Data Hiding in H.264/AVC Video Files Using the Coded Block Pattern

  • Hong ZhangEmail author
  • Yun Cao
  • Xianfeng Zhao
  • Haibo Yu
  • Changjun Liu
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10082)


This paper presents a novel data hiding method for H.264 which employs the coded block pattern (CBP) as the data carrier. The CBP is defined in the H.264/AVC standard, and indicates which luma and chroma blocks in a macroblock contain non-zero transform coefficients. To the best of our knowledge, little research has been conducted on exploiting the CBP for information hiding. In the proposed method, the four least significant bits of each CBP are mapped to a single bit to form the embedding channel. In addition, an embedding distortion function is specifically designed to evaluate the impacts of CBP manipulation on visual quality and compression efficiency. Combined with the suitably defined distortion function, the syndrome-trellis codes are employed to minimize the overall embedding impact. The experimental results show that only a slight reduction in visual quality would be caused, even when large payload is embedded. In addition, the compression efficiency could be maintained with insignificant fluctuation in bitrates.


Data hiding Coded block pattern H.264/AVC Compressed video 



This work was supported by the NSFC under 61303259 and U1536105, Strategic Priority Research Program of CAS under XDA06030600, National Key Technology R&D Program under 2014BAH41B01, and Key Project of Institute of Information Engineering, CAS, under Y5Z0131201.


  1. 1.
    Mielikainen, J.: LSB matching revisited. IEEE Signal Process. Lett. 13(5), 285–287 (2006)CrossRefGoogle Scholar
  2. 2.
    Hartung, F., Girod, B.: Watermarking of uncompressed and compressed video. Signal Process. 66(3), 283–301 (1998)CrossRefzbMATHGoogle Scholar
  3. 3.
    Cox, I.J., Kilian, J., Leighton, F.T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process. 6(12), 1673–1687 (1997)CrossRefGoogle Scholar
  4. 4.
    Jordan, F., Kutter, M., Ebrahimi, T.: Proposal of a watermarking technique for hiding/retrieving data in compressed and decompressed video. Tech. rep. M2281, ISO/IEC Document, JTC1/SC29/WG11, Stockholm, Sweden, July 1997Google Scholar
  5. 5.
    Xu, C., Ping, X., Zhang, T.: Steganography in compressed video stream. In: Proceedings of 1st International Conference on Innovative Computing, Information and Control, pp. 269–272. Beijing, China, September 2006Google Scholar
  6. 6.
    Aly, H.A.: Data hiding in motion vectors of compressed video based on their associated prediction error. IEEE Trans. Inf. Forensics Secur. 6(1), 14–18 (2011)CrossRefGoogle Scholar
  7. 7.
    Cao, Y., Zhang, H., Zhao, X., Yu, H.: Video steganography based on optimized motion estimation perturbation. In: Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, pp. 25–31. Portland (June 2015)Google Scholar
  8. 8.
    Zhang, H., Cao, Y., Zhao, X.: Motion vector-based video steganography with preserved local optimality. Multimed. Tools Appl. 75, 13503–13519 (2015)Google Scholar
  9. 9.
    Hu, Y., Zhang, C.: Yuting: information hiding based on intra prediction modes for H.264/AVC. In: Proceedings of 2007 IEEE International Conference on Multimedia and Expo, pp. 1231–1234. Beijing, China, July 2007Google Scholar
  10. 10.
    Yang, G., Li, J., He, Y.: Zhiwei: an information hiding algorithm based on intra-prediction modes and matrix coding for H.264/AVC video stream. AEU Int. J. Electron. Commun. 65(4), 331–337 (2011)CrossRefGoogle Scholar
  11. 11.
    Xu, D., Wang, R., Wang, J.: Prediction mode modulated data-hiding algorithm for H.264/AVC. J. Real Time Image Process. 7(4), 205–214 (2012)CrossRefGoogle Scholar
  12. 12.
    Kapotas, S.K., Skodras, A.N.: A new data hiding scheme for scene change detection in H. 264 encoded video sequences. In: Proceedings of 2008 IEEE International Conference on Multimedia Expo, pp. 277–280. Hannover, Germany (2008)Google Scholar
  13. 13.
    Zhang, H., Cao, Y., Zhao, X., Zhang, W., Yu, N.: Video steganography with perturbed macroblock partition. In: Proceedings of the 2nd ACM Workshop on Information Hiding and Multimedia Security, pp. 115–122. Salzburg, Austria, June 2014Google Scholar
  14. 14.
    Ma, X., Li, Z., Tu, H., Zhang, B.: A data hiding algorithm for H.264/AVC video streams without intra-frame distortion drift. IEEE Trans. Circ. Syst. Video Technol. 20(10), 1320–1330 (2010)CrossRefGoogle Scholar
  15. 15.
    Lin, T., Chung, K., Chang, P., Huang, Y., Liao, H.M., Fang, C.: An improved DCT-based perturbation scheme for high capacity data hiding in H.264/AVC intra frames. J. Syst. Softw. 86(3), 604–614 (2013)CrossRefGoogle Scholar
  16. 16.
    Chang, P., Chung, K., Chen, J., Lin, C., Lin, T.: A DCT/DST-based error propagation-free data hiding algorithm for hevc intra-coded frames. J. Vis. Commun. Image Representation 25(2), 239–253 (2014)CrossRefGoogle Scholar
  17. 17.
    Wong, K., Tanaka, K., Takagi, K., Nakajima, Y.: Complete video quality-preserving data hiding. IEEE Trans. Circ. Syst. Video Technol. 19(10), 1499–1512 (2009)CrossRefGoogle Scholar
  18. 18.
    Shanableh, T.: Data hiding in MPEG video files using multivariate regression and flexible macroblock ordering. IEEE Trans. Inf. Forensics Secur. 7(2), 455–464 (2012)CrossRefGoogle Scholar
  19. 19.
    Li, J., Liu, H., Huang, J., Zhang, Y.: A robust watermarking scheme for H.264. Digital Watermarking, January 2009.
  20. 20.
    Kim, S.M., Kim, S.B., Hong, Y., Won, C.S.: Data hiding on H.264/AVC compressed video. In: Kamel, M., Campilho, A. (eds.) ICIAR 2007. LNCS, vol. 4633, pp. 698–707. Springer, Heidelberg (2007). doi: 10.1007/978-3-540-74260-9_62 CrossRefGoogle Scholar
  21. 21.
    Liao, K., Lian, S., Guo, Z., Wang, J.: Efficient information hiding in H.264/AVC video coding. Telecommun. Syst. 49(2), 261–269 (2012)CrossRefGoogle Scholar
  22. 22.
    Wiegand, T., Sullivan, G.J., Bjontegaard, G., Luthra, A.: Overview of the H.264/AVC video coding standard. IEEE Trans. Circuits Syst. Video Technol. 13(7), 560–576 (2003)CrossRefGoogle Scholar
  23. 23.
    Filler, T., Judas, J., Fridrich, J.: Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans. Inf. Forensics Secur. 6(3), 920–935 (2011)CrossRefGoogle Scholar
  24. 24.
    VideoLAN-x264, The Best H.264/AVC Encoder.

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  • Hong Zhang
    • 1
    • 2
    Email author
  • Yun Cao
    • 1
    • 2
  • Xianfeng Zhao
    • 1
    • 2
  • Haibo Yu
    • 1
    • 2
  • Changjun Liu
    • 1
    • 2
  1. 1.State Key Laboratory of Information SecurityInstitute of Information Engineering, Chinese Academy of SciencesBeijingChina
  2. 2.University of Chinese Academy of SciencesBeijingChina

Personalised recommendations