Encryption domain H.264/AVC video data hiding method based on MVD (Motion Vector Difference) codon mapping

A technology of video data and encryption domain, applied in the direction of digital video signal modification, electrical components, image communication, etc., can solve problems such as technical failure and loss

Inactive Publication Date: 2018-02-16
NINGBO UNIVERSITY OF TECHNOLOGY
View PDF2 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although both H.264 / AVC video data hiding and H.264 / AVC video encryption have been developed rapidly, the original characteristics are lost after the data becomes ciphertext, which leads to the failure of the existing H.264 / AVC video data hiding technology
How to realize data hiding under the premise of ciphertext, domestic and foreign research has just begun, and there are still many difficult problems to be solved in the combination of encryption and data hiding

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption domain H.264/AVC video data hiding method based on MVD (Motion Vector Difference) codon mapping
  • Encryption domain H.264/AVC video data hiding method based on MVD (Motion Vector Difference) codon mapping
  • Encryption domain H.264/AVC video data hiding method based on MVD (Motion Vector Difference) codon mapping

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0067] A method for hiding H.264 / AVC video data in encrypted domain based on MVD codeword mapping proposed in this embodiment, which includes H.264 / AVC video encryption, hidden information embedding in encrypted domain H.264 / AVC video, hidden information There are three parts to extract, among which, secret information extraction and video decryption are completely separable, and secret information can be extracted before video decryption or after video decryption.

[0068] In order to reduce the encryption complexity, keep the size of the encrypted domain H.264 / AVC video code stream obtained after encryption unchanged, and have high perceptual security, the method of the present invention selects the intra prediction mode (IPM), motion vector The difference (MVD) and residual coefficients are encrypted, that is, as Figure 1a As shown, the H.264 / AVC video encryption process is as follows: For all macroblocks whose prediction mode is Intra_4×4 prediction mode in the original H....

Embodiment 2

[0124] The encryption domain H.264 / AVC video data hiding method proposed in this embodiment is proposed on the basis of Embodiment 1 in order to further improve security. In order to prevent secret information from being extracted and leaked, encryption is first used in step ②_3. The binary pseudo-random sequence of the secret information encrypts the secret information to be embedded, and then re-uses the encrypted secret information as the secret information to be embedded, and then takes out the current information bits to be embedded; in this way, when extracting the secret data, it needs to extract The obtained secret information is decrypted, that is, in step ③_1e, the binary pseudo-random sequence of the encrypted secret information used in the H.264 / AVC video data hiding process of the encrypted domain is used to decrypt the extracted secret information; in step ③_2f, use In the H.264 / AVC video data hiding process in the encrypted domain, the binary pseudo-random sequen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an encryption domain H.264/AVC video data hiding method based on MVD (Motion Vector Difference) codon mapping. In an H.264/AVC video encryption process, codons of prediction modes of 4*4 sub-blocks of which mode flag bits are 0 in macro blocks of an Intra_4*4 prediction mode, the codons of an Intra_16*16 prediction mode, exponent Columbus codons of motion vector differenceswhich are not 0, and Level codons of residual error coefficients of which suffix lengths are not 0 are encrypted; in a process of embedding secret information into an encryption domain H.264/AVC video, all MVD codons of which absolute values are 2 and 15 are divided into six codon spaces, and if the MVD codons identified from encryption domain H.264/AVC video streams belong to any codon space, information bits are embedded into codons through adoption of a codon mapping method; and secret information extraction can be finished both in an encryption domain and a decryption domain. The method has the advantages that the secret information is embedded into the encryption domain H.264/AVC video, and the secret information can be effectively extracted in the encryption domain H.264/AVC video and the decryption domain H.264/AVC video.

Description

technical field [0001] The present invention relates to a video data hiding technology, in particular to an encrypted domain H.264 / AVC video data hiding method based on MVD (Motion Vector Difference, motion vector difference) code word mapping. Background technique [0002] With the optimization of the network environment and the maturity of video coding and communication technology, the application range of digital video is becoming more and more extensive. However, video data security and privacy protection requirements are unavoidable core issues. One of the best ways to ensure the security of video data is to encrypt the video. Users encrypt the sensitive content before uploading it. All processing and calculations in the cloud are performed in the ciphertext domain, and the processing results are provided to the user. The authorized end user of the decryption key can only obtain the plaintext data after decryption. For example, medical institutions are obliged to prot...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04N19/467H04N19/103H04N19/122H04N19/176
CPCH04N19/103H04N19/122H04N19/176H04N19/467
Inventor 徐达文
Owner NINGBO UNIVERSITY OF TECHNOLOGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products