4
Volume No: 2 (2016), Issue No: 2 (July) July 2016 www. IJRACSE.com Page 16 ABSTRACT: Steganography is that the art of activity info in ways in which avert the revealing of activity messages. Video files are usually a set of pictures. Thus most of the con- ferred techniques on pictures and audio will be applied to video files too. The good benefits of video are the mas- sive quantity of knowledge that may be hidden within and also the incontrovertible fact that it’s a moving stream of image. During this paper, we have a tendency to project a replacement technique mistreatment the motion vector, to cover the info within the moving objects. Moreover, to boost the protection of the info, the info is encrypted by mistreatment the DES formula then hided. The info is hided within the horizontal and also the vertical elements of the moving objects. KEYWORDS: Data hiding, encrypted domain, H.264/AVC, code word substituting. INTRODUCTION: The rise of the web one among the foremost necessary factors of data technology and communication has been the safety of data. Cryptography was created as a way for securing the secrecy of communication and plenty of completely different strategies are developed to inscribe and decode information so as to stay the message secret. Sadly it’s generally not enough to stay the contents of a message secret, it should even be necessary to stay the existence of the message secret. The technique wont to implement this, is named steganography. it’s differs from cryptography within the sense that wherever cryptogra- phy focuses on keeping the contents of a message secret, steganography focuses on keeping the existence of a mes- sage secret Steganography and cryptography square mea- sure each ways in which to safeguard data from unwanted parties. Once the presence of hidden data is discovered or maybe suspected, the aim steganography is part defeated. The strength of steganography will therefore be amplified by combining it with cryptography. EXISTING SYSTEM: In special domain, the activity method like least vi- » tal bit (LSB) replacement, is finished in special domain, whereas remodel domain methods; hide knowledge in an- other domain like ripple domain. Least vital bit (LSB) is that the simplest variety of Ste- » ganography. LSB relies on inserting knowledge within the least vital little bit of pixels that cause a small modi- fication on the quilt image that’s not noticeable to human eye. Since this technique are often simply cracked, it’s a lot of susceptible to attacks. LSB technique has intense effects on the applied math » info of image like bar graph. Attackers may well be awake to a hidden communication by simply checking the bar graph of a picture. an honest answer to eliminate this de- fect was LSB matching. LSB-Matching was an excellent success in Steganography strategies and lots of others get ideas from it DISADVANTAGES: The secret key used for cryptography of compressed » image and also the information concealing is same. So, the user World Health Organization is aware of the key used for cryptography will access {the information thein- fo the information} embedded and also the original data. The original video will be retrieved from the com- » pressed video when extracting or removing the informa- tion hidden within the image. Providing Security for the Data Using Image and Video Water Marking Neenavath Raju PG Scholar, Dept of CSE, Jawaharlal Nehru Institute of Technology, Hyderabad. K.Shalini Associate Professor, Dept of CSE, Jawaharlal Nehru Institute of Technology, Hyderabad.

Providing Security for the Data Using Image and Video ... · Water Marking Neenavath Raju PG Scholar, Dept of CSE, Jawaharlal Nehru Institute of Technology, Hyderabad. K.Shalini Associate

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Volume No: 2 (2016), Issue No: 2 (July) July 2016 www. IJRACSE.com Page 16

ABSTRACT:

Steganography is that the art of activity info in ways in which avert the revealing of activity messages. Video files are usually a set of pictures. Thus most of the con-ferred techniques on pictures and audio will be applied to video files too. The good benefits of video are the mas-sive quantity of knowledge that may be hidden within and also the incontrovertible fact that it’s a moving stream of image. During this paper, we have a tendency to project a replacement technique mistreatment the motion vector, to cover the info within the moving objects. Moreover, to boost the protection of the info, the info is encrypted by mistreatment the DES formula then hided. The info is hided within the horizontal and also the vertical elements of the moving objects.

KEYWORDS:Data hiding, encrypted domain, H.264/AVC, code word substituting. INTRODUCTION:The rise of the web one among the foremost necessary factors of data technology and communication has been the safety of data. Cryptography was created as a way for securing the secrecy of communication and plenty of completely different strategies are developed to inscribe and decode information so as to stay the message secret. Sadly it’s generally not enough to stay the contents of a message secret, it should even be necessary to stay the existence of the message secret. The technique wont to implement this, is named steganography. it’s differs from cryptography within the sense that wherever cryptogra-phy focuses on keeping the contents of a message secret, steganography focuses on keeping the existence of a mes-sage secret Steganography and cryptography square mea-sure each ways in which to safeguard data from unwanted parties.

Once the presence of hidden data is discovered or maybe suspected, the aim steganography is part defeated. The strength of steganography will therefore be amplified by combining it with cryptography.

EXISTING SYSTEM:

In special domain, the activity method like least vi- »tal bit (LSB) replacement, is finished in special domain, whereas remodel domain methods; hide knowledge in an-other domain like ripple domain.

Least vital bit (LSB) is that the simplest variety of Ste- »ganography. LSB relies on inserting knowledge within the least vital little bit of pixels that cause a small modi-fication on the quilt image that’s not noticeable to human eye. Since this technique are often simply cracked, it’s a lot of susceptible to attacks.

LSB technique has intense effects on the applied math »info of image like bar graph. Attackers may well be awake to a hidden communication by simply checking the bar graph of a picture. an honest answer to eliminate this de-fect was LSB matching. LSB-Matching was an excellent success in Steganography strategies and lots of others get ideas from it

DISADVANTAGES:

The secret key used for cryptography of compressed »image and also the information concealing is same. So, the user World Health Organization is aware of the key used for cryptography will access {the information thein-fo the information} embedded and also the original data.

The original video will be retrieved from the com- »pressed video when extracting or removing the informa-tion hidden within the image.

Providing Security for the Data Using Image and Video Water Marking

Neenavath Raju PG Scholar,

Dept of CSE,Jawaharlal Nehru Institute of Technology,

Hyderabad.

K.Shalini Associate Professor,

Dept of CSE,Jawaharlal Nehru Institute of Technology,

Hyderabad.

Volume No: 2 (2016), Issue No: 2 (July) July 2016 www. IJRACSE.com Page 16

Volume No: 2 (2016), Issue No: 2 (July) July 2016 www. IJRACSE.com Page 17

PROPOSED SYSTEM:

Data concealing in video sequences is performed in 2 major ways: bit stream-level and data-level. During this paper, we have a tendency to propose a brand new block-based selective embedding sort information concealing Framework. By suggests that of easy rules applied to the frame markers, we have a tendency to introduce bound level of strength against frame drop, repeat and insert at-tacks.

ADVANTAGES:

It isn’t simply cracked. »To increase the protection. »To increase the dimensions of hold on information. »We will hide quite one bit. »

ARCHITECTURE DIAGRAM:

LITERATURE SURVEY:Watermarking Security:

Theory and Practice This paper proposes a theory of wa-termarking security supported a cryptography purpose of read. The most plan is that info concerning the key leaks from the observations, for example, watermarked items of content, obtainable to the opponent. Tools from scientific theory (Shannon’s mutual info and Fisher’s info matrix) will live this discharge of data. The protection level is then outlined because the range of observations the as-sailant has to with success estimate the key. This theory is applied to 2

common watermarking methods: the substitutive theme and therefore the unfold spectrum-based techniques. Their security levels square measure calculated against 3 styles of attack. The experimental work illustrates howev-er Blind supply Separation (especially freelance element Analysis) algorithms facilitate the opponent exploiting this info discharge to disclose the key carriers within the unfold spectrum case. Simulations assess the protection levels derived within the theoretical a part of the paper.

Secure Spread Spectrum:

This paper presents a secure (tamper-resistant) rule for watermarking pictures, and a technique for digital water-marking that will be generalized to audio, video, and trans-mission knowledge. we tend to advocate that a watermark ought to be created as AN freelance and identically dis-tributed (i.e.) Gaussian random vector that’s unnoticeably inserted in an exceedingly spread-spectrum-like fashion into the perceptually most vital spectral parts of the info. we tend to argue that insertion of a watermark below this regime makes the watermark strong to signal process op-erations (such as lossy compression, filtering, digital-ana-log and analog-digital conversion, quantization, etc.), and customary geometric transformations (such as cropping, scaling, translation, and rotation) as long as the first image is out there which it is with success registered against the reworked watermarked image. In these cases, the water-mark detector unambiguously identifies the owner. Fur-ther, the employment of Gaussian noise, ensures robust resilience to multiple-document, or collisional, attacks. Experimental results are provided to support these claims, beside AN exposition of unfinished open issues.

The Zero-Rate Spread - Spectrum Water-marking Game

This paper develops a game-theoretic methodology to style and implant messages in signals and pictures within the presence of an opponent. Here, is assumed to be sub exponential within the signal’s sample size (zero-rate transmission), and also the embedding is finished victim-ization spread-spectrum watermarking. The detector per-forms applied mathematics hypothesis testing. The sys-tem is meant to attenuate likelihood of error underneath the worst-case attack in a much prescribed category of attacks.

Volume No: 2 (2016), Issue No: 2 (July) July 2016 www. IJRACSE.com Page 18

Volume No: 2 (2016), Issue No: 2 (July) July 2016 www. IJRACSE.com Page 19

The variables during this game are likelihood distributions for the water marker and aggressor. Analytical solutions are derived underneath the idea of mathematician host vectors, watermarks and attacks, and squared-error distor-tion constraints for the water marker and also the aggres-sor. The Karhunen–Loève remodel (KLT) plays a central role during this study. The best distributions for the water marker and also the aggressor are mathematician take a look at channels applied to the KLT coefficients; the sport is then reduced to a maxim power-allocation drawback between the channels. As a byproduct of this analysis, we are able to verify the best exchange between victimiza-tion the foremost economical (in terms of detection per-formance) signal elements for transmission and spread-ing the transmission across several elements (to fool the attacker’s tries to eliminate the watermark). We tend to conjointly conclude that during this framework, additive watermarks ar suboptimal; they’re, however, nearly best in a very small-distortion regime. The speculation is ap-plied to watermarking of autoregressive processes and to wavelet-based image watermarking. The best watermark style outperforms typical styles supported heuristic power allocations and/or easy correlation detectors.

Kirchhoff’s-Based Embedding Security:

It has recently been discovered that victimization pseu-dorandom sequences as carriers in spread-spectrum tech-niques for data-hiding isn’t in the slightest degree a suf-ficient condition for guaranteeing data-hiding security. Victimization correct and realistic apriority hypothesis on the messages distribution, it’s attainable to accurately esti-mate the key carriers by casting this estimation downside into a blind supply separation downside. once reviewing relevant works on spread-spectrum security for water-marking, we have a tendency to additional develop this subject to introduce the construct of security categories that broaden previous notions in watermarking security and fill the gap with steganography security as outlined by Caching. We have a tendency to outline four security cat-egories, namely, by order of creasing security: insecurity, key security, mathematical space security, and stegosecu-rity. Let’s say these views, we have a tendency to gift 2 new modulations for really secure watermarking within the watermark-only-attack (WOA) framework. The pri-mary one is named natural watermarking and may be cre-ated either stegosecurity or mathematical space secure.

The adjective based mostly compression technique is evaluated specified the information is embedding within the vertical and horizontal part pixels. The PSNR price is calculated to point out that the frame is transmitted with none loss or distortion. As a result, the motion vector technique is found because the higher resolution since it hides the information within the moving objects instead of within the still photos. The cryptography enhances the protection of the information being transmitted.

REFERENCE:

[1] W. J. Lu, A. Varna, and M. Wu, “Secure video process-ing: Problems and challenges,” in Proc. IEEE Int. Conf. Acoust., Speech, Signal Processing, Prague, Czech Re-public, May 2011, pp. 5856–5859. [2] B. Zhao, W. D. Kou, and H. Li, “Effective water-marking scheme in the encrypted domain for buyer-seller watermarking protocol,” Inf. Sci., vol. 180, no. 23, pp. 4672–4684, 2010. [3] P. J. Zheng and J. W. Huang, “Walsh-Hadamard trans-form in the homo- morphic encrypted domain and its ap-plication in image watermarking,” in Proc. 14th Inf. Hid-ing Conf., Berkeley, CA, USA, 2012, pp. 1–15. [4] W. Puech, M. Chaumont, and O. Strauss, “A reversible data hiding method for encrypted images,” Proc. SPIE, vol. 6819, pp. 68191E-1–68191E-9, Jan. 2008. [5] X. P. Zhang, “Reversible data hiding in encrypted im-age,” IEEE Signal Process. Lett., vol. 18, no. 4, pp. 255–258, Apr. 2011. [6] W. Hong, T. S. Chen, and H. Y. Wu, “An improved reversible data hiding in encrypted images using side match,” IEEE Signal Process. Lett., vol. 19, no. 4, pp. 199–202, Apr. 2012. [7] X. P. Zhang, “Separable revers-ible data hiding in encrypted image,” IEEE Trans. Inf. Fo-rensics Security, vol. 7, no. 2, pp. 826–832, Apr. 2012. [8] K. D. Ma, W. M. Zhang, X. F. Zhao, N. Yu, and F. Li, “Reversible data hiding in encrypted images by reserving room before encryption,” IEEE Trans. Inf. Forensics Se-curity, vol. 8, no. 3, pp. 553–562, Mar. 2013.[9] A. V. Subramanyam, S. Emmanuel, and M. S. Kankan-halli, “Robust watermarking of compressed and encrypted JPEG2000 images,” IEEE Trans. Multimedia, vol. 14, no. 3, pp. 703–716, Jun. 2012. [10] S. G. Lian, Z. X. Liu, and Z. Ren, “Commutative en-cryption and watermarking in video compression,” IEEE Trans. Circuits Syst. Video Technol., vol. 17, no. 6, pp. 774–778, Jun. 2007.

ModulesVideo Compression

Video compression uses fashionable writing techniques to cut back redundancy in video knowledge. Video compres-sion usually operates on square-shaped teams of neigh-boring pixels, usually referred to as macro blocks. These picture element teams or blocks of pixels area unit com-pared from one frame to consecutive and also the video compression code sends solely the variations inside those blocks. In areas of video with additional motion, the com-pression should inscribe additional knowledge to stay up with the larger variety of pixels that area unit dynamical.

Encryption

Encryption is that the conversion of knowledge into a type, referred to as a cipher text that can’t be simply un-derstood by unauthorized individuals. Original message is being hidden inside a carrier specified the changes thus occurred within the carrier don’t seem to be noticeable. data theknowledge the data} regarding the user outlined information, the decoding non-public key wont to cipher the text and also the average time of the frame format is given. The encoding of the text is finished by victimiza-tions the DES customary algorithmic rule since the key size is larger for the DES.

Extraction of original data

Decoding is that the method of changing encrypted knowledge back to its original type, thus it will be under-stood. Once the user inputs the right key that’s used at the decoding method, this can extract the first message that’s encrypted and embedded.

CONCLUSION:

In this paper, we have a tendency to propose and inves-tigate the information concealing methodology exploita-tion the motion vector technique for the moving objects. Within the existing works the information is hided at in-tervals the still photos wherever because it can resulted in the image distortion? By embedding the information within the moving objects the standard of the video is raised. During this paper, the compressed video is em-ployed for the information transmission since it will hold giant volume of the information.

[11] S. W. Park and S. U. Shin, “Combined scheme of en-cryption and watermarking in H.264/scalable video cod-ing (SVC),” New Directions Intell. Interact. Multimedia, vol. 142, no. 1, pp. 351–361, 2008. [12] T. Wiegand, G. J. Sullivan, G. Bjontegaard, and A. Luthra, “Overview of the H.264/AVC video coding stan-dard,” IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 7, pp. 560–576, Jul. 2003. [13] S. G. Lian, Z. X. Liu, Z. Ren, and H. L. Wang, “Se-cure advanced video coding based on selective encryp-tion algorithms,” IEEE Trans. Consumer Electron., vol. 52, no. 2, pp. 621–629, May 2006. [14] Z. Shahid, M. Chaumont, and W. Puech, “Fast pro-tection of H.264/AVC by selective encryption of CAVLC and CABAC for I and P frames,” IEEE Trans. Circuits Syst. Video Technol., vol. 21, no. 5, pp. 565–576, May 2011. [15] M. N. Asghar and M. Ghanbari, “An efficient secu-rity system for CABAC bin-strings of H.264/SVC,” IEEE Trans. Circuits Syst. Video Technol., vol. 23, no. 3, pp. 425–437, Mar. 2013. [16] T. Stutz and A. Uhl, “A survey of H.264 AVC/SVC encrypt- tion,” IEEE Trans. Circuits Syst. Video Technol., vol. 22, no. 3, pp. 325–339, Mar. 2012. [17] Advanced Video Coding for Generic Audiovisual Services, ITU, Geneva, Switzerland, Mar. 2005.[18] J. G. Jiang, Y. Liu, Z. P. Su, G. Zhang, and S. Xing, “An improved selective encryption for H.264 video based on intra prediction mode scrambling,” J. Multimedia, vol. 5, no. 5, pp. 464–472, 2010. [19] I. E. G. Richardson, H.264 and MPEG-4 Video Com-pression: Video Coding for Next Generation Multimedia. Hoboken, NJ, USA: Wiley, 2003. [20] D. K. Zou and J. A. Bloom, “H.264 stream replace-ment watermarking with CABAC encoding,” in Proc. IEEE ICME, Singapore, Jul. 2010, pp. 117–121. [21] D. W. Xu and R. D. Wang, “Watermarking in H.264/AVC compressed domain using Exp-Golomb code words mapping,” Opt. Eng., vol. 50, no. 9, p. 097402, 2011. [22] D. W. Xu, R. D. Wang, and J. C. Wang, “Prediction mode modulated data-hiding algorithm for H.264/AVC,” J. Real-Time Image Process., vol. 7, no. 4, pp. 205–214, 2012. [23] T. Shanableh, “Data hiding in MPEG video files us-ing multivariate regression and flexible macroblock or-dering,” IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 455–464, Apr. 2012.

Volume No: 2 (2016), Issue No: 2 (July) July 2016 www. IJRACSE.com Page 18

Volume No: 2 (2016), Issue No: 2 (July) July 2016 www. IJRACSE.com Page 19

The variables during this game are likelihood distributions for the water marker and aggressor. Analytical solutions are derived underneath the idea of mathematician host vectors, watermarks and attacks, and squared-error distor-tion constraints for the water marker and also the aggres-sor. The Karhunen–Loève remodel (KLT) plays a central role during this study. The best distributions for the water marker and also the aggressor are mathematician take a look at channels applied to the KLT coefficients; the sport is then reduced to a maxim power-allocation drawback between the channels. As a byproduct of this analysis, we are able to verify the best exchange between victimiza-tion the foremost economical (in terms of detection per-formance) signal elements for transmission and spread-ing the transmission across several elements (to fool the attacker’s tries to eliminate the watermark). We tend to conjointly conclude that during this framework, additive watermarks ar suboptimal; they’re, however, nearly best in a very small-distortion regime. The speculation is ap-plied to watermarking of autoregressive processes and to wavelet-based image watermarking. The best watermark style outperforms typical styles supported heuristic power allocations and/or easy correlation detectors.

Kirchhoff’s-Based Embedding Security:

It has recently been discovered that victimization pseu-dorandom sequences as carriers in spread-spectrum tech-niques for data-hiding isn’t in the slightest degree a suf-ficient condition for guaranteeing data-hiding security. Victimization correct and realistic apriority hypothesis on the messages distribution, it’s attainable to accurately esti-mate the key carriers by casting this estimation downside into a blind supply separation downside. once reviewing relevant works on spread-spectrum security for water-marking, we have a tendency to additional develop this subject to introduce the construct of security categories that broaden previous notions in watermarking security and fill the gap with steganography security as outlined by Caching. We have a tendency to outline four security cat-egories, namely, by order of creasing security: insecurity, key security, mathematical space security, and stegosecu-rity. Let’s say these views, we have a tendency to gift 2 new modulations for really secure watermarking within the watermark-only-attack (WOA) framework. The pri-mary one is named natural watermarking and may be cre-ated either stegosecurity or mathematical space secure.

The adjective based mostly compression technique is evaluated specified the information is embedding within the vertical and horizontal part pixels. The PSNR price is calculated to point out that the frame is transmitted with none loss or distortion. As a result, the motion vector technique is found because the higher resolution since it hides the information within the moving objects instead of within the still photos. The cryptography enhances the protection of the information being transmitted.

REFERENCE:

[1] W. J. Lu, A. Varna, and M. Wu, “Secure video process-ing: Problems and challenges,” in Proc. IEEE Int. Conf. Acoust., Speech, Signal Processing, Prague, Czech Re-public, May 2011, pp. 5856–5859. [2] B. Zhao, W. D. Kou, and H. Li, “Effective water-marking scheme in the encrypted domain for buyer-seller watermarking protocol,” Inf. Sci., vol. 180, no. 23, pp. 4672–4684, 2010. [3] P. J. Zheng and J. W. Huang, “Walsh-Hadamard trans-form in the homo- morphic encrypted domain and its ap-plication in image watermarking,” in Proc. 14th Inf. Hid-ing Conf., Berkeley, CA, USA, 2012, pp. 1–15. [4] W. Puech, M. Chaumont, and O. Strauss, “A reversible data hiding method for encrypted images,” Proc. SPIE, vol. 6819, pp. 68191E-1–68191E-9, Jan. 2008. [5] X. P. Zhang, “Reversible data hiding in encrypted im-age,” IEEE Signal Process. Lett., vol. 18, no. 4, pp. 255–258, Apr. 2011. [6] W. Hong, T. S. Chen, and H. Y. Wu, “An improved reversible data hiding in encrypted images using side match,” IEEE Signal Process. Lett., vol. 19, no. 4, pp. 199–202, Apr. 2012. [7] X. P. Zhang, “Separable revers-ible data hiding in encrypted image,” IEEE Trans. Inf. Fo-rensics Security, vol. 7, no. 2, pp. 826–832, Apr. 2012. [8] K. D. Ma, W. M. Zhang, X. F. Zhao, N. Yu, and F. Li, “Reversible data hiding in encrypted images by reserving room before encryption,” IEEE Trans. Inf. Forensics Se-curity, vol. 8, no. 3, pp. 553–562, Mar. 2013.[9] A. V. Subramanyam, S. Emmanuel, and M. S. Kankan-halli, “Robust watermarking of compressed and encrypted JPEG2000 images,” IEEE Trans. Multimedia, vol. 14, no. 3, pp. 703–716, Jun. 2012. [10] S. G. Lian, Z. X. Liu, and Z. Ren, “Commutative en-cryption and watermarking in video compression,” IEEE Trans. Circuits Syst. Video Technol., vol. 17, no. 6, pp. 774–778, Jun. 2007.

ModulesVideo Compression

Video compression uses fashionable writing techniques to cut back redundancy in video knowledge. Video compres-sion usually operates on square-shaped teams of neigh-boring pixels, usually referred to as macro blocks. These picture element teams or blocks of pixels area unit com-pared from one frame to consecutive and also the video compression code sends solely the variations inside those blocks. In areas of video with additional motion, the com-pression should inscribe additional knowledge to stay up with the larger variety of pixels that area unit dynamical.

Encryption

Encryption is that the conversion of knowledge into a type, referred to as a cipher text that can’t be simply un-derstood by unauthorized individuals. Original message is being hidden inside a carrier specified the changes thus occurred within the carrier don’t seem to be noticeable. data theknowledge the data} regarding the user outlined information, the decoding non-public key wont to cipher the text and also the average time of the frame format is given. The encoding of the text is finished by victimiza-tions the DES customary algorithmic rule since the key size is larger for the DES.

Extraction of original data

Decoding is that the method of changing encrypted knowledge back to its original type, thus it will be under-stood. Once the user inputs the right key that’s used at the decoding method, this can extract the first message that’s encrypted and embedded.

CONCLUSION:

In this paper, we have a tendency to propose and inves-tigate the information concealing methodology exploita-tion the motion vector technique for the moving objects. Within the existing works the information is hided at in-tervals the still photos wherever because it can resulted in the image distortion? By embedding the information within the moving objects the standard of the video is raised. During this paper, the compressed video is em-ployed for the information transmission since it will hold giant volume of the information.

[11] S. W. Park and S. U. Shin, “Combined scheme of en-cryption and watermarking in H.264/scalable video cod-ing (SVC),” New Directions Intell. Interact. Multimedia, vol. 142, no. 1, pp. 351–361, 2008. [12] T. Wiegand, G. J. Sullivan, G. Bjontegaard, and A. Luthra, “Overview of the H.264/AVC video coding stan-dard,” IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 7, pp. 560–576, Jul. 2003. [13] S. G. Lian, Z. X. Liu, Z. Ren, and H. L. Wang, “Se-cure advanced video coding based on selective encryp-tion algorithms,” IEEE Trans. Consumer Electron., vol. 52, no. 2, pp. 621–629, May 2006. [14] Z. Shahid, M. Chaumont, and W. Puech, “Fast pro-tection of H.264/AVC by selective encryption of CAVLC and CABAC for I and P frames,” IEEE Trans. Circuits Syst. Video Technol., vol. 21, no. 5, pp. 565–576, May 2011. [15] M. N. Asghar and M. Ghanbari, “An efficient secu-rity system for CABAC bin-strings of H.264/SVC,” IEEE Trans. Circuits Syst. Video Technol., vol. 23, no. 3, pp. 425–437, Mar. 2013. [16] T. Stutz and A. Uhl, “A survey of H.264 AVC/SVC encrypt- tion,” IEEE Trans. Circuits Syst. Video Technol., vol. 22, no. 3, pp. 325–339, Mar. 2012. [17] Advanced Video Coding for Generic Audiovisual Services, ITU, Geneva, Switzerland, Mar. 2005.[18] J. G. Jiang, Y. Liu, Z. P. Su, G. Zhang, and S. Xing, “An improved selective encryption for H.264 video based on intra prediction mode scrambling,” J. Multimedia, vol. 5, no. 5, pp. 464–472, 2010. [19] I. E. G. Richardson, H.264 and MPEG-4 Video Com-pression: Video Coding for Next Generation Multimedia. Hoboken, NJ, USA: Wiley, 2003. [20] D. K. Zou and J. A. Bloom, “H.264 stream replace-ment watermarking with CABAC encoding,” in Proc. IEEE ICME, Singapore, Jul. 2010, pp. 117–121. [21] D. W. Xu and R. D. Wang, “Watermarking in H.264/AVC compressed domain using Exp-Golomb code words mapping,” Opt. Eng., vol. 50, no. 9, p. 097402, 2011. [22] D. W. Xu, R. D. Wang, and J. C. Wang, “Prediction mode modulated data-hiding algorithm for H.264/AVC,” J. Real-Time Image Process., vol. 7, no. 4, pp. 205–214, 2012. [23] T. Shanableh, “Data hiding in MPEG video files us-ing multivariate regression and flexible macroblock or-dering,” IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 455–464, Apr. 2012.