Advertisement

An efficient authentication scheme for high efficiency video coding/H.265

  • Gagandeep KaurEmail author
  • Singara Singh Kasana
  • M. K. Sharma
Article
  • 4 Downloads

Abstract

In this paper, a semi-fragile authentication scheme for high efficiency video coding is proposed. In this scheme, 4 × 4 intra luma transform blocks of I-frames are divided into two disjoint subsets. One subset is used for authentication code generation and another subset is used for embedding the generated code. From these subsets, blocks are selected on the basis of the quality and robustness thresholds. These thresholds are calculated at runtime by using a low-complexity spatial analysis. The authentication code is generated based on the relationship between number of positive and negative quantized discrete sine transformed coefficients in a block. The generated authentication code is embedded by altering the magnitudes of quantized discrete sine transformed coefficients during encoding of the video sequence. The process of authentication has low complexity as embedded authentication code can be extracted and verified without full decoding of the encoded bit-stream. Experimental results show that the proposed scheme is efficient in terms of imperceptibility, increase in bit-rate, computational complexity, robustness to re-compression, frame dropping, noise attacks and fragile to malicious attacks.

Keywords

High efficiency video coding DST Video authentication Video watermarking 

Notes

Acknowledgements

This work is supported by Maulana Azad National Fellowship (MANF) under UGC with application number MANF-2014-15-SIK-PUN-32682.

References

  1. 1.
    Chang PC, Chung KL, Chen JJ, Lin CH, Lin TJ (2014) A DCT/DST-based error propagation-free data hiding algorithm for HEVC intra-coded frames. J Vis Commun Image Represent 25(2):239– 253CrossRefGoogle Scholar
  2. 2.
    Cox I, Miller M, Bloom J, Fridrich J, Kalker T (2008) Digital watermarking and steganography, 2nd edn. The Morgan Kaufmann Series in Multimedia Information and Systems. Elsevier, San FranciscoGoogle Scholar
  3. 3.
    Dutta T, Gupta HP (2016) A robust watermarking framework for High Efficiency Video Coding (HEVC) –encoded video with blind extraction process. J Vis Commun Image Represent 38:29–44CrossRefGoogle Scholar
  4. 4.
    Elrowayati AA, Abdullah M, Manaf AA, Alfagi AS (2016) Robust HEVC video watermarking scheme based on repetition-BCH syndrome code. Int J Softw Eng Appl 10(1):263–270Google Scholar
  5. 5.
    Farfoura ME, Horng SJ, Guo JM, Al–Haj A (2015) Low complexity semi-fragile watermarking scheme for H.264/AVC authentication. Multimed Tools Appl 75(13):7465–7493CrossRefGoogle Scholar
  6. 6.
    Furht B, Marques O (2003) Handbook of video databases: design and applications, 1st edn. CRC Press, Boca RatonGoogle Scholar
  7. 7.
    Hevc reference software [online], available at: https://hevc.hhi.fraunhofer.de/trac/hevc/browser/tags
  8. 8.
    Kim DW, Choi YG, Kim HS, Yoo JS, Choi HJ, Seo YH (2010) The problems in digital watermarking into intra-frames of H.264/AVC. Image Vis Comput 28(8):1220–1228CrossRefGoogle Scholar
  9. 9.
    Li L, Dong Z, Lu J, Dai J, Huang Q, Chang CC, Wu T (2015) An H.264/AVC hdtv watermarking algorithm robust to camcorder recording. J Vis Commun Image Represent 26:1–8CrossRefGoogle Scholar
  10. 10.
    Liu Y, Liu S, Zhao H, Liu S (2018) A new data hiding method for H.265/HEVC video streams without intra-frame distortion drift. Multimed Tools Appl 1–28.  https://doi.org/10.1007/s11042-018-6320-y
  11. 11.
    Mansouri A, Aznaveh A M, Torkamani–Azar F, Kurugollu F (2010) A low complexity video watermarking in H.264 compressed domain. IEEE Trans Inf Forensics Secur 5(4):649–657CrossRefGoogle Scholar
  12. 12.
    Salomon D (2007) Data compression, 4th edn. Springer, LondonGoogle Scholar
  13. 13.
    Saxena A, Fernandes FC (2013) DCT/DST-based transform coding for intra prediction in image/video coding. IEEE Trans Image Process 22(10):3974–3981MathSciNetCrossRefGoogle Scholar
  14. 14.
    Shanableh T (2018) Altering split decisions of coding units for message embedding in HEVC. Multimed Tools Appl 77(7):8939–8953CrossRefGoogle Scholar
  15. 15.
    Sheikh HR, Bovik AC (2006) Image information and visual quality. IEEE Trans Image Process 15(2):430–444CrossRefGoogle Scholar
  16. 16.
    Sullivan GJ, Ohm JR, Han WJ, Wiegand T (2012) Overview of the high efficiency video coding (HEVC) standard. IEEE Trans Circ Syst Video Technol 22(12):1649–1668CrossRefGoogle Scholar
  17. 17.
    Swati S, Hayat K, Shahid Z (2014) A watermarking scheme for High Efficiency Video Coding (HEVC). PLoS ONE 9(8):e105–613CrossRefGoogle Scholar
  18. 18.
    Sze V, Budagavi M, Sullivan GJ (2014) High efficiency video coding (HEVC), 1st edn. Springer International Publishing, SwitzerlandGoogle Scholar
  19. 19.
    Tew Y, Wong K, Phan RCW, Ngan KN (2016) Multi-layer authentication scheme for HEVC video based on embedded statistics. J Vis Commun Image Represent 40:502–515CrossRefGoogle Scholar
  20. 20.
    Tew Y, Wong K, Phan RCW, Ngan KN (2018) Separable authentication in encrypted hevc video. Multimed Tools Appl 1–20.  https://doi.org/10.1007/s11042--018--5611--7
  21. 21.
    Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612CrossRefGoogle Scholar
  22. 22.
    Wang JJ, Wang RD, Xu DW, Li W (2015) An information hiding algorithm for HEVC based on angle differences of intra prediction mode. JSW 10(2):213–221CrossRefGoogle Scholar
  23. 23.
    Wiegand T, Sullivan G, Bjontegaard G, Luthra A (2003) Overview of the H.264/AVC video coding standard. IEEE Trans Circ Syst Video Technol 13(7):560–576CrossRefGoogle Scholar
  24. 24.
    Wien M (2015) High efficiency video coding, 1st edn. Springer, BerlinGoogle Scholar
  25. 25.
    Xu D, Wang R, Wang J (2011) A novel watermarking scheme for H.264/AVC video authentication. Signal Process Image Commun 26(6):267–279CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Computer Science and Engineering DepartmentThapar Institute of Engineering and TechnologyPatialaIndia
  2. 2.School of MathematicsThapar Institute of Engineering and TechnologyPatialaIndia

Personalised recommendations