figure 3, one subset (black point) is kept unchanged during the embedding process, the second one (blue point) is used to embed the secret data by expansion process, and the third one (red point) is shifted to generate vacant room to guarantee reversibility. It is obvious that each blue point is projected to red one (orange arrows). Each red point is projected to another red point (indicated by dash green arrows).
In particular, each point indicates a coefficient pair. According to the CPM mechanism, for each cover coefficient pair (Ai, Bi), the marked value is obtained by using the following way:
(1)
If (Ai, Bi) is the black point, it is kept unchanged.
(2)
If (Ai, Bi) is the blue point
  • If the secret bit w = 0, the marked coefficient pair is equal to (Ai, Bi).
  • If the secret bit w = 1, the marked coefficient pair is set to the corresponding red point.
(3)
If (Ai, Bi) is the red point, the marked coefficient pair is set to the corresponding red point.
The process of the data extraction and the cover image reconstruction can be applied to the CPM mechanism because of the injection property, i.e., each point has at most one inverse.

3.2. CPM Based RDH Scheme

To embed the secret bit w into a coefficient pair (Ai, Bi), we will modify this pair to either (Ai + w, Biw) or (Aiw, Bi + w). In this situation, since the pair (Ai, Bi) has two modification directions, only the direction with minimum modification is selected for concealing the secret data. Based on these two modification directions, we will introduce a new RDH scheme based on the CPM algorithm.
Here, our embedding algorithm based on CPM is briefly described. First, to avoid distortion drift, for each selected type, four pairs of coefficients are extracted as (Ai, Bi) = {(Y11, Y13), (Y21, Y23), (Y31, Y33), (Y41, Y43)}. Then, each pair is located in the 2D histogram. To embed one secret bit, each blue point in the histogram is projected to a red one while each red point is projected to another red one. This means that the shifting process is easily implemented in the 2D histogram to guarantee the reversibility, as shown in Figure 3. Note that there are many ways to utilize the CPM for various RDH schemes. As for CPM shown in Figure 3, the main idea is to choose as many as the high frequency points to conceal the secret information. It is obvious that most of QDCT coefficients Ai of video streams are concentrated on around the value of 0 in the histogram. To obtain the high embedding capacity, the coefficient Ai with the value of 0 should be used. To give a better explanation, we take blue points (Ai, Bi) = (0, Bi) for containing the secret data. In addition, the other points are shifted according to the one selected direction with the minimum distortion. The superior performance of CPM will be experimentally shown in the next section.
Notice that the coefficient pairs selected to carry secret data belong to the block case of these coefficient pairs. By this means, when the block case is equal to 1, coefficient pairs are vertically selected as Figure 4a, while the block case is equal to 2 or 3, the pairs of coefficients in the current block are horizontally used as Figure 4b. Suppose that the secret data bit is w. For Type 1, the coefficient Ai is equal to Yi,1, i = 1, …, 4. And for Type 2 and Type 3, the coefficient Ai is equal to Y1,i, i = 1, …, 4. The proposed embedding process is implemented by CPM mapping in the 2D histogram. The secret bit w is hidden into the coefficient pair by Equation (5).
[ A i , B i ] = [ A i + w , B i w ]   if   A i = 0 , [ A i + 1 , B i 1 ]   if   A i > 0 .

3.3. Embedding Algorithm

In this section, the secret data M is embedded into the H.264/AVC video H. In Figure 5, the embedding process contains several basic steps. First, the entropy encoder is used to decode the raw video streams into the intra-frame modes and QDCT coefficients. Then, the appropriate coefficient pairs of the blocks in Types of 1, 2, or 3 are collected for constructing the 2D histogram. It is noted that the I-frames, P-frames, and B-frames both are obtained after decoding. To preserve the quality of marked videos, embedding algorithm is only performed on the I-frames. After the decoding process, the I-frames are used for mode prediction. Then, macroblocks are determined. For each macroblock, all corresponding embeddable coefficient pairs are selected for CPM mapping.
For each coefficient pair, the value of coefficient Ai is checked to embed the secret bit by using Equation (5). To avoid drift distortion, as discussed above, the CPM mechanism is used. Therefore, if the value of Ai is increased, then the value of Bi is reduced, and vice versa. Moreover, in the proposed scheme, to increase the security of the proposed scheme, before the embedding process, the secret data M should be encrypted with encryption key K by using one of the well-known encryption algorithms, i.e., RSA, AES, … [29]. The detailed embedding algorithm, Algorithm 1, is described as following.
Algorithm 1: Embedding algorithm
Input: The original H.264/AVC video stream H, the secret data M and the encryption key K.
Output: The marked H.264/AVC video stream H’.
Step 1: The H.264/AVC video stream H is decoded by Entropy encoder to generate blocks of QDCT coefficients.
Step 2: Encrypt the message M with the encryption key K.
Step 3: Read   the   block   R i , j q d c t from QDCT coefficient blocks.
Step 4: Read coefficient pair (Ai, Bi) from the QDCT coefficient blocks, and apply Equation (5) to hide the secret bit w.
Step 5: Steps 3 to 4 are repeatedly used until the entire of QDCT coefficients are handled completely, then the entropy encoder is used to generate the marked video stream H’.
After the above-mentioned four steps are processed completely, the marked H.264/AVC video stream is obtained and transferred to the receiver. To ensure the security of the proposed scheme, the encryption key K is sent to the receiver through the secure channel.

3.4. Extracting Algorithm

After receiving the marked video, the receiver applies the extracting algorithm to extract the secret message and to restore the marked video to its original version. Figure 6 shows all the main steps of the extracting process. After entropy decoding, the hidden data are extracted from MB blocks. The hidden data W (w1, w2, …, wn), where wi ∈ {0, 1}) is extracted by Equation (6).
w i = 1 i f   A i = 1 0 i f   A i = 0 .
Since the hidden data are extracted completely, the values of coefficient pairs are restored by Equation (7).
[ A i , B i ] = [ A i 1 , B i + 1 ] if   A i 1 , [ A i , B i ] if   A i = 0
The following algorithm, Algorithm 2, illustrates the extracting process.
Algorithm 2: Extracting algorithm
Input: The marked video stream H’ and the encryption key K.
Output: The original video stream H, the secret data M.
Step 1: The Entropy encoder is used to decode the marked video H’ into QDCT coefficient blocks.
Step 2: Read the block R i , j q d c t from QDCT coefficient blocks.
Step 3: Read coefficient pairs (Ai, Bi) from the QDCT coefficient block. For each QDCT coefficient pair, one secret bit is extracted by Equation (6) while the original coefficient pair is reconstructed by Equation (7).
Step 4: Repeat Steps 3 to 4 until the entire QDCT coefficient blocks are encoded completely, the encrypted secret data are extracted and decrypted with the encryption key K to obtain the secret data M. Then the entropy encoder is used to generate the original H.264/AVC video stream H.

4. Experimental Results

A number of experiments are conducted to compare existing algorithms [13,15,22,23] with the proposed algorithm on ten test video streams with quarter common intermediate format, QCIF, 176 × 144, i.e., Akiyo, Bridge-Close, Bridge-Far, Carphone, Claire, Claire, Container, Hall, Mother-Daughter, News, Salesman. The test streams are encoded into 300 frames at 30 fps (frames per second) with ten I-frames for each stream. All algorithms are programmed by Matlab R2015a. All implementations were realized on a computer with Core i3 CPU, 4 GB RAM. The operating system was Microsoft Windows 10. All of them with the size of GOP were selected to be 30 frames and its structure was equal to IBPBP. To compare with other methods, we used six different QPs, 22, 24, 26, 28, 30, and 32 for the above ten sequences. This study used encoding and decoding methods developed by Muhit et al.’s [30].
Table 3 shows the statistics of possible data that can be embedded into each video when the quantization parameter (QP) is in {22, 24, 26, 28, 30, 32}. The embedding capacity of Claire video (27,504 bits) is highest with QP = 32 while the embedding capacity of Salesman video (11,225 bits) is lowest with QP = 22 among ten test videos. The average capacity of videos with QP = 28 is 19,551 bits.
The peak signal-to-noise-ratio (PSNR) is applied to evaluate the quality of two frames as follows.
P S N R = 10 × log 10 255 × 255 M S E
where MSE which is computed by Equation (9) is mean square error.
M S E = 1 m × n × i = 0 m 1 j = 0 n 1 O ( i , j ) M ( i , j )
where m, n are the number of rows and columns of the current frame, O and M are the original and marked frames, respectively.
The well-known SSIM index [31] is adopted to evaluate the visual quality. In our experiment, the SSIM index between the original and marked frames is computed by Equation (10).
S S I M = 1 N 1 × i = 0 N 1 ( 2 μ O i μ E i + c 1 ) × ( 2 σ O i E i + c 2 ) ( μ 2 O i + μ 2 E i + c 1 ) × ( σ 2 O i + σ 2 E i + c 2 )
where Oi and Ei indicate the ith MB block of original and marked frames; N is the number of MB blocks; μ O i , μ E i and σ 2 O i , σ 2 E i are the mean variance of the block O and the block E; σ O i E i is the covariance of O and E; c1 = (k1 × L)2 and c2 = (k2 × L)2 with L = 255, k1 = 0.01, and k2 = 0.03.
In the experiment, to evaluate the visual quality of marked video, both PSNR and SSIM values are used. Table 4 presents the proposed scheme’s visual quality when embedding maximum secret bits. It is obvious that the PSNR and SSIM values are reduced when the value of QP is increased. The main reason is since the large value of QP is used, more QDCT coefficient pairs are found for embedding data causing more distortion in the marked videos. However, the average PSNR of the proposed scheme is still larger than 33 dB, while the value of SSIM is greater than 0.84.
In this section, to show the solid results of the proposed scheme, two DNA sequences [32], downloaded from the GenBank database, are also used as the secret data. The DNA sequence consists of four base types, i.e., A, G, C, and T. Each base type is encoded by a corresponding bits of 00, 01, 10, and 11, respectively. Table 5 and Table 6 show the quality of marked videos after embedding the different size of the DNA sequences, i.e., the sequence NC_007020, contained 11,440 nucleotides (~22,880 bits) and the sequence NC_007203 with 6909 nts (~13,818 bits), respectively. It is noted that, in Table 5, with the larger embedding capacity, the average of PSNR and the average of SSIM are still high, with 32.63 dB and 0.844, respectively. It is obvious that if the smaller embedding capacity is embedded then the better visual quality is obtained by the proposed scheme and vice versa.
Table 7 compares the performance of the proposed scheme with four previous schemes, including: Liu et al. [22], Ma et al. [13], Lin et al. [15], and Nguyen et al. [23], when the quantization step QP = 28 is used. The PSNR and the SSIM of the proposed scheme is smaller than the other four schemes [13,15,22,23]. However, the maximum capacity of the proposed scheme is the highest one among the five schemes, up to ten times larger than that of Lui et al.’s scheme [22]. Moreover, the proposed algorithm has the ability to reconstruct the marked videos to their original version.

5. Conclusions

In this paper, a new RDH scheme is proposed for videos H.246/AVC. In the proposed scheme, the cover video is decoded by using the entropy encoder to generate QDCT coefficients. The 2D histogram of QDCT coefficients is generated by counting suitable coefficient pairs. Then, the CPM mapping mechanism, injective mapping, is defined for embedding data. To increase the security of the proposed scheme, the secret data are encrypted by using symmetric key cryptography. Then, the CPM mechanism is used to hide the encrypted secret data into the videos without any distortion drift while guaranteeing the reversibility. The experimental results showed that the proposed algorithm obtains the highest embedding capacity among five schemes while maintaining the good visual quality of marked videos. Moreover, the proposed algorithm obtains the reversibility and prevents intra-frame distortion drift on the marked videos during the embedding process. Although obtaining both the high embedding capacity and the good quality of marked videos, however, in the future, more research should be taken to improve the quality of marked videos when containing the large embedding capacity.

Funding

This research was funded by Tra Vinh University under grant contract number 207/HĐ.HĐKH–ĐHTV.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Jing, Z.; Ho, A.T.S.; Gang, Q.; Marziliano, P. Robust Video Watermarking of H.264/AVC. IEEE Trans. Circuits Syst. II Express Briefs 2007, 54, 205–209. [Google Scholar]
  2. Dragoi, I.C.; Coltuc, D. On the Security of Reversible Data Hiding in Encrypted Images by MSB Prediction. IEEE Trans. Inf. Forensics Secur. 2021, 16, 187–189. [Google Scholar] [CrossRef]
  3. Zheng, S.; Wang, Y.; Hu, D. Lossless Data Hiding Based on Homomorphic Cryptosystem. IEEE Trans. Depend. Secur. Comput. 2021, 18, 692–705. [Google Scholar] [CrossRef]
  4. He, J.; Chen, J.; Tang, S. Reversible Data Hiding in JPEG Images Based on Negative Influence Models. IEEE Trans. Inf. Forensics Secur. 2019, 15, 2121–2133. [Google Scholar] [CrossRef]
  5. Chang, C.C.; Nguyen, T.S. A reversible data hiding scheme for SMVQ indices. Informatica 2014, 25, 523–540. [Google Scholar] [CrossRef]
  6. He, J.; Chen, J.; Luo, W.; Tang, S.; Huang, J. A Novel High-Capacity Reversible Data Hiding Scheme for Encrypted JPEG Bitstreams. IEEE Trans. Circuits Syst. Video Technol. 2019, 29, 3501–3515. [Google Scholar] [CrossRef]
  7. Nguyen, T.S.; Tram, H.N. New Reversible Data Hiding Algorithm Based on Edge Detection and PVO Mechanisms. J. Commun. Inf. Syst. 2022, 37, 77–85. [Google Scholar] [CrossRef]
  8. Richardson, I.E.H. 264 and MPEG-4 Video Compression: Video Coding for Next-Generation Multimedia; Wiley: Chichester, UK, 2003. [Google Scholar]
  9. Nguyen, C.V.; Tay, D.; Deng, G. A fast watermarking system for H.264/AVC video. In Proceedings of the IEEE Asia-Pacific Conference on Circuits and Systems, Singapore, 4–7 December 2006; pp. 81–84. [Google Scholar]
  10. Nguyen, T.S. Fragile watermarking for image authentication based on DWT-SVD-DCT techniques. Multimed. Tools Appl. 2021, 80, 25107–25119. [Google Scholar] [CrossRef]
  11. Noorkami, M.; Mersereau, R.M. A frame work for robust watermarking of H.264-encoded video with controllable detection performance. IEEE Trans. Inform. Forensics Secur. 2007, 2, 14–23. [Google Scholar] [CrossRef]
  12. Gong, X.; Lu, H.M. Towards fast and robust watermarking scheme for H.264 video. In Proceedings of the 2008 Tenth IEEE International Symposium on Multimedia, Berkeley, CA, USA, 15–17 December 2008; pp. 649–653. [Google Scholar]
  13. Ma, X.J.; Li, J.T.; Tu, H.; Zhang, B. A data hiding algorithm for H.264/AVC video streams without intra-frame distortion drift. IEEE Trans. Circuits Systs. Video Technol. 2010, 20, 1320–1330. [Google Scholar] [CrossRef]
  14. Huo, W.; Zhu, Y.; Chen, H. A controllable error-drift elimination scheme for watermarking algorithm in H.264/AVC stream. IEEE Signal Process. Lett. 2011, 18, 535–538. [Google Scholar] [CrossRef]
  15. Lin, T.J.; Chung, K.L.; Chang, P.C.; Huang, Y.H.; Liao, H.Y.M.; Fang, C.Y. An improved DCT-based perturbation scheme for high capacity data hiding in H.264/AVC intra frames. J. Syst. Softw. 2013, 86, 604–614. [Google Scholar] [CrossRef]
  16. Chang, Q.; Li, X.; Zhao, Y. Reversible Data Hiding for Color Images Based on Adaptive Three-Dimensional Histogram Modification. IEEE Trans. Circuits Syst. Video Technol. 2022, 1. [Google Scholar] [CrossRef]
  17. Nguyen, T.S.; Chang, C.C.; Lin, C.C. High capacity reversible data hiding scheme based on AMBTC for encrypted images. J. Internet Technol. 2022, 23, 255–266. [Google Scholar] [CrossRef]
  18. Chang, C.-C.; Nguyen, T.-S.; Lin, C.C. A Reversible Database Watermark Scheme for Textual and Numerical Datasets. In Proceedings of the 2021 IEEE/ACIS 22nd International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), Taichung, Taiwan, 24–26 November 2021; pp. 208–212. [Google Scholar]
  19. Lin, C.C.; Nguyen, T.S.; Chang, C.C. LRW-CRDB: Lossless robust watermarking scheme for categorical relational databases. Symmetry 2021, 13, 2191. [Google Scholar] [CrossRef]
  20. Ning, Z.; Niu, K.; Lin, Y.; Pan, F. Video Reversible Data Hiding Based on Motion Vector. In Proceedings of the 7th International Conference on Intelligent Computing and Signal Processing (ICSP), Xi’an, China, 15–17 April 2022; pp. 656–660. [Google Scholar] [CrossRef]
  21. Ni, Z.; Shi, Y.-Q.; Ansari, N.; Su, W. Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol. 2006, 16, 354–362. [Google Scholar]
  22. Liu, Y.; Chen, L.; Hu, M.; Jia, Z.; Jia, S.; Zhao, H. A reversible data hiding method for H.264 with Shamir’s (t, n)-threshold secret sharing. Neurocomputing 2016, 188, 63–70. [Google Scholar] [CrossRef]
  23. Nguyen, D.C.; Nguyen, T.S.; Hsu, F.R.; Hsien, H.Y. A novel data hiding scheme for video H. 264/AVC without distortion drift. Multimed. Tools Appl. 2019, 78, 16033–16052. [Google Scholar] [CrossRef]
  24. Liu, Y.; Zhitang, L.; Ma, X. Reversible data hiding scheme based on H. 264/AVC without distortion drift. J. Softw. 2012, 7, 1059–1065. [Google Scholar] [CrossRef]
  25. Liu, Y.; Ju, L.; Hu, M.; Ma, X.; Zhao, H. A robust reversible data hiding scheme for H.264 without distortion drift. Neurocomputing 2015, 151, 1053–1062. [Google Scholar] [CrossRef]
  26. Chung, K.L.; Huang, Y.H.; Chang, P.C.; Liao, H.Y.M. Reversible Data Hiding-Based Approach for Intra-Frame Error Concealment in H.264/AVC. IEEE Trans. Circuits Syst. Video Technol. 2010, 20, 1643–1647. [Google Scholar] [CrossRef]
  27. Fallahpour, M.; David, M. Reversible data hiding based on H. 264/AVC intra prediction. In Digital Watermarking; Springer: Berlin/Heidelberg, Germany, 2008; pp. 52–60. [Google Scholar]
  28. Xu, D.; Wang, R.; Shi, Y.Q. An improved reversible data hiding-based approach for intra-frame error concealment in H.264/AVC. J. Vis. Commun. Image Represent. 2014, 25, 410–422. [Google Scholar] [CrossRef]
  29. Bertaccini, M. Cryptography Algorithms; Packt Publishing: Birrmingham, UK, 2022. [Google Scholar]
  30. Muhit, A.A.; Pickering, M.R.; Frater, M.R.; Arnold, J.F. Video Coding Using Elastic Motion Model and Larger Blocks. IEEE Trans. Circuits Syst. Video Technol. 2010, 20, 661–672. [Google Scholar] [CrossRef]
  31. Wang, Z.; Bovik, A.C.; Sheikh, H.R.; Simoncelli, E.P. Image quality assessment: From error visibility to structural similarity. IEEE Trans. Image Process. 2004, 13, 600–612. [Google Scholar] [CrossRef] [Green Version]
  32. Chien, N.D.; Nguyen, T.S.; Hsu, F.R. An algorithm for DNA sequence hiding in H. 264/AVC video. In Proceedings of the Seventh Symposium on Information and Communication Technology ACM, Ho Chi Minh, Vietnam, 8–9 December 2016; pp. 229–234. [Google Scholar]
Figure 1. The current luminance block B i , j ^ .
Figure 1. The current luminance block B i , j ^ .
Symmetry 14 01768 g001
Figure 2. Nine 4 × 4 luminance prediction modes [8].
Figure 2. Nine 4 × 4 luminance prediction modes [8].
Symmetry 14 01768 g002
Figure 3. Illustration for the 2D QDCT histogram.
Figure 3. Illustration for the 2D QDCT histogram.
Symmetry 14 01768 g003
Figure 4. The selected coefficient pairs belong to the block type.
Figure 4. The selected coefficient pairs belong to the block type.
Symmetry 14 01768 g004
Figure 5. The flowchart of the embedding process.
Figure 5. The flowchart of the embedding process.
Symmetry 14 01768 g005
Figure 6. The diagram of the extracting process.
Figure 6. The diagram of the extracting process.
Symmetry 14 01768 g006
Table 1. Three different conditions of Ma et al.’s scheme.
Table 1. Three different conditions of Ma et al.’s scheme.
Mode NameMode ValueReference Pixels
Condition 1Right-Mode0, 3, or 7d, h, l, p
Condition 2Under-Left-Mode & Under-Mode1 or 8 and 0, 1, 2, 4, 5, 6, or 8m, n, o, p
Condition 3Under-Right-Mode0, 1, 2, 3, 7, or 8 p
Table 2. Three launched cases according to schemes [13,15].
Table 2. Three launched cases according to schemes [13,15].
TypesCondition 1Condition 2Condition 3Reference Pixels
Type 1TFX 1d, h, l, p
Type 2FTXm, n, o, p
Type 3FFTp
1 Do not care.
Table 3. The embedding capacity of ten test videos with various QPs.
Table 3. The embedding capacity of ten test videos with various QPs.
222426283032
Akiyo18,16519,46119,98620,70622,20022,623
Bridge-close15,09717,17917,89818,59620,22021,357
Bridge-far17,28318,93821,50822,07722,91626,287
Carphone13,78015,11016,23016,81618,05218,995
Claire22,00222,28623,27824,45425,61827,504
Container13,73014,87216,53517,26818,54819,576
Hall16,01617,38718,97320,13821,13321,526
Mother-daughter18,07218,93220,65721,35022,62523,417
News16,75918,14819,07419,70821,44322,145
Salesman11,22512,71814,11114,39815,58816,406
Average16,21317,50318,82519,55120,83421,984
Table 4. The quality of the marked videos with various QPs.
Table 4. The quality of the marked videos with various QPs.
QPsPSNRSSIM
2238.210.942
2436.240.915
2634.230.880
2832.480.842
3030.380.784
3228.410.722
Average33.330.848
Table 5. The quality of marked videos with the large embedding capacity after embedding DNA sequences NC_007020 (11,440 nts = ~22,880 bits)) with QP = 28.
Table 5. The quality of marked videos with the large embedding capacity after embedding DNA sequences NC_007020 (11,440 nts = ~22,880 bits)) with QP = 28.
VideosPSNRSSIM
Akiyo32.500.834
Bridge-close32.010.847
Bridge-far32.700.766
Carphone32.890.880
Claire33.690.825
Container32.550.834
Hall32.620.860
Mother-daughter32.490.833
News32.440.864
Salesman32.360.900
Average32.630.844
Table 6. The quality of marked videos with the smaller embedding capacity after embedding DNA sequences NC_007203 (6909 nts = ~13,818 bits) with QP = 28.
Table 6. The quality of marked videos with the smaller embedding capacity after embedding DNA sequences NC_007203 (6909 nts = ~13,818 bits) with QP = 28.
VideosPSNRSSIM
Akiyo34.580.878
Bridge-close32.490.861
Bridge-far34.780.831
Carphone33.400.889
Claire36.360.884
Container33.300.854
Hall33.700.882
Mother-daughter34.380.876
News33.660.889
Salesman32.290.898
Average33.900.874
Table 7. Performance comparison among five schemes with QP = 28.
Table 7. Performance comparison among five schemes with QP = 28.
SchemesMaximum Capacity (bits)Average PSNR of Marked Video (dB)Average SSIM of Marked VideoReversibility
Proposed19,55132.480.842Yes
Liu et al. [22]14134.170.987Yes
Ma et al. [13]11,55935.310.935No
Lin et al. [15]14,35734.780.936No
Nguyen et al. [23]19,07734.340.932No
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Nguyen, T.-S. Reversible Data Hiding Scheme Based on Coefficient Pair Mapping for Videos H.264/AVC without Distortion Drift. Symmetry 2022, 14, 1768. https://doi.org/10.3390/sym14091768

AMA Style

Nguyen T-S. Reversible Data Hiding Scheme Based on Coefficient Pair Mapping for Videos H.264/AVC without Distortion Drift. Symmetry. 2022; 14(9):1768. https://doi.org/10.3390/sym14091768

Chicago/Turabian Style

Nguyen, Thai-Son. 2022. "Reversible Data Hiding Scheme Based on Coefficient Pair Mapping for Videos H.264/AVC without Distortion Drift" Symmetry 14, no. 9: 1768. https://doi.org/10.3390/sym14091768

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop