Considering the reconstruction loop for data hiding of intra- and inter-frames of H.264/AVC
This paper presents and analyzes a new approach to data hiding that embeds in both the intra - and inter -frames from the H.264/AVC video codec. Most of the current video data hiding algorithms take into account only the intra -frames for message embedding. This may be attributed to the perception t...
Saved in:
Published in: | Signal, image and video processing Vol. 7; no. 1; pp. 75 - 93 |
---|---|
Main Authors: | , , |
Format: | Journal Article |
Language: | English |
Published: |
London
Springer-Verlag
2013
Springer Verlag |
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Abstract | This paper presents and analyzes a new approach to data hiding that embeds in both the
intra
- and
inter
-frames from the H.264/AVC video codec. Most of the current video data hiding algorithms take into account only the
intra
-frames for message embedding. This may be attributed to the perception that
inter
-frames are highly compressed due to the motion compensation, and any embedding message inside these may adversely affect the compression efficiency significantly. Payload of the
inter
-frames is also thought to be less, compared with the
intra
-frames, because of the lesser residual data. We analyze data hiding in both
intra
- and
inter
-frames over a wide range of QP values and observe that the payload of the
inter
is comparable with that of the
intra
-frames. Message embedding, in only those non-zero quantized transform coefficients (QTCs) which are above a specific threshold, enables us to detect and extract the message on the decoding side. There is no significant effect on the overall bitrate and PSNR of the video bitstream because instead of embedding message in the compressed bitstream, we have embedded it during the encoding process by taking into account the reconstruction loop. For the non-zero QTCs, in the case of
intra
-frames, we benefit from the spatial masking, while in the case of
inter
-frames, we exploit the motion and texture masking. We can notice that the data hiding is done during the compression process and the proposed scheme takes into account the reconstruction loop. The proposed scheme does not target robustness and the obtained payload is higher, with a better trade-off in terms of quality and bitrate, as compared with previous works. |
---|---|
AbstractList | This paper presents and analyzes a new approach to data hiding that embeds in both the intra- and inter-frames from the H.264/AVC video codec. Most of the current video data hiding algorithms take into account only the intra-frames for message embedding. This may be attributed to the perception that inter-frames are highly compressed due to the motion compensation, and any embedding message inside these may adversely affect the compression efficiency significantly. Payload of the inter-frames is also thought to be less, compared with the intra-frames, because of the lesser residual data. We analyze data hiding in both intra- and inter-frames over a wide range of QP values and observe that the payload of the inter is comparable with that of the intra-frames. Message embedding, in only those non-zero quantized transform coefficients (QTCs) which are above a specific threshold, enables us to detect and extract the message on the decoding side. There is no significant effect on the overall bitrate and PSNR of the video bitstream because instead of embedding message in the compressed bitstream, we have embedded it during the encoding process by taking into account the reconstruction loop. For the non-zero QTCs, in the case of intra-frames, we benefit from the spatial masking, while in the case of inter-frames, we exploit the motion and texture masking. We can notice that the data hiding is done during the compression process and the proposed scheme takes into account the reconstruction loop. The proposed scheme does not target robustness and the obtained payload is higher, with a better trade-off in terms of quality and bitrate, as compared with previous works. This paper presents and analyzes a new approach to data hiding that embeds in both the intra - and inter -frames from the H.264/AVC video codec. Most of the current video data hiding algorithms take into account only the intra -frames for message embedding. This may be attributed to the perception that inter -frames are highly compressed due to the motion compensation, and any embedding message inside these may adversely affect the compression efficiency significantly. Payload of the inter -frames is also thought to be less, compared with the intra -frames, because of the lesser residual data. We analyze data hiding in both intra - and inter -frames over a wide range of QP values and observe that the payload of the inter is comparable with that of the intra -frames. Message embedding, in only those non-zero quantized transform coefficients (QTCs) which are above a specific threshold, enables us to detect and extract the message on the decoding side. There is no significant effect on the overall bitrate and PSNR of the video bitstream because instead of embedding message in the compressed bitstream, we have embedded it during the encoding process by taking into account the reconstruction loop. For the non-zero QTCs, in the case of intra -frames, we benefit from the spatial masking, while in the case of inter -frames, we exploit the motion and texture masking. We can notice that the data hiding is done during the compression process and the proposed scheme takes into account the reconstruction loop. The proposed scheme does not target robustness and the obtained payload is higher, with a better trade-off in terms of quality and bitrate, as compared with previous works. |
Author | Puech, William Chaumont, Marc Shahid, Zafar |
Author_xml | – sequence: 1 givenname: Zafar surname: Shahid fullname: Shahid, Zafar organization: LIRMM Laboratory, UMR 5506 CNRS, University of Montpellier II – sequence: 2 givenname: Marc surname: Chaumont fullname: Chaumont, Marc organization: LIRMM Laboratory, UMR 5506 CNRS, University of Montpellier II – sequence: 3 givenname: William surname: Puech fullname: Puech, William email: william.puech@lirmm.fr organization: LIRMM Laboratory, UMR 5506 CNRS, University of Montpellier II |
BackLink | https://hal-lirmm.ccsd.cnrs.fr/lirmm-00805722$$DView record in HAL |
BookMark | eNp9kE1LAzEQhoNUsNb-AG-5S9p87SZ7LEWtUPCiXjyEbDaxKbtJSbaC_95dVnp0LjPMvO8w89yCWYjBAnBP8IpgLNaZEFFihAlBmNICVVdgTmTJEBGEzC41ZjdgmfMRD8GokKWcg89tDNk3NvnwBfuDhcmaodOns-l9DLCN8QRdTLDRvYYH34y66KAPfdII6tCMpU3IJd3ZPI52K1ry9eZjeweunW6zXf7lBXh_enzb7tD-9fllu9kjw0rRI0Mls8ZWnBeskLqoXcENrWTjaiuL0mhqRFnXjtfDxYYTTV2lOeNC1pbWDLMFeJj2HnSrTsl3Ov2oqL3abfaq9anrFMYSF4LSbzKoyaQ2KeacrLtYCFYjTjXhVANONeJU1eChkyefRlA2qWM8pzA89Y_pFxLreDs |
CitedBy_id | crossref_primary_10_1109_LSP_2020_2998360 crossref_primary_10_1109_TIFS_2021_3078822 crossref_primary_10_1016_j_image_2019_04_012 crossref_primary_10_1109_TCSVT_2013_2276710 crossref_primary_10_1007_s11042_016_4055_1 crossref_primary_10_1109_TIFS_2020_3013523 crossref_primary_10_1117_1_JEI_33_1_011005 crossref_primary_10_1007_s12243_013_0413_4 crossref_primary_10_1109_ACCESS_2017_2691581 crossref_primary_10_1007_s11042_022_12029_5 crossref_primary_10_1007_s00530_021_00763_z crossref_primary_10_1088_1742_6596_1003_1_012035 crossref_primary_10_1109_ACCESS_2020_3030685 crossref_primary_10_3390_s21217200 crossref_primary_10_1117_1_OE_51_7_077403 |
Cites_doi | 10.1109/TIP.2003.821551 10.1109/30.793622 10.1109/TCSVT.2003.814964 10.1109/TCSVT.2003.815165 10.1117/1.2816054 10.1016/j.image.2005.03.012 10.1109/TIFS.2008.923825 10.1117/12.344662 10.1109/83.650120 10.1109/TCSVT.2003.815958 10.1109/TCSVT.2003.815957 10.1016/S0165-1684(98)00011-5 10.1109/83.892451 10.1109/TIFS.2007.897266 10.1007/978-3-642-04438-0_1 10.1145/1411328.1411347 10.1109/ICASSP.2008.4517968 10.1007/978-3-642-03688-0_10 10.1007/11552413_170 10.1109/MMSP.2007.4412894 10.1117/1.1877525 10.1109/ISM.2008.16 10.1109/ICIP.2005.1530199 10.1117/12.152694 10.1007/978-3-540-74260-9_62 10.1117/12.703369 10.1016/j.aeue.2010.02.003 |
ContentType | Journal Article |
Copyright | Springer-Verlag London Limited 2011 Distributed under a Creative Commons Attribution 4.0 International License |
Copyright_xml | – notice: Springer-Verlag London Limited 2011 – notice: Distributed under a Creative Commons Attribution 4.0 International License |
DBID | AAYXX CITATION 1XC VOOES |
DOI | 10.1007/s11760-011-0225-9 |
DatabaseName | CrossRef Hyper Article en Ligne (HAL) Hyper Article en Ligne (HAL) (Open Access) |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Computer Science |
EISSN | 1863-1711 |
EndPage | 93 |
ExternalDocumentID | oai_HAL_lirmm_00805722v1 10_1007_s11760_011_0225_9 |
GroupedDBID | -5B -5G -BR -EM -Y2 -~C .VR 06D 0R~ 123 1N0 203 29~ 2J2 2JN 2JY 2KG 2KM 2LR 2VQ 2~H 30V 4.4 406 408 409 40D 40E 5VS 67Z 6NX 875 8TC 95- 95. 95~ AAAVM AABHQ AAFGU AAHNG AAIAL AAJKR AANZL AAPBV AARHV AARTL AATNV AATVU AAUYE AAWCG AAYFA AAYIU AAYQN AAYTO ABBXA ABDZT ABECU ABFGW ABFTV ABHQN ABJNI ABJOX ABKAS ABKCH ABMNI ABMQK ABNWP ABQBU ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABWNU ABXPI ACBMV ACBRV ACBXY ACBYP ACGFS ACHSB ACHXU ACIGE ACIPQ ACKNC ACMDZ ACMLO ACOKC ACOMO ACSNA ACTTH ACVWB ACWMK ADHHG ADHIR ADINQ ADKNI ADKPE ADMDM ADOXG ADRFC ADTPH ADURQ ADYFF ADZKW AEBTG AEFTE AEGAL AEGNC AEJHL AEJRE AENEX AEOHA AEPYU AESKC AESTI AETLH AEVLU AEVTX AEXYK AFGCZ AFLOW AFNRJ AFQWF AFWTZ AFZKB AGAYW AGDGC AGGBP AGJBK AGMZJ AGQMX AGWIL AGWZB AGYKE AHAVH AHBYD AHSBF AHYZX AIAKS AIIXL AILAN AIMYW AITGF AJBLW AJDOV AJRNO AJZVZ AKQUC ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMXSW AMYLF AMYQR AOCGG ARMRJ AXYYD AYJHY B-. BA0 BDATZ BGNMA CAG COF CS3 CSCUP DDRTE DNIVK DPUIP EBLON EBS EIOEI EJD ESBYG FERAY FFXSO FIGPU FINBP FNLPD FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNWQR GQ6 GQ7 GQ8 GXS HF~ HG5 HG6 HLICF HMJXF HQYDN HRMNR HZ~ IJ- IKXTQ IWAJR IXC IXD IXE IZIGR IZQ I~X I~Z J-C J0Z JBSCW JCJTX JZLTJ KDC KOV LLZTM M4Y MA- NPVJJ NQJWS NU0 O9- O93 O9J OAM P9O PF0 PT4 QOS R89 R9I RIG ROL RPX RSV S16 S1Z S27 S3B SAP SDH SEG SHX SISQX SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 TSG TSK TSV TUC U2A UG4 UNUBA UOJIU UTJUX UZXMN VC2 VFIZW W48 YLTOR Z45 Z5O Z7R Z7S Z7X Z83 Z88 ZMTXR ~A9 AACDK AAJBT AASML AAYXX AAYZH ABAKF ACAOD ACDTI ACZOJ AEFQL AEMSY AFBBN AGQEE AGRTI AIGIU CITATION H13 SJYHP 1XC VOOES |
ID | FETCH-LOGICAL-c367t-c283ece9445358a5bf54c298dfbe856ca2c76bbf4b868c41a2f9a43478be2b303 |
IEDL.DBID | AEJHL |
ISSN | 1863-1703 |
IngestDate | Tue Oct 15 15:46:05 EDT 2024 Fri Nov 22 00:37:25 EST 2024 Sat Dec 16 12:01:27 EST 2023 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 1 |
Keywords | Non-zero quantized transform coefficients Video data hiding Intra- and inter-frames H.264/AVC Reconstruction loop |
Language | English |
License | Distributed under a Creative Commons Attribution 4.0 International License: http://creativecommons.org/licenses/by/4.0 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c367t-c283ece9445358a5bf54c298dfbe856ca2c76bbf4b868c41a2f9a43478be2b303 |
ORCID | 0000-0001-9383-2401 0000-0002-4095-4410 |
OpenAccessLink | https://hal-lirmm.ccsd.cnrs.fr/lirmm-00805722 |
PageCount | 19 |
ParticipantIDs | hal_primary_oai_HAL_lirmm_00805722v1 crossref_primary_10_1007_s11760_011_0225_9 springer_journals_10_1007_s11760_011_0225_9 |
PublicationCentury | 2000 |
PublicationDate | 1-2013 2013-1-00 2013-01 |
PublicationDateYYYYMMDD | 2013-01-01 |
PublicationDate_xml | – year: 2013 text: 1-2013 |
PublicationDecade | 2010 |
PublicationPlace | London |
PublicationPlace_xml | – name: London |
PublicationTitle | Signal, image and video processing |
PublicationTitleAbbrev | SIViP |
PublicationYear | 2013 |
Publisher | Springer-Verlag Springer Verlag |
Publisher_xml | – name: Springer-Verlag – name: Springer Verlag |
References | CR18 CR39 CR16 CR38 CR37 CR14 CR35 CR12 CR34 CR11 Langelaar, Lagendijk (CR19) 2001; 10 CR33 Cox, Kilian, Leighton, Shamoon (CR5) 1997; 6 Katzenbeisser, Petitcolas (CR17) 2000 Li, Cox (CR23) 2007; 2 CR32 Malvar, Hallapuro, Karczewicz, Kerofsky (CR25) 2003; 13 CR31 CR30 CR2 Lee, Chen (CR20) 1999; 45 Miller, Doerr, Cox (CR26) 2004; 13 Wiegand, Sullivan, Bjntegaard, Luthra (CR36) 2003; 13 CR4 CR3 CR6 Golikeri, Nasiopoulos, Wang (CR10) 2007; 16 Hartung, Girod (CR13) 1998; 66 CR7 Noorkami, Mersereau (CR29) 2008; 3 CR28 CR9 CR27 Alattar, Lin, Celik (CR1) 2003; 13 CR22 Deguillaume, Csurka, O’Ruanaidh, Pun (CR8) 1999; 3657 CR21 Lu, Chen, Fan (CR24) 2005; 20 CR40 Kang, Huang, Shi, Lin (CR15) 2003; 13 225_CR9 (225_CR17) 2000 225_CR28 225_CR27 F. Deguillaume (225_CR8) 1999; 3657 225_CR22 P. Lee (225_CR20) 1999; 45 225_CR21 225_CR40 H. Malvar (225_CR25) 2003; 13 A.M. Alattar (225_CR1) 2003; 13 G. Langelaar (225_CR19) 2001; 10 C. Lu (225_CR24) 2005; 20 Q. Li (225_CR23) 2007; 2 F. Hartung (225_CR13) 1998; 66 X. Kang (225_CR15) 2003; 13 225_CR18 225_CR37 225_CR14 M. Miller (225_CR26) 2004; 13 225_CR39 225_CR16 225_CR38 A. Golikeri (225_CR10) 2007; 16 225_CR11 225_CR33 225_CR32 225_CR35 225_CR12 M. Noorkami (225_CR29) 2008; 3 225_CR34 225_CR31 225_CR30 T. Wiegand (225_CR36) 2003; 13 225_CR2 225_CR3 225_CR4 225_CR6 I. Cox (225_CR5) 1997; 6 225_CR7 |
References_xml | – ident: CR22 – volume: 13 start-page: 792 issue: 2 year: 2004 end-page: 807 ident: CR26 article-title: Applying informed coding and embedding to design a robust high capacity watermark publication-title: IEEE Trans. Image Process. doi: 10.1109/TIP.2003.821551 contributor: fullname: Cox – ident: CR18 – volume: 45 start-page: 851 issue: 3 year: 1999 end-page: 859 ident: CR20 article-title: Robust error concealment algorithm for video decoder publication-title: IEEE Trans. Consumer Electron. doi: 10.1109/30.793622 contributor: fullname: Chen – ident: CR4 – ident: CR14 – ident: CR39 – ident: CR2 – ident: CR16 – volume: 13 start-page: 598 issue: 7 year: 2003 end-page: 603 ident: CR25 article-title: Low-complexity transform and quantization in H.264/AVC publication-title: IEEE Trans. Circuits Syst. Video Technol. doi: 10.1109/TCSVT.2003.814964 contributor: fullname: Kerofsky – ident: CR37 – ident: CR12 – ident: CR30 – volume: 13 start-page: 560 year: 2003 end-page: 576 ident: CR36 article-title: Overview of the H.264/AVC video coding standard publication-title: IEEE Trans. Circuits Syst. Video Technol. doi: 10.1109/TCSVT.2003.815165 contributor: fullname: Luthra – volume: 16 start-page: 043008 issue: 4 year: 2007 ident: CR10 article-title: Robust digital video watermarking scheme for H.264 advanced video coding standard publication-title: J. Electron. Imaging doi: 10.1117/1.2816054 contributor: fullname: Wang – volume: 20 start-page: 624 issue: 7 year: 2005 end-page: 642 ident: CR24 article-title: Real-time frame-dependent video watermarking in VLC domain publication-title: Signal Process. Image Commun. doi: 10.1016/j.image.2005.03.012 contributor: fullname: Fan – ident: CR33 – volume: 3 start-page: 441 issue: 3 year: 2008 end-page: 455 ident: CR29 article-title: Digital video watermarking in P-frames with controlled video bit-rate increase publication-title: IEEE Trans. Inf. Forensics Security doi: 10.1109/TIFS.2008.923825 contributor: fullname: Mersereau – ident: CR35 – ident: CR6 – volume: 3657 start-page: 113 year: 1999 end-page: 124 ident: CR8 article-title: Robust 3D DFT video watermarking publication-title: SPIE doi: 10.1117/12.344662 contributor: fullname: Pun – ident: CR40 – ident: CR27 – year: 2000 ident: CR17 publication-title: Information Hiding Techniques for Steganography and Digital Watermarking contributor: fullname: Petitcolas – ident: CR21 – volume: 6 start-page: 1673 year: 1997 end-page: 1687 ident: CR5 article-title: Secure spread spectrum watermarking for multimedia publication-title: IEEE Trans. Image Process. doi: 10.1109/83.650120 contributor: fullname: Shamoon – ident: CR3 – ident: CR38 – volume: 13 start-page: 787 year: 2003 end-page: 800 ident: CR1 article-title: Digital watermarking of low bit-rate advanced simple profile MPEG-4 compressed video publication-title: IEEE Trans. Circuits Syst. Video Technol. doi: 10.1109/TCSVT.2003.815958 contributor: fullname: Celik – volume: 13 start-page: 776 issue: 8 year: 2003 end-page: 786 ident: CR15 article-title: A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression publication-title: IEEE Trans. Circuits Syst. Video Technol. doi: 10.1109/TCSVT.2003.815957 contributor: fullname: Lin – ident: CR31 – ident: CR11 – ident: CR9 – ident: CR32 – volume: 66 start-page: 283 year: 1998 end-page: 333 ident: CR13 article-title: Watermarking of uncompressed and compressed video publication-title: Signal Process doi: 10.1016/S0165-1684(98)00011-5 contributor: fullname: Girod – ident: CR34 – volume: 10 start-page: 148 year: 2001 end-page: 158 ident: CR19 article-title: Differential energy watermarking of DCT encoded images and video publication-title: IEEE Trans. Image Process. doi: 10.1109/83.892451 contributor: fullname: Lagendijk – ident: CR7 – ident: CR28 – volume: 2 start-page: 127 issue: 2 year: 2007 end-page: 139 ident: CR23 article-title: Using perceptual models to improve fidelity and provide resistance to volumetric scaling for quantization index modulation watermarking publication-title: IEEE Trans. Inf. Forensics Security doi: 10.1109/TIFS.2007.897266 contributor: fullname: Cox – ident: 225_CR21 doi: 10.1007/978-3-642-04438-0_1 – volume: 13 start-page: 787 year: 2003 ident: 225_CR1 publication-title: IEEE Trans. Circuits Syst. Video Technol. doi: 10.1109/TCSVT.2003.815958 contributor: fullname: A.M. Alattar – ident: 225_CR39 doi: 10.1145/1411328.1411347 – volume: 3 start-page: 441 issue: 3 year: 2008 ident: 225_CR29 publication-title: IEEE Trans. Inf. Forensics Security doi: 10.1109/TIFS.2008.923825 contributor: fullname: M. Noorkami – volume: 6 start-page: 1673 year: 1997 ident: 225_CR5 publication-title: IEEE Trans. Image Process. doi: 10.1109/83.650120 contributor: fullname: I. Cox – ident: 225_CR9 – ident: 225_CR32 – ident: 225_CR30 – ident: 225_CR40 doi: 10.1109/ICASSP.2008.4517968 – ident: 225_CR7 – ident: 225_CR3 doi: 10.1007/978-3-642-03688-0_10 – ident: 225_CR34 – ident: 225_CR14 – volume: 66 start-page: 283 year: 1998 ident: 225_CR13 publication-title: Signal Process doi: 10.1016/S0165-1684(98)00011-5 contributor: fullname: F. Hartung – ident: 225_CR4 doi: 10.1007/11552413_170 – ident: 225_CR12 – ident: 225_CR16 doi: 10.1109/MMSP.2007.4412894 – ident: 225_CR22 – ident: 225_CR38 doi: 10.1117/1.1877525 – ident: 225_CR11 doi: 10.1109/ISM.2008.16 – ident: 225_CR28 doi: 10.1109/ICIP.2005.1530199 – ident: 225_CR35 doi: 10.1117/12.152694 – ident: 225_CR6 – ident: 225_CR18 doi: 10.1007/978-3-540-74260-9_62 – ident: 225_CR27 doi: 10.1117/12.703369 – volume: 13 start-page: 598 issue: 7 year: 2003 ident: 225_CR25 publication-title: IEEE Trans. Circuits Syst. Video Technol. doi: 10.1109/TCSVT.2003.814964 contributor: fullname: H. Malvar – ident: 225_CR2 – volume: 13 start-page: 776 issue: 8 year: 2003 ident: 225_CR15 publication-title: IEEE Trans. Circuits Syst. Video Technol. doi: 10.1109/TCSVT.2003.815957 contributor: fullname: X. Kang – ident: 225_CR33 – ident: 225_CR31 – ident: 225_CR37 doi: 10.1016/j.aeue.2010.02.003 – volume: 10 start-page: 148 year: 2001 ident: 225_CR19 publication-title: IEEE Trans. Image Process. doi: 10.1109/83.892451 contributor: fullname: G. Langelaar – volume: 2 start-page: 127 issue: 2 year: 2007 ident: 225_CR23 publication-title: IEEE Trans. Inf. Forensics Security doi: 10.1109/TIFS.2007.897266 contributor: fullname: Q. Li – volume: 16 start-page: 043008 issue: 4 year: 2007 ident: 225_CR10 publication-title: J. Electron. Imaging doi: 10.1117/1.2816054 contributor: fullname: A. Golikeri – volume: 20 start-page: 624 issue: 7 year: 2005 ident: 225_CR24 publication-title: Signal Process. Image Commun. doi: 10.1016/j.image.2005.03.012 contributor: fullname: C. Lu – volume-title: Information Hiding Techniques for Steganography and Digital Watermarking year: 2000 ident: 225_CR17 – volume: 3657 start-page: 113 year: 1999 ident: 225_CR8 publication-title: SPIE doi: 10.1117/12.344662 contributor: fullname: F. Deguillaume – volume: 13 start-page: 560 year: 2003 ident: 225_CR36 publication-title: IEEE Trans. Circuits Syst. Video Technol. doi: 10.1109/TCSVT.2003.815165 contributor: fullname: T. Wiegand – volume: 13 start-page: 792 issue: 2 year: 2004 ident: 225_CR26 publication-title: IEEE Trans. Image Process. doi: 10.1109/TIP.2003.821551 contributor: fullname: M. Miller – volume: 45 start-page: 851 issue: 3 year: 1999 ident: 225_CR20 publication-title: IEEE Trans. Consumer Electron. doi: 10.1109/30.793622 contributor: fullname: P. Lee |
SSID | ssj0000327868 ssib029852030 |
Score | 2.091833 |
Snippet | This paper presents and analyzes a new approach to data hiding that embeds in both the
intra
- and
inter
-frames from the H.264/AVC video codec. Most of the... This paper presents and analyzes a new approach to data hiding that embeds in both the intra- and inter-frames from the H.264/AVC video codec. Most of the... |
SourceID | hal crossref springer |
SourceType | Open Access Repository Aggregation Database Publisher |
StartPage | 75 |
SubjectTerms | Computer Imaging Computer Science Image Processing Image Processing and Computer Vision Multimedia Information Systems Original Paper Pattern Recognition and Graphics Signal,Image and Speech Processing Vision |
Title | Considering the reconstruction loop for data hiding of intra- and inter-frames of H.264/AVC |
URI | https://link.springer.com/article/10.1007/s11760-011-0225-9 https://hal-lirmm.ccsd.cnrs.fr/lirmm-00805722 |
Volume | 7 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LT9wwEB514QIHoDzEAq184ERlyDp2Yh9XsCiqUC88VIlDZDu2WAFZxAK_n5lsstCqHOgtUSwrmhl7vvGMvwHY1zYVygbJc2Utl95Z7qy23DijfRVdYhri-eI8__Vbn4yIJkfMjy7q28MuI9ls1G933QZ5RjVUGP2iDXLTg0V0PQpte3E4-lmcdVYkjFYiaUFxsx-nItezO3E6Iz7OJO3Sm_-a9w8H1buh8si_cqSN6zld_Z-fXoOVFmiy4cwyvsKXUK_DatfEgbVreh2W3zESbsB118AT3xhiQ9YEzHOSWXY3mTwwxLmMKkvZzZg8H5tENqYzYs5sXdFjeOSRir6m9Kk4RDR0NLw63oTL09HFccHb_gvcp1n-xD1Cj-CDkVKlSlvlopIexYsqDFpl3gqfZ85F6VC8Xg6siMbKVObaBeHQN27BQj2pwzawJPUD7QVGcxWx6UQblfMVtQc0iYxG9uGgE3r5MKPZKN8IlUmIJQqxJCGWpg_7qJb5OCLILoZn5d348f6-JAisciFeBn340SmlbBfm9ONJdz41eheWRNMXg85i9mAB1RC-QW9aPX9vzfEVEBbVLA |
link.rule.ids | 230,315,782,786,887,27933,27934,41073,42142,48344,48347,48357,49649,49652,49662,52153 |
linkProvider | Springer Nature |
linkToHtml | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1RT9swED5ReGB7AMaGVjbADzyBDKljJ_ZjxShBK7xQJiQeLNux1UrQVi3s98-XJsDQ9gBviWJZ0d3Z99l39x3AvjQpE8ZzmgtjKHfWUGukocoq6cpgE1URzxdX-eWN_HGKNDlpUwtTZbs3Iclqp34uduvkGSZRxeNvNEKqWrDCVcajKa90zwdnvcaMmJKCJTUqrjbklOVyURQnMyTkTNImvvmvef_yUK0h5ke-CpJWvqe3_q6_3oC1GmqS7sI2PsGSH2_CetPGgdSrehM-vuAk_Ay3TQvP-EYiOiTVkfmJZpbcTSZTEpEuwdxSMhyh7yOTQEZ4S0yJGZf46Gc0YNrXHD8VRxEPHXd_nXyB697p4KSgdQcG6tIsf6Augg_vvOJcpEIaYYPgLso3KtFLkTnDXJ5ZG7iN8nW8Y1hQhqc8l9YzG73jFiyPJ2P_FUiSuo50LJ7nSuTTCSYI60psEKgSHhRvw0EjdT1dEG3oZ0plFKKOQtQoRK3asB_18jQOKbKLbl_fjWb39xpBsMgZ-91pw2GjFF0vzfn_J91-0-g9WC0GF33dP7_8-Q0-sKpLBt7MfIflqBK_A615-bhb2-Yf9oDZHA |
linkToPdf | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3fb9MwED7RTULwwGAwUdjAD3sCmaaOndhPU7W1ClBNSPwQEg-W7dhapS2t1sHfz12abIDYA-ItUSxLuTv7vrPvvgM41C4XykXJS-Ucl8E77p123HijQ518Zlri-epjefpVn0yJJueor4Vps937K8lNTQOxNDVXo1WdRjeFb-OyoIQqDIXRILkZwLbEQAYNfXsyfVfNe5MSRiuRdQi53ZxzUepNgZwuiJwzy_u7zr_N-5u3GpxRruQfF6atH5rt_PcfPIQHHQRlk43NPII7sdmFnb69A-tW-y7c_4Wr8DF861t74htD1MjaUPqafpadL5crhgiYUc4pO1uQT2TLxBZ0esyZa2p6jJc8UTrYmj5VbxAnjSZfjp_A59n003HFu84MPORFecUDgpIYopFS5Uo75ZOSAWWNyo1aFcGJUBbeJ-lR1kGOnUjGyVyW2kfh0WvuwVazbOJTYFkexjoIjPNq4tlJLikfamocaDKZjBzCq14DdrUh4LA3VMskRItCtCREa4ZwiDq6HkfU2dVkbs8XlxcXlsCxKoX4MR7C615Btluy69snffZPo1_C3Q8nMzt_e_r-OdwTbfMMOrDZhy3USDyAwbr-_qIz05-na-Hf |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Considering+the+reconstruction+loop+for+data+hiding+of+intra-+and+inter-frames+of+H.264%2FAVC&rft.jtitle=Signal%2C+image+and+video+processing&rft.au=Shahid%2C+Zafar&rft.au=Chaumont%2C+Marc&rft.au=Puech%2C+William&rft.date=2013-01-01&rft.pub=Springer-Verlag&rft.issn=1863-1703&rft.eissn=1863-1711&rft.volume=7&rft.issue=1&rft.spage=75&rft.epage=93&rft_id=info:doi/10.1007%2Fs11760-011-0225-9&rft.externalDocID=10_1007_s11760_011_0225_9 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1863-1703&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1863-1703&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1863-1703&client=summon |