CN106817586B - A kind of H.264/AVC video reversible data concealing method - Google Patents

A kind of H.264/AVC video reversible data concealing method Download PDF

Info

Publication number
CN106817586B
CN106817586B CN201611198146.7A CN201611198146A CN106817586B CN 106817586 B CN106817586 B CN 106817586B CN 201611198146 A CN201611198146 A CN 201611198146A CN 106817586 B CN106817586 B CN 106817586B
Authority
CN
China
Prior art keywords
enable
embedded
bit secret
residual error
secret information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201611198146.7A
Other languages
Chinese (zh)
Other versions
CN106817586A (en
Inventor
徐达文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ningbo University of Technology
Original Assignee
Ningbo University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ningbo University of Technology filed Critical Ningbo University of Technology
Priority to CN201611198146.7A priority Critical patent/CN106817586B/en
Publication of CN106817586A publication Critical patent/CN106817586A/en
Application granted granted Critical
Publication of CN106817586B publication Critical patent/CN106817586B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/90Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using coding techniques not provided for in groups H04N19/10-H04N19/85, e.g. fractals
    • H04N19/91Entropy coding, e.g. variable length coding [VLC] or arithmetic coding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/10Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding
    • H04N19/169Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the coding unit, i.e. the structural portion or semantic portion of the video signal being the object or the subject of the adaptive coding
    • H04N19/17Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the coding unit, i.e. the structural portion or semantic portion of the video signal being the object or the subject of the adaptive coding the unit being an image region, e.g. an object
    • H04N19/176Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the coding unit, i.e. the structural portion or semantic portion of the video signal being the object or the subject of the adaptive coding the unit being an image region, e.g. an object the region being a block, e.g. a macroblock
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/46Embedding additional information in the video signal during the compression process
    • H04N19/467Embedding additional information in the video signal during the compression process characterised by the embedded information being invisible, e.g. watermarking

Abstract

The invention discloses a kind of H.264/AVC video reversible data concealing methods comprising H.264/AVC video hiding reversible data, secret information extract and original video restores two parts;It selects the residual error coefficient in 4 × 4 sub-blocks to be extended or shift under the premise of mutually compatible with H.264/AVC video compression coding standard and realizes hiding reversible data, not only computation complexity is low, it can satisfy the application demand of real-time video, and image watermarking influences very little to the code rate of H.264/AVC video code flow;It matches the residual error coefficient of two neighbouring non-zeros as basic embedded unit, extension is done to residual error coefficient pairing by modifying two-dimentional residual error coefficient histogram or the insertion of secret information is realized in displacement, the big residual error coefficient of the frequency of occurrences is more to the number of bits of insertion secret information, while keeping preferable perceived quality, it is capable of providing high embedding capacity;It can guarantee that secret information is effectively extracted, and can restore original video completely after extracting secret information.

Description

A kind of H.264/AVC video reversible data concealing method
Technical field
The present invention relates to a kind of reversible data hiding techniques, hidden more particularly, to a kind of H.264/AVC video reversible data Hiding method.
Background technique
Universal and multimedia technology the fast development of internet, so that the application of digital multimedia has reached unprecedented Breadth and depth.People download with not only can be convenient with copy digital media work, but also can also rely on powerful Multimedia tool original data content is modified, or even be distributed and propagate with the identity of the owner.How to guarantee How the not stolen and illegal propagation of Digital Media, determine the authenticity and integrity of digital media content, prevent malice from distorting And how unauthorized user is monitored, have become hot issue urgently to be resolved.Information hiding is a kind of covert communications, copyright The effective technology means of protection and content integrity certification.Reversible information hide be Information hiding field an important branch, Specific information can be embedded into carrier by it, and legitimate user is allowed to recover initial carrier without distortions after extracting information, Thus had received widespread attention in the field to content erotic such as military affairs, remote sensing, medicine, administration of justice.
It is at present using most popular video in view of H.264/AVC efficient coding efficiency and good network adaptability Coding standard, and video data hides the influence that consider video compression coding, therefore, carries out to using H.264/AVC video The research of the method for hiding reversible data has especially important meaning.Although image hiding reversible data has obtained quick hair Exhibition, but the H.264/AVC efficient hiding reversible data of video data feature realization how is combined, research both domestic and external is also just rigid Just start, the combination of hiding reversible data and Video coding there are also many difficulties have it is to be solved.Currently, it is existing H.264/ It is embedding that AVC video reversible data concealing method mainly carries out data using one dimensional histograms displacement mode to quantization residual error coefficient Enter, there are also the spaces further promoted for the embedding capacity of this method.
Summary of the invention
Technical problem to be solved by the invention is to provide a kind of H.264/AVC video reversible data concealing method, Hiding reversible data is carried out under the premise of mutually compatible with H.264/AVC video compression coding standard, and computation complexity is low, right H.264/AVC the code rate of video code flow influences very little, embedding capacity height, can guarantee that secret information is effectively extracted, And original video can be restored completely after extracting secret information.
The technical scheme of the invention to solve the technical problem is: a kind of H.264/AVC video reversible data is hidden Hiding method, it is characterised in that extracted including H.264/AVC video hiding reversible data, secret information and original video restores two Point;
H.264/AVC the detailed process of the video hiding reversible data are as follows:
1. _ 1, carrying out entropy decoding to the code stream of H.264/AVC video, decoding obtains prediction mode in H.264/AVC video All residual error coefficients in 4 × 4 sub-blocks of each of each macro block for the prediction mode of Intra_4 × 4;
1. _ 2, will H.264/AVC prediction mode be that m-th of macro block of the prediction mode of Intra_4 × 4 is defined as working as in video Preceding macro block, wherein 1≤m≤M, M indicate that the prediction mode for including in H.264/AVC video is the prediction mode of Intra_4 × 4 The total number of macro block;
1. n-th of 4 × 4 sub-blocks in current macro _ 3, are defined as current sub-block, wherein 1≤n≤N, N indicate current The total number for 4 × 4 sub-blocks for including in macro block;
1. _ 4, according to all residual error coefficients in Zig-Zag sequential scan current sub-block, while pressing 0,1 ..., 15 All residual error coefficients in current sub-block are numbered in sequence;Then determine that the corresponding secret information of current sub-block is embedded in area Domain is denoted as Rm,n, Rm,n=[Tm,n,1,Tm,n,2], wherein symbol " [] " is that section indicates symbol, Tm,n,1And Tm,n,2It indicates to work as The number of residual error coefficient in preceding sub-block, Tm,n,1And Tm,n,23≤T of value rangem,n,1<Tm,n,2≤15;
1. _ 5, extracting number from all residual error coefficients in current sub-block belongs to Rm,nAll residual error coefficients, And constitute a residual error coefficient subset;Then group two-by-two is carried out to the residual error coefficient in the corresponding residual error coefficient subset of current sub-block Pairing is closed, specifically: when the total number of the residual error coefficient of non-zero in the residual error coefficient subset is even number, sequentially by the residual error system The residual error coefficient combination of two pairing of non-zero in number subset;When the total number of the residual error coefficient of non-zero in the residual error coefficient subset is When odd number, sequentially by the residual error coefficient two of remaining non-zero in addition to the residual error coefficient of the 1st non-zero in the residual error coefficient subset Two combination pairings;And any one pairing is denoted asWherein,It indicatesIn it is previous Residual error coefficient,It indicatesIn the latter residual error coefficient;
1. _ 6, being all larger than to former and later two residual error coefficients in the corresponding residual error coefficient subset of current sub-block or every equal to 2 A pairing is shifted to vacate secret information embedded space, forIfAndThen It is rightWithIt carries out plus 1 shifts;Then on the basis of displacement in the corresponding residual error coefficient subset of current sub-block It each is embedded in secret information with centering, forIfAndOrAndThen existMiddle insertion 2 bit secret informations 00 or 01 or 10 or 11;IfAndOrAndThen exist1 bit secret information 0 or 1 of middle insertion, will be embedded in hidden Pairing after secret information is denoted as
- 2 and the latter residual error are less than or equal to previous residual error coefficient in the corresponding residual error coefficient subset of current sub-block Each pairing of the coefficient more than or equal to 2 is shifted to vacate secret information embedded space, forIfAndIt is then rightCarry out subtracting 1 displacement, it is rightIt carries out plus 1 shifts;Then on the basis of displacement Each of corresponding residual error coefficient subset of current sub-block is embedded in secret information with centering, forIfAndOrAndThen exist2 bit secret letters of middle insertion Breath 00 or 01 or 10 or 11;IfAndOrAndThen existIn It is embedded in 1 bit secret information 0 or 1, the pairing after insertion secret information is denoted as
2 and the latter residual error system are greater than or equal to previous residual error coefficient in the corresponding residual error coefficient subset of current sub-block Each pairings of the number less than or equal to -2 are shifted to vacate secret information embedded space, forIfAndIt is then rightIt carries out plus 1 shifts, it is rightCarry out subtracting 1 displacement;Then on the basis of displacement On match in each of corresponding residual error coefficient subset of current sub-block to middle insertion secret information, forIfAndOrAndThen exist2 bit secret informations of middle insertion 00 or 01 or 10 or 11;IfAndOrAndThen existIn it is embedding Enter 1 bit secret information 0 or 1, the pairing after insertion secret information is denoted as
Former and later two residual error coefficients in the corresponding residual error coefficient subset of current sub-block are respectively less than or are matched each of equal to -2 To being shifted to vacate secret information embedded space, forIfAndIt is then rightWithCarry out subtracting 1 displacement;Then every in the corresponding residual error coefficient subset of current sub-block on the basis of displacement It is a to be embedded in secret information with centering, forIfAndOrAndThen existMiddle insertion 2 bit secret informations 00 or 01 or 10 or 11;IfAndOrAndThen exist1 bit secret information 0 or 1 of middle insertion, will be embedding Pairing after entering secret information is denoted as
1. n=n+1 _ 7, is enabled, using next 4 × 4 sub-block in current macro as current sub-block, then return step 1. _ 4 continue to execute, until all 4 × 4 sub-blocks in current macro are disposed;Wherein, "=" in n=n+1 is that assignment accords with Number;
1. m=m+1 _ 8, is enabled, it will H.264/AVC prediction mode be the next macro of the prediction mode of Intra_4 × 4 in video Block is as current macro, and then 1. _ 3 return step continues to execute, until H.264/AVC prediction mode is Intra_4 in video All macro blocks of × 4 prediction modes are disposed;Wherein, "=" in m=m+1 is assignment;
1. _ 9, will H.264/AVC prediction mode be each of each macro block of the prediction mode of Intra_4 × 44 in video Two endpoints in × 4 sub-blocks corresponding secret information insertion region, are sent to secret information and extract and original video reset terminal;
The detailed process that the secret information extracts and original video restores are as follows:
2. _ 1, carrying out entropy decoding to the code stream of the H.264/AVC video containing secret information, decoding is obtained containing secret information H.264/AVC prediction mode is all in 4 × 4 sub-blocks of each of each macro block of the prediction mode of Intra_4 × 4 in video Residual error coefficient;
2. being _ 2, m-th of the prediction mode of Intra_4 × 4 by prediction mode in the H.264/AVC video containing secret information Macro block is defined as current macro, wherein 1≤m≤M, M also indicate the prediction for including in the H.264/AVC video containing secret information Mode is the total number of the macro block of the prediction mode of Intra_4 × 4;
2. n-th of 4 × 4 sub-blocks in current macro _ 3, are defined as current sub-block, wherein 1≤n≤N, N also indicate to work as The total number for 4 × 4 sub-blocks for including in preceding macro block;
2. _ 4, according to all residual error coefficients in Zig-Zag sequential scan current sub-block, while pressing 0,1 ..., 15 All residual error coefficients in current sub-block are numbered in sequence;Then determine that the corresponding secret information of current sub-block extracts area Domain is denoted as R'm,n, R'm,n=[T'm,n,1,T'm,n,2], wherein T'm,n,1And T'm,n,2Indicate the residual error coefficient in current sub-block Number, T'm,n,1=Tm,n,1, T'm,n,2=Tm,n,2
2. _ 5, extracting number from all residual error coefficients in current sub-block belongs to R'm,nAll residual error systems Number, and constitute a residual error coefficient subset;Then two are carried out to the residual error coefficient in the corresponding residual error coefficient subset of current sub-block Two combination pairings, specifically: it is sequentially that this is residual when the total number of the residual error coefficient of non-zero in the residual error coefficient subset is even number The residual error coefficient combination of two pairing of non-zero in poor coefficient subset;When total of the residual error coefficient of non-zero in the residual error coefficient subset When number is odd number, sequentially by the residual error system of remaining non-zero in addition to the residual error coefficient of the 1st non-zero in the residual error coefficient subset Number combination of two pairing;And any one pairing is denoted asWherein,It indicatesIn Previous residual error coefficient,It indicatesIn the latter residual error coefficient;
2. _ 6, match in each of corresponding residual error coefficient subset of current sub-block and extracts secret information in, forIfOrOrThen fromIn extract 2 bit secret informations 00;IfOr OrThen fromIn extract 2 bit secret informations 01;IfOrOrThen fromIn mention Take out 2 bit secret informations 10;IfOrOrThen fromIn extract 2 bit secret informations 11;IfOrOrOrThen fromIn extract 1 bit secret information 0;IfOrOrOrThen fromIn extract 1 bit secret information 1;Wherein, symbol " | | " it is the symbol that takes absolute value,For the integer greater than 2,For the integer greater than 2,For the integer less than -2,It is big In 2 integer;
2. initial data recovery _ 7, is carried out to each pairing in the corresponding residual error coefficient subset of current sub-block, forIt willThe pairing obtained after initial data is restored is denoted asIfOrOrOrThen It enablesAndIfOrOrOrThen enableAndIfOrOrOrThen enableAndIfOrThen enableAndIfOrThen enableAndIfOrThen enableAndIfOrThen It enablesAndIfAndThen enable AndWherein, sign () is to take sign function,
2. n=n+1 _ 8, is enabled, using next 4 × 4 sub-block in current macro as current sub-block, then return step 2. _ 4 continue to execute, until all 4 × 4 sub-blocks in current macro are disposed;Wherein, "=" in n=n+1 is that assignment accords with Number;
It is that Intra_4 × 4 predicts mould by prediction mode in the H.264/AVC video containing secret information 2. _ 9, enabling m=m+1 Next macro block of formula is as current macro, and then 2. _ 3 return step continues to execute, until H.264/AVC containing secret information Prediction mode is that all macro blocks of the prediction mode of Intra_4 × 4 are disposed in video;Wherein, "=" in m=m+1 is to assign It is worth symbol.
The step 1. _ 6 in tool that the portion paired in the corresponding residual error coefficient subset of current sub-block is shifted Body process are as follows:
IfAndThen enableTo realizeWith Displacement, whereinIn "=" be assignment;
IfThen enableTo realizeWithDisplacement, whereinIn "=" be assignment;
IfAndThen enableTo realizeWithDisplacement, whereinIn "=" be assignment;
IfAndThen enableTo realizeWithDisplacement, whereinIn "=" be assignment.
The step 1. _ 6 inMiddle insertion secret information, obtainsDetailed process Are as follows:
If 1. _ 6a,AndThen exist2 bit secret informations of middle insertion, when to embedding When the 2 bit secret informations entered are 00, enableWhen 2 bit secret informations to be embedded When being 01, enableWhen 2 bit secret informations to be embedded are 10, enableWhen 2 bit secret informations to be embedded are 11, enable
IfAndThen exist2 bit secret informations of middle insertion, when to be embedded 2 When bit secret information is 00, enableWhen 2 bit secret informations to be embedded are 01 When, it enablesWhen 2 bit secret informations to be embedded are 10, enableWhen 2 bit secret informations to be embedded are 11, enable
IfAndThen exist2 bit secret informations of middle insertion, when to be embedded 2 When bit secret information is 00, enableWhen 2 bit secret informations to be embedded are 01 When, it enablesWhen 2 bit secret informations to be embedded are 10, enableWhen 2 bit secret informations to be embedded are 11, enable
IfAndThen exist1 bit secret information of middle insertion, when to be embedded 1 When bit secret information is 0, enableWhen 1 bit secret information to be embedded is 1 When, it enablesWherein, x1 is the integer greater than 2;
IfAndThen exist1 bit secret information of middle insertion, when to be embedded 1 When a bit secret information is 0, enableWhen 1 bit secret information to be embedded is 1 When, it enablesWherein, y1 is the integer greater than 2;
If 1. _ 6b,AndThen exist2 bit secret informations of middle insertion, when to embedding When the 2 bit secret informations entered are 00, enableWhen 2 bit secret informations to be embedded When being 01, enableWhen 2 bit secret informations to be embedded are 10, enableWhen 2 bit secret informations to be embedded are 11, enable
IfAndThen exist2 bit secret informations of middle insertion, when to be embedded 2 When a bit secret information is 00, enableWhen 2 bit secret informations to be embedded are When 01, enableWhen 2 bit secret informations to be embedded are 10, enableWhen 2 bit secret informations to be embedded are 11, enable
IfAndThen exist2 bit secret informations of middle insertion, when to be embedded 2 When a bit secret information is 00, enableWhen 2 bit secret informations to be embedded are When 01, enableWhen 2 bit secret informations to be embedded are 10, enableWhen 2 bit secret informations to be embedded are 11, enable
IfAndThen exist1 bit secret information of middle insertion, when to be embedded 1 When a bit secret information is 0, enableWhen 1 bit secret information to be embedded is 1 When, it enablesWherein, x2 is the integer less than -2;
IfAndThen exist1 bit secret information of middle insertion, when to be embedded When 1 bit secret information is 0, enableWhen 1 bit secret information to be embedded is When 1, enableWherein, y2 is the integer greater than 2;
If 1. _ 6c,AndThen exist2 bit secret informations of middle insertion, when to embedding When the 2 bit secret informations entered are 00, enableWhen 2 bit secret informations to be embedded When being 01, enableWhen 2 bit secret informations to be embedded are 10, enableWhen 2 bit secret informations to be embedded are 11, enable
IfAndThen exist2 bit secret informations of middle insertion, when to be embedded 2 When a bit secret information is 00, enableWhen 2 bit secret informations to be embedded are When 01, enableWhen 2 bit secret informations to be embedded are 10, enableWhen 2 bit secret informations to be embedded are 11, enable
IfAndThen exist2 bit secret informations of middle insertion, when to be embedded 2 When a bit secret information is 00, enableWhen 2 bit secret informations to be embedded are When 01, enableWhen 2 bit secret informations to be embedded are 10, enableWhen 2 bit secret informations to be embedded are 11, enable
IfAndThen exist1 bit secret information of middle insertion, when to be embedded 1 When a bit secret information is 0, enableWhen 1 bit secret information to be embedded is 1 When, it enablesWherein, x3 is the integer greater than 2;
IfAndThen exist1 bit secret information of middle insertion, when to be embedded 1 When a bit secret information is 0, enableWhen 1 bit secret information to be embedded is 1 When, it enablesWherein, y3 is the integer less than -2;
If 1. _ 6d,AndThen exist2 bit secret informations of middle insertion, when to When 2 bit secret informations of insertion are 00, enableWhen 2 bit secrets to be embedded are believed When breath is 01, enableWhen 2 bit secret informations to be embedded are 10, enableWhen 2 bit secret informations to be embedded are 11, enable
IfAndThen exist2 bit secret informations of middle insertion, when to be embedded 2 When a bit secret information is 00, enableWhen 2 bit secret informations to be embedded are When 01, enableWhen 2 bit secret informations to be embedded are 10, enableWhen 2 bit secret informations to be embedded are 11, enable
IfAndThen exist2 bit secret informations of middle insertion, when to be embedded When 2 bit secret informations are 00, enableWhen 2 bit secret informations to be embedded When being 01, enableWhen 2 bit secret informations to be embedded are 10, enableWhen 2 bit secret informations to be embedded are 11, enable
IfAndThen exist1 bit secret information of middle insertion, when to be embedded When 1 bit secret information is 0, enableWhen 1 bit secret information to be embedded is When 1, enableWherein, x4 is the integer less than -2;
IfAndThen exist1 bit secret information of middle insertion, when to be embedded 1 When a bit secret information is 0, enableWhen 1 bit secret information to be embedded is 1 When, it enablesWherein, y4 is the integer less than -2.
The step 2. _ 6 in fromIn extract the detailed process of secret information are as follows:
If 2. _ 6a,OrOrThen FromIn extract 2 bit secret informations 00;
IfOrOrThen fromIn extract 2 bit secret informations 01;
IfOrOrThen fromIn extract 2 bit secret informations 10;
IfOrOrThen fromIn extract 2 bit secret informations 11;
IfOrThen fromIn mention Take out 1 bit secret information 0;Wherein, x1' is the integer greater than 2, and y1' is the integer greater than 2;
IfOrThen fromIn mention Take out 1 bit secret information 1;
If 2. _ 6b,OrOrThen fromIn extract 2 bit secret informations 00;
IfOrOrThen fromIn extract 2 bit secret informations 01;
IfOrOrThen fromIn extract 2 bit secret informations 10;
IfOrOrThen fromIn extract 2 bit secret informations 11;
IfOrThen fromIn Extract 1 bit secret information 0;Wherein, x2' is the integer less than -2, and y2' is the integer greater than 2;
IfOrThen fromIn Extract 1 bit secret information 1;
If 2. _ 6c,OrOr Then fromIn extract 2 bit secret informations 00;
IfOrOrThen fromIn extract 2 bit secret informations 01;
IfOrOrThen fromIn extract 2 bit secret informations 10;
IfOrOrThen fromIn extract 2 bit secret informations 11;
IfOrThen fromIn Extract 1 bit secret information 0;Wherein, x3' is the integer greater than 2, and y3' is the integer less than -2;
IfOrThen fromIn Extract 1 bit secret information 1;
If 2. _ 6d,OrOrThen fromIn extract 2 bit secret informations 00;
IfOrOr Then fromIn extract 2 bit secret informations 01;
IfOrOr Then fromIn extract 2 bit secret informations 10;
IfOrOr Then fromIn extract 2 bit secret informations 11;
IfOrThen from In extract 1 bit secret information 0;Wherein, x4' is the integer less than -2, and y4' is the integer less than -2;
IfOrThen from In extract 1 bit secret information 1.
The step 2. _ 7 in it is rightInitial data recovery is carried out, is obtainedIt is specific Process are as follows:
If 2. _ 7a,OrOrOrThen enableAnd
IfOrOrOrThen enableAnd
IfOrOrOrThen enableAnd
IfOrThen enableAnd
IfOrThen enableAnd
IfAndThen enableAnd
If 2. _ 7b,OrOr OrThen enableAnd
IfOrOrOrThen enableAnd
IfOrOrOrThen enableAnd
IfOrThen enableAnd
IfOrThen enableAnd
IfAndThen enableAnd
If 2. _ 7c,OrOr OrThen enableAnd
IfOrOrOrThen enableAnd
IfOrOrOrThen enableAnd
IfOrThen enableAnd
IfOrThen enableAnd
IfAndThen enableAnd
If 2. _ 7d,OrOrOrThen enableAnd
IfOrOrOrThen enableAnd
IfOrOrOrThen enableAnd
IfOrThen enableAnd
IfOrThen enableAnd
IfAndThen enableAnd
Compared with the prior art, the advantages of the present invention are as follows:
1) the method for the present invention selects in 4 × 4 sub-blocks under the premise of mutually compatible with H.264/AVC video compression coding standard Residual error coefficient be extended or shift realize hiding reversible data, not only computation complexity is low, can satisfy real-time video Application demand, and image watermarking influences very little to the code rate of H.264/AVC video code flow.
2) the method for the present invention matches the residual error coefficient of two neighbouring non-zeros as basic embedded unit, passes through modification Two-dimentional residual error coefficient histogram does the insertion of extension or displacement realization secret information to match to residual error coefficient, and the frequency of occurrences is big Residual error coefficient to insertion secret information number of bits it is more, while keeping preferable perceived quality, be capable of providing high insertion Capacity.
3) the method for the present invention can guarantee that secret information is effectively extracted, and can be complete after extracting secret information It is complete to restore original video, it can be applied to the key areas such as military affairs, remote sensing, medicine, the administration of justice.
Detailed description of the invention
Fig. 1 a is that the overall of the H.264/AVC video hiding reversible data in the method for the present invention realizes block diagram;
Fig. 1 b is that the totality that the secret information in the method for the present invention extracts and original video restores realizes block diagram;
Fig. 2 is the exemplary diagram of secret information insertion and extraction in the method for the present invention.
Specific embodiment
The present invention will be described in further detail below with reference to the embodiments of the drawings.
A kind of H.264/AVC video reversible data concealing method proposed by the present invention comprising H.264/AVC video is reversible Image watermarking, secret information extract and original video restores two parts.
As shown in Figure 1a, the detailed process of the H.264/AVC video hiding reversible data are as follows:
1. _ 1, carrying out entropy decoding to the code stream of H.264/AVC video, decoding obtains prediction mode in H.264/AVC video All residual error coefficients in 4 × 4 sub-blocks of each of each macro block for the prediction mode of Intra_4 × 4.
1. _ 2, will H.264/AVC prediction mode be that m-th of macro block of the prediction mode of Intra_4 × 4 is defined as working as in video Preceding macro block, wherein 1≤m≤M, M indicate that the prediction mode for including in H.264/AVC video is the prediction mode of Intra_4 × 4 The total number of macro block.
1. n-th of 4 × 4 sub-blocks in current macro _ 3, are defined as current sub-block, wherein 1≤n≤N, N indicate current The total number for 4 × 4 sub-blocks for including in macro block, since the size of macro block is 16 × 16, N=16.
1. _ 4, according to all residual error coefficients in Zig-Zag sequential scan current sub-block, while pressing 0,1 ..., 15 All residual error coefficients in current sub-block are numbered in sequence;Then determine that the corresponding secret information of current sub-block is embedded in area Domain is denoted as Rm,n, Rm,n=[Tm,n,1,Tm,n,2], wherein symbol " [] " is that section indicates symbol, Tm,n,1And Tm,n,2It indicates to work as The number of residual error coefficient in preceding sub-block, Tm,n,1And Tm,n,23≤T of value rangem,n,1<Tm,n,2≤ 15, it limits secret information It is embedded in medium-high frequency residual error coefficient.
1. _ 5, extracting number from all residual error coefficients in current sub-block belongs to Rm,nAll residual error coefficients, And constitute a residual error coefficient subset;Then group two-by-two is carried out to the residual error coefficient in the corresponding residual error coefficient subset of current sub-block Pairing is closed, specifically: when the total number of the residual error coefficient of non-zero in the residual error coefficient subset is even number, sequentially by the residual error system The residual error coefficient combination of two pairing of non-zero in number subset;When the total number of the residual error coefficient of non-zero in the residual error coefficient subset is When odd number, sequentially by the residual error coefficient two of remaining non-zero in addition to the residual error coefficient of the 1st non-zero in the residual error coefficient subset Two combination pairings;And any one pairing is denoted asWherein,It indicatesIn it is previous Residual error coefficient,It indicatesIn the latter residual error coefficient.
1. _ 6, being all larger than to former and later two residual error coefficients in the corresponding residual error coefficient subset of current sub-block or every equal to 2 A pairing is shifted to vacate secret information embedded space, forIfAndThen It is rightWithIt carries out plus 1 shifts;Then on the basis of displacement in the corresponding residual error coefficient subset of current sub-block It each is embedded in secret information with centering, forIfAndOrAndThen existMiddle insertion 2 bit secret informations 00 or 01 or 10 or 11;IfAndOrAndThen exist1 bit secret information 0 or 1 of middle insertion, will be embedded in hidden Pairing after secret information is denoted as
- 2 and the latter residual error are less than or equal to previous residual error coefficient in the corresponding residual error coefficient subset of current sub-block Each pairing of the coefficient more than or equal to 2 is shifted to vacate secret information embedded space, forIfAndIt is then rightCarry out subtracting 1 displacement, it is rightIt carries out plus 1 shifts;Then on the basis of displacement Each of corresponding residual error coefficient subset of current sub-block is embedded in secret information with centering, forIfAndOrAndThen exist2 bit secret letters of middle insertion Breath 00 or 01 or 10 or 11;IfAndOrAndThen existIn It is embedded in 1 bit secret information 0 or 1, the pairing after insertion secret information is denoted as
2 and the latter residual error system are greater than or equal to previous residual error coefficient in the corresponding residual error coefficient subset of current sub-block Each pairings of the number less than or equal to -2 are shifted to vacate secret information embedded space, forIfAndIt is then rightIt carries out plus 1 shifts, it is rightCarry out subtracting 1 displacement;Then on the basis of displacement Match in each of corresponding residual error coefficient subset of current sub-block to middle insertion secret information, forIfAndOrAndThen exist2 bit secret informations of middle insertion 00 or 01 or 10 or 11;IfAndOrAndThen existIn It is embedded in 1 bit secret information 0 or 1, the pairing after insertion secret information is denoted as
Former and later two residual error coefficients in the corresponding residual error coefficient subset of current sub-block are respectively less than or are matched each of equal to -2 To being shifted to vacate secret information embedded space, forIfAndIt is then rightWithCarry out subtracting 1 displacement;Then every in the corresponding residual error coefficient subset of current sub-block on the basis of displacement It is a to be embedded in secret information with centering, forIfAndOrAndThen existMiddle insertion 2 bit secret informations 00 or 01 or 10 or 11;IfAndOrAndThen exist1 bit secret information 0 or 1 of middle insertion, will be embedding Pairing after entering secret information is denoted as
In this particular embodiment, referring to fig. 2, step 1. _ 6 in the portion in the corresponding residual error coefficient subset of current sub-block Distribution is to the detailed process shifted are as follows:
IfAndThen enableTo realizeWith Displacement, whereinIn "=" be assignment;
IfAndThen enableTo realizeWithDisplacement, whereinIn "=" be assignment;
IfAndThen enableTo realizeWithDisplacement, whereinIn "=" be assignment;
IfAndThen enableTo realizeWithDisplacement, whereinIn "=" be assignment.
In this particular embodiment, referring to fig. 2, step 1. _ 6 inMiddle insertion secret information, obtainsDetailed process are as follows:
If 1. _ 6a,AndThen exist2 bit secret informations of middle insertion, when to embedding When the 2 bit secret informations entered are 00, enableWhen 2 bit secret informations to be embedded When being 01, enableWhen 2 bit secret informations to be embedded are 10, enableWhen 2 bit secret informations to be embedded are 11, enable
IfAndThen exist2 bit secret informations of middle insertion, when to be embedded 2 When bit secret information is 00, enableWhen 2 bit secret informations to be embedded are 01 When, it enablesWhen 2 bit secret informations to be embedded are 10, enableWhen 2 bit secret informations to be embedded are 11, enable
IfAndThen exist2 bit secret informations of middle insertion, when to be embedded 2 When bit secret information is 00, enableWhen 2 bit secret informations to be embedded are 01 When, it enablesWhen 2 bit secret informations to be embedded are 10, enableWhen 2 bit secret informations to be embedded are 11, enable
IfAndThen exist1 bit secret information of middle insertion, when to be embedded 1 When a bit secret information is 0, enableWhen 1 bit secret information to be embedded is 1 When, it enablesWherein, x1 is the integer greater than 2.
IfAndThen exist1 bit secret information of middle insertion, when to be embedded 1 When a bit secret information is 0, enableWhen 1 bit secret information to be embedded is 1 When, it enablesWherein, y1 is the integer greater than 2.
If 1. _ 6b,AndThen exist2 bit secret informations of middle insertion, when to embedding When the 2 bit secret informations entered are 00, enableWhen 2 bit secret informations to be embedded When being 01, enableWhen 2 bit secret informations to be embedded are 10, enableWhen 2 bit secret informations to be embedded are 11, enable
IfAndThen exist2 bit secret informations of middle insertion, when to be embedded 2 When a bit secret information is 00, enableWhen 2 bit secret informations to be embedded are When 01, enableWhen 2 bit secret informations to be embedded are 10, enableWhen 2 bit secret informations to be embedded are 11, enable
IfAndThen exist2 bit secret informations of middle insertion, when to be embedded 2 When a bit secret information is 00, enableWhen 2 bit secret informations to be embedded are When 01, enableWhen 2 bit secret informations to be embedded are 10, enableWhen 2 bit secret informations to be embedded are 11, enable
IfAndThen exist1 bit secret information of middle insertion, when to be embedded 1 When a bit secret information is 0, enableWhen 1 bit secret information to be embedded is 1 When, it enablesWherein, x2 is the integer less than -2.
IfAndThen exist1 bit secret information of middle insertion, when to be embedded When 1 bit secret information is 0, enableWhen 1 bit secret information to be embedded is When 1, enableWherein, y2 is the integer greater than 2.
If 1. _ 6c,AndThen exist2 bit secret informations of middle insertion, when to embedding When the 2 bit secret informations entered are 00, enableWhen 2 bit secret informations to be embedded When being 01, enableWhen 2 bit secret informations to be embedded are 10, enableWhen 2 bit secret informations to be embedded are 11, enable
IfAndThen exist2 bit secret informations of middle insertion, when to be embedded 2 When a bit secret information is 00, enableWhen 2 bit secret informations to be embedded are When 01, enableWhen 2 bit secret informations to be embedded are 10, enableWhen 2 bit secret informations to be embedded are 11, enable
IfAndThen exist2 bit secret informations of middle insertion, when to be embedded 2 When a bit secret information is 00, enableWhen 2 bit secret informations to be embedded are When 01, enableWhen 2 bit secret informations to be embedded are 10, enableWhen 2 bit secret informations to be embedded are 11, enable
IfAndThen exist1 bit secret information of middle insertion, when to be embedded When 1 bit secret information is 0, enableWhen 1 bit secret information to be embedded is When 1, enableWherein, x3 is the integer greater than 2.
IfAndThen exist1 bit secret information of middle insertion, when to be embedded 1 When a bit secret information is 0, enableWhen 1 bit secret information to be embedded is 1 When, it enablesWherein, y3 is the integer less than -2.
If 1. _ 6d,AndThen exist2 bit secret informations of middle insertion, when to When 2 bit secret informations of insertion are 00, enableWhen 2 bit secrets to be embedded are believed When breath is 01, enableWhen 2 bit secret informations to be embedded are 10, enableWhen 2 bit secret informations to be embedded are 11, enable
IfAndThen exist2 bit secret informations of middle insertion, when to be embedded 2 When a bit secret information is 00, enableWhen 2 bit secret informations to be embedded are When 01, enableWhen 2 bit secret informations to be embedded are 10, enableWhen 2 bit secret informations to be embedded are 11, enable
IfAndThen exist2 bit secret informations of middle insertion, when to be embedded When 2 bit secret informations are 00, enableWhen 2 bit secret informations to be embedded When being 01, enableWhen 2 bit secret informations to be embedded are 10, enableWhen 2 bit secret informations to be embedded are 11, enable
IfAndThen exist1 bit secret information of middle insertion, when to be embedded 1 When a bit secret information is 0, enableWhen 1 bit secret information to be embedded is 1 When, it enablesWherein, x4 is the integer less than -2.
IfAndThen exist1 bit secret information of middle insertion, when to be embedded 1 When a bit secret information is 0, enableWhen 1 bit secret information to be embedded is 1 When, it enablesWherein, y4 is the integer less than -2.
1. n=n+1 _ 7, is enabled, using next 4 × 4 sub-block in current macro as current sub-block, then return step 1. _ 4 continue to execute, until all 4 × 4 sub-blocks in current macro are disposed;Wherein, "=" in n=n+1 is that assignment accords with Number.
1. m=m+1 _ 8, is enabled, it will H.264/AVC prediction mode be the next macro of the prediction mode of Intra_4 × 4 in video Block is as current macro, and then 1. _ 3 return step continues to execute, until H.264/AVC prediction mode is Intra_4 in video All macro blocks of × 4 prediction modes are disposed;Wherein, "=" in m=m+1 is assignment.
1. _ 9, will H.264/AVC prediction mode be each of each macro block of the prediction mode of Intra_4 × 44 in video Two endpoints in × 4 sub-blocks corresponding secret information insertion region, i.e. Tm,n,1And Tm,n,2, it is sent to secret information extraction and original Beginning video recovery end.
As shown in Figure 1 b, the detailed process that the secret information extracts and original video restores are as follows:
2. _ 1, carrying out entropy decoding to the code stream of the H.264/AVC video containing secret information, decoding is obtained containing secret information H.264/AVC prediction mode is all in 4 × 4 sub-blocks of each of each macro block of the prediction mode of Intra_4 × 4 in video Residual error coefficient.
2. being _ 2, m-th of the prediction mode of Intra_4 × 4 by prediction mode in the H.264/AVC video containing secret information Macro block is defined as current macro, wherein 1≤m≤M, M also indicate the prediction for including in the H.264/AVC video containing secret information Mode is the total number of the macro block of the prediction mode of Intra_4 × 4.
2. n-th of 4 × 4 sub-blocks in current macro _ 3, are defined as current sub-block, wherein 1≤n≤N, N also indicate to work as The total number for 4 × 4 sub-blocks for including in preceding macro block, since the size of macro block is 16 × 16, N=16.
2. _ 4, according to all residual error coefficients in Zig-Zag sequential scan current sub-block, while pressing 0,1 ..., 15 All residual error coefficients in current sub-block are numbered in sequence;Then determine that the corresponding secret information of current sub-block extracts area Domain is denoted as R'm,n, R'm,n=[T'm,n,1,T'm,n,2], wherein T'm,n,1And T'm,n,2Indicate the residual error coefficient in current sub-block Number, T'm,n,1=Tm,n,1, T'm,n,2=Tm,n,2
2. _ 5, extracting number from all residual error coefficients in current sub-block belongs to R'm,nAll residual error systems Number, and constitute a residual error coefficient subset;Then two are carried out to the residual error coefficient in the corresponding residual error coefficient subset of current sub-block Two combination pairings, specifically: it is sequentially that this is residual when the total number of the residual error coefficient of non-zero in the residual error coefficient subset is even number The residual error coefficient combination of two pairing of non-zero in poor coefficient subset;When total of the residual error coefficient of non-zero in the residual error coefficient subset When number is odd number, sequentially by the residual error system of remaining non-zero in addition to the residual error coefficient of the 1st non-zero in the residual error coefficient subset Number combination of two pairing;And any one pairing is denoted asWherein,It indicatesIn Previous residual error coefficient,It indicatesIn the latter residual error coefficient.
2. _ 6, match in each of corresponding residual error coefficient subset of current sub-block and extracts secret information in, forIfOrOrThen fromIn extract 2 bit secret informations 00;IfOr OrThen fromIn extract 2 bit secret informations 01;IfOrOrThen fromIn mention Take out 2 bit secret informations 10;IfOrOrThen fromIn extract 2 bit secret informations 11;IfOrOrOrThen fromIn extract 1 bit secret information 0;IfOrOrOrThen fromIn extract 1 bit secret information 1;Wherein, symbol " | | " it is the symbol that takes absolute value,For the integer greater than 2,For the integer greater than 2,For the integer less than -2,It is big In 2 integer.
In this particular embodiment, referring to fig. 2, step 2. _ 6 in fromIn extract the tool of secret information Body process are as follows:
If 2. _ 6a,OrOrThen FromIn extract 2 bit secret informations 00.
IfOrOrThen fromIn extract 2 bit secret informations 01.
IfOrOrThen fromIn extract 2 bit secret informations 10.
IfOrOrThen fromIn extract 2 bit secret informations 11.
IfOrThen fromIn mention Take out 1 bit secret information 0;Wherein, x1' is the integer greater than 2, and y1' is the integer greater than 2.
IfOrThen fromIn mention Take out 1 bit secret information 1.
If 2. _ 6b,OrOr Then fromIn extract 2 bit secret informations 00.
IfOrOrThen fromIn extract 2 bit secret informations 01.
IfOrOrThen fromIn extract 2 bit secret informations 10.
IfOrOrThen fromIn extract 2 bit secret informations 11.
IfOrThen fromIn Extract 1 bit secret information 0;Wherein, x2' is the integer less than -2, and y2' is the integer greater than 2.
IfOrThen fromIn Extract 1 bit secret information 1.
If 2. _ 6c,OrOrThen fromIn extract 2 bit secret informations 00.
IfOrOrThen fromIn extract 2 bit secret informations 01.
IfOrOrThen fromIn extract 2 bit secret informations 10.
IfOrOrThen fromIn extract 2 bit secret informations 11.
IfOrThen fromIn Extract 1 bit secret information 0;Wherein, x3' is the integer greater than 2, and y3' is the integer less than -2.
IfOrThen fromIn Extract 1 bit secret information 1.
If 2. _ 6d,OrOrThen fromIn extract 2 bit secret informations 00.
IfOrOr Then fromIn extract 2 bit secret informations 01.
IfOrOr Then fromIn extract 2 bit secret informations 10.
IfOrOr Then fromIn extract 2 bit secret informations 11.
IfOrThen from In extract 1 bit secret information 0;Wherein, x4' is the integer less than -2, and y4' is the integer less than -2.
IfOrThen from In extract 1 bit secret information 1.
2. initial data recovery _ 7, is carried out to each pairing in the corresponding residual error coefficient subset of current sub-block, forIt willThe pairing obtained after initial data is restored is denoted asIfOrOrOrThen enableAndIfOrOrOrThen enableAndIfOrOrOrThen enableAndIfOrThen enableAndIfOrThen enableAndIfOr Then enableAndIfOrThen enableAndIfAnd Then enableAndWherein, sign () is to take Sign function,
In this particular embodiment, referring to fig. 2, step 2. _ 7 in it is rightInitial data recovery is carried out, is obtained It arrivesDetailed process are as follows:
If 2. _ 7a,OrOrOrThen enableAnd
IfOrOrOrThen enableAnd
IfOrOrOrThen enableAnd
IfOrThen enableAnd
IfOrThen enableAnd
IfAndThen enableAnd
If 2. _ 7b,OrOr OrThen enableAnd
IfOrOrOrThen enableAnd
IfOrOrOrThen enableAnd
IfOrThen enableAnd
IfOrThen enableAnd
IfAndThen enableAnd
If 2. _ 7c,OrOr OrThen enableAnd
IfOrOrOrThen enableAnd
IfOrOrOrThen enableAnd
IfOrThen enableAnd
IfOrThen enableAnd
IfAndThen enableAnd
If 2. _ 7d,OrOrOrThen enableAnd
IfOrOrOrThen enableAnd
IfOrOrOrThen enableAnd
IfOrThen enableAnd
IfOrThen enableAnd
IfAndThen enableAnd
2. n=n+1 _ 8, is enabled, using next 4 × 4 sub-block in current macro as current sub-block, then return step 2. _ 4 continue to execute, until all 4 × 4 sub-blocks in current macro are disposed;Wherein, "=" in n=n+1 is that assignment accords with Number.
It is that Intra_4 × 4 predicts mould by prediction mode in the H.264/AVC video containing secret information 2. _ 9, enabling m=m+1 Next macro block of formula is as current macro, and then 2. _ 3 return step continues to execute, until H.264/AVC containing secret information Prediction mode is that all macro blocks of the prediction mode of Intra_4 × 4 are disposed in video;Wherein, "=" in m=m+1 is to assign It is worth symbol.

Claims (5)

1. a kind of H.264/AVC video reversible data concealing method, it is characterised in that hidden including H.264/AVC video reversible data Hiding, secret information extract and original video restores two parts;
H.264/AVC the detailed process of the video hiding reversible data are as follows:
1. _ 1, carrying out entropy decoding to the code stream of H.264/AVC video, decoding obtains prediction mode in H.264/AVC video and is All residual error coefficients in 4 × 4 sub-blocks of each of each macro block of the prediction mode of Intra_4 × 4;
1. _ 2, will H.264/AVC in video prediction mode be the prediction mode of Intra_4 × 4 m-th of macro block be defined as it is current macro Block, wherein 1≤m≤M, M indicate that the prediction mode for including in H.264/AVC video is the macro block of the prediction mode of Intra_4 × 4 Total number;
1. n-th of 4 × 4 sub-blocks in current macro _ 3, are defined as current sub-block, wherein 1≤n≤N, N indicate current macro In include 4 × 4 sub-blocks total number;
1. _ 4, according to all residual error coefficients in Zig-Zag sequential scan current sub-block, while pressing 0,1 ..., 15 sequence All residual error coefficients in current sub-block are numbered;Then determine that the corresponding secret information of current sub-block is embedded in region, It is denoted as Rm,n, Rm,n=[Tm,n,1,Tm,n,2], wherein symbol " [] " is that section indicates symbol, Tm,n,1And Tm,n,2Indicate current son The number of residual error coefficient in block, Tm,n,1And Tm,n,23≤T of value rangem,n,1<Tm,n,2≤15;
1. _ 5, extracting number from all residual error coefficients in current sub-block belongs to Rm,nAll residual error coefficients, and structure At a residual error coefficient subset;Then combination of two is carried out to the residual error coefficient in the corresponding residual error coefficient subset of current sub-block to match It is right, specifically: when the total number of the residual error coefficient of non-zero in the residual error coefficient subset is even number, sequentially by residual error coefficient Concentrate the residual error coefficient combination of two pairing of non-zero;When the total number of the residual error coefficient of non-zero in the residual error coefficient subset is odd number When, sequentially by the residual error coefficient of remaining non-zero group two-by-two in addition to the residual error coefficient of the 1st non-zero in the residual error coefficient subset Close pairing;And any one pairing is denoted asWherein,It indicatesIn previous residual error Coefficient,It indicatesIn the latter residual error coefficient;
1. _ 6, being all larger than to former and later two residual error coefficients in the corresponding residual error coefficient subset of current sub-block or matching equal to each of 2 To being shifted to vacate secret information embedded space, forIfAndIt is then rightWithIt carries out plus 1 shifts;Then every in the corresponding residual error coefficient subset of current sub-block on the basis of displacement It is a to be embedded in secret information with centering, forIfAndOrAndThen existMiddle insertion 2 bit secret informations 00 or 01 or 10 or 11;IfAndOrAndThen exist1 bit secret information 0 or 1 of middle insertion, will be embedded in hidden Pairing after secret information is denoted as
- 2 and the latter residual error coefficient are less than or equal to previous residual error coefficient in the corresponding residual error coefficient subset of current sub-block Each pairing more than or equal to 2 is shifted to vacate secret information embedded space, forIfAndIt is then rightCarry out subtracting 1 displacement, it is rightIt carries out plus 1 shifts;Then on the basis of displacement Each of corresponding residual error coefficient subset of current sub-block is embedded in secret information with centering, forIfAndOrAndThen exist2 bit secret letters of middle insertion Breath 00 or 01 or 10 or 11;IfAndOrAndThen existIn It is embedded in 1 bit secret information 0 or 1, the pairing after insertion secret information is denoted as
2 are greater than or equal to previous residual error coefficient in the corresponding residual error coefficient subset of current sub-block and the latter residual error coefficient is small It is shifted to vacate secret information embedded space in or equal to -2 each pairing, forIfAndIt is then rightIt carries out plus 1 shifts, it is rightCarry out subtracting 1 displacement;Then on the basis of displacement On match in each of corresponding residual error coefficient subset of current sub-block to middle insertion secret information, forIfAndOrAndThen exist2 bit secret informations of middle insertion 00 or 01 or 10 or 11;IfAndOrAndThen existIn it is embedding Enter 1 bit secret information 0 or 1, the pairing after insertion secret information is denoted as
Former and later two residual error coefficients in the corresponding residual error coefficient subset of current sub-block are respectively less than or match each of equal to -2 into Row displacement to vacate secret information embedded space, forIfAndIt is then right WithCarry out subtracting 1 displacement;Then match on the basis of displacement in each of corresponding residual error coefficient subset of current sub-block Centering is embedded in secret information, forIfAndOrAndThen existMiddle insertion 2 bit secret informations 00 or 01 or 10 or 11;IfAndOrAndThen exist1 bit secret information 0 or 1 of middle insertion, will be embedding Pairing after entering secret information is denoted as
1. _ 7, enable n=n+1, using next 4 × 4 sub-block in current macro as current sub-block, then return step 1. _ 4 after It is continuous to execute, until all 4 × 4 sub-blocks in current macro are disposed;Wherein, "=" in n=n+1 is assignment;
1. m=m+1 _ 8, is enabled, it will H.264/AVC prediction mode be that next macro block of the prediction mode of Intra_4 × 4 is made in video For current macro, then 1. _ 3 return step is continued to execute, until H.264/AVC prediction mode is that Intra_4 × 4 are pre- in video All macro blocks of survey mode are disposed;Wherein, "=" in m=m+1 is assignment;
1. _ 9, will H.264/AVC prediction mode be each of each macro block of the prediction mode of Intra_4 × 44 × 4 in video Two endpoints in sub-block corresponding secret information insertion region, are sent to secret information and extract and original video reset terminal;
The detailed process that the secret information extracts and original video restores are as follows:
2. _ 1, carrying out entropy decoding to the code stream of the H.264/AVC video containing secret information, decoding is obtained containing secret information H.264/AVC prediction mode is all in 4 × 4 sub-blocks of each of each macro block of the prediction mode of Intra_4 × 4 in video Residual error coefficient;
2. _ 2, being m-th of macro block of the prediction mode of Intra_4 × 4 by prediction mode in the H.264/AVC video containing secret information It is defined as current macro, wherein 1≤m≤M, M also indicate the prediction mode for including in the H.264/AVC video containing secret information For the total number of the macro block of the prediction mode of Intra_4 × 4;
2. n-th of 4 × 4 sub-blocks in current macro _ 3, are defined as current sub-block, wherein 1≤n≤N, N also indicate current macro The total number for 4 × 4 sub-blocks for including in block;
2. _ 4, according to all residual error coefficients in Zig-Zag sequential scan current sub-block, while pressing 0,1 ..., 15 sequence All residual error coefficients in current sub-block are numbered;Then determine that the corresponding secret information of current sub-block extracts region, It is denoted as R'm,n, R'm,n=[T'm,n,1,T'm,n,2], wherein T'm,n,1And T'm,n,2Indicate the volume of the residual error coefficient in current sub-block Number, T'm,n,1=Tm,n,1, T'm,n,2=Tm,n,2
2. _ 5, extracting number from all residual error coefficients in current sub-block belongs to R'm,nAll residual error coefficients, and Constitute a residual error coefficient subset;Then combination of two is carried out to the residual error coefficient in the corresponding residual error coefficient subset of current sub-block Pairing, specifically: when the total number of the residual error coefficient of non-zero in the residual error coefficient subset is even number, sequentially by the residual error coefficient The residual error coefficient combination of two pairing of non-zero in subset;When the total number of the residual error coefficient of non-zero in the residual error coefficient subset is surprise Number when, in addition to the residual error coefficient of the 1st non-zero in the residual error coefficient subset sequentially by the residual error coefficient of remaining non-zero two-by-two Combination pairing;And any one pairing is denoted asWherein,It indicatesIn it is previous A residual error coefficient,It indicatesIn the latter residual error coefficient;
2. _ 6, match in each of corresponding residual error coefficient subset of current sub-block and extracts secret information in, forIfOrOrThen fromIn extract 2 bit secret informations 00;IfOr OrThen fromIn extract 2 bit secret informations 01;IfOrOrThen fromIn mention Take out 2 bit secret informations 10;IfOrOrThen fromIn extract 2 bit secret informations 11;IfOrOrOrThen fromIn extract 1 bit secret information 0;IfOrOrOrThen fromIn extract 1 bit secret information 1;Wherein, symbol " | | " it is the symbol that takes absolute value,For the integer greater than 2,For the integer greater than 2,For the integer less than -2,It is big In 2 integer;
2. initial data recovery _ 7, is carried out to each pairing in the corresponding residual error coefficient subset of current sub-block, forIt willThe pairing obtained after initial data is restored is denoted asIfOrOrOrThen It enablesAndIfOrOrOrThen enableAndIfOrOrOrThen enableAndIfOrThen enableAndIfOrThen enableAndIfOrThen enableAndIfOrThen enableAndIfAndThen enableAndWherein, sign () is to take sign function,
2. _ 8, enable n=n+1, using next 4 × 4 sub-block in current macro as current sub-block, then return step 2. _ 4 after It is continuous to execute, until all 4 × 4 sub-blocks in current macro are disposed;Wherein, "=" in n=n+1 is assignment;
It is the prediction mode of Intra_4 × 4 by prediction mode in the H.264/AVC video containing secret information 2. _ 9, enabling m=m+1 Next macro block is as current macro, and then 2. _ 3 return step continues to execute, until the H.264/AVC video containing secret information Middle prediction mode is that all macro blocks of the prediction mode of Intra_4 × 4 are disposed;Wherein, "=" in m=m+1 is that assignment accords with Number.
2. a kind of H.264/AVC video reversible data concealing method according to claim 1, it is characterised in that the step Suddenly 1. _ 6 in detailed process that the portion paired in the corresponding residual error coefficient subset of current sub-block is shifted are as follows:
IfAndThen enableTo realizeWithShifting Position, whereinIn "=" be assignment;
IfAndThen enableTo realizeWithShifting Position, whereinIn "=" be assignment;
IfAndThen enableTo realizeWith's Displacement, whereinIn "=" be assignment;
IfAndThen enableTo realizeWith's Displacement, whereinIn "=" be assignment.
3. a kind of H.264/AVC video reversible data concealing method according to claim 2, it is characterised in that the step Suddenly 1. _ 6 inMiddle insertion secret information, obtainsDetailed process are as follows:
If 1. _ 6a,AndThen exist2 bit secret informations of middle insertion, when to be embedded 2 When a bit secret information is 00, enableWhen 2 bit secret informations to be embedded are 01 When, it enablesWhen 2 bit secret informations to be embedded are 10, enableWhen 2 bit secret informations to be embedded are 11, enable
IfAndThen exist2 bit secret informations of middle insertion, when 2 bits to be embedded When secret information is 00, enableWhen 2 bit secret informations to be embedded are 01, It enablesWhen 2 bit secret informations to be embedded are 10, enableWhen 2 bit secret informations to be embedded are 11, enable
IfAndThen exist2 bit secret informations of middle insertion, when 2 bits to be embedded When secret information is 00, enableWhen 2 bit secret informations to be embedded are 01, It enablesWhen 2 bit secret informations to be embedded are 10, enableWhen 2 bit secret informations to be embedded are 11, enable
IfAndThen exist1 bit secret information of middle insertion, when 1 bit to be embedded When secret information is 0, enableWhen 1 bit secret information to be embedded is 1, enableWherein, x1 is the integer greater than 2;
IfAndThen exist1 bit secret information of middle insertion, when 1 ratio to be embedded When special secret information is 0, enableWhen 1 bit secret information to be embedded is 1, It enablesWherein, y1 is the integer greater than 2;
If 1. _ 6b,AndThen exist2 bit secret informations of middle insertion, when to be embedded When 2 bit secret informations are 00, enableWhen 2 bit secret informations to be embedded are 01 When, it enablesWhen 2 bit secret informations to be embedded are 10, enableWhen 2 bit secret informations to be embedded are 11, enable
IfAndThen exist2 bit secret informations of middle insertion, when 2 ratios to be embedded When special secret information is 00, enableWhen 2 bit secret informations to be embedded are 01 When, it enablesWhen 2 bit secret informations to be embedded are 10, enableWhen 2 bit secret informations to be embedded are 11, enable
IfAndThen exist2 bit secret informations of middle insertion, when 2 ratios to be embedded When special secret information is 00, enableWhen 2 bit secret informations to be embedded are 01 When, it enablesWhen 2 bit secret informations to be embedded are 10, enableWhen 2 bit secret informations to be embedded are 11, enable
IfAndThen exist1 bit secret information of middle insertion, when 1 ratio to be embedded When special secret information is 0, enableWhen 1 bit secret information to be embedded is 1, It enablesWherein, x2 is the integer less than -2;
IfAndThen exist1 bit secret information of middle insertion, when 1 ratio to be embedded When special secret information is 0, enableWhen 1 bit secret information to be embedded is 1, It enablesWherein, y2 is the integer greater than 2;
If 1. _ 6c,AndThen exist2 bit secret informations of middle insertion, when to be embedded When 2 bit secret informations are 00, enableWhen 2 bit secret informations to be embedded are 01 When, it enablesWhen 2 bit secret informations to be embedded are 10, enableWhen 2 bit secret informations to be embedded are 11, enable
IfAndThen exist2 bit secret informations of middle insertion, when 2 ratios to be embedded When special secret information is 00, enableWhen 2 bit secret informations to be embedded are 01, It enablesWhen 2 bit secret informations to be embedded are 10, enableWhen 2 bit secret informations to be embedded are 11, enable
IfAndThen exist2 bit secret informations of middle insertion, when 2 ratios to be embedded When special secret information is 00, enableWhen 2 bit secret informations to be embedded are 01 When, it enablesWhen 2 bit secret informations to be embedded are 10, enableWhen 2 bit secret informations to be embedded are 11, enable
IfAndThen exist1 bit secret information of middle insertion, when 1 ratio to be embedded When special secret information is 0, enableWhen 1 bit secret information to be embedded is 1, It enablesWherein, x3 is the integer greater than 2;
IfAndThen exist1 bit secret information of middle insertion, when 1 ratio to be embedded When special secret information is 0, enableWhen 1 bit secret information to be embedded is 1, It enablesWherein, y3 is the integer less than -2;
If 1. _ 6d,AndThen exist2 bit secret informations of middle insertion, when to be embedded 2 bit secret informations be 00 when, enableWhen 2 bit secret informations to be embedded are When 01, enableWhen 2 bit secret informations to be embedded are 10, enableWhen 2 bit secret informations to be embedded are 11, enable
IfAndThen exist2 bit secret informations of middle insertion, when 2 ratios to be embedded When special secret information is 00, enableWhen 2 bit secret informations to be embedded are 01 When, it enablesWhen 2 bit secret informations to be embedded are 10, enableWhen 2 bit secret informations to be embedded are 11, enable
IfAndThen exist2 bit secret informations of middle insertion, when 2 ratios to be embedded When special secret information is 00, enableWhen 2 bit secret informations to be embedded are 01, It enablesWhen 2 bit secret informations to be embedded are 10, enableWhen 2 bit secret informations to be embedded are 11, enable
IfAndThen exist1 bit secret information of middle insertion, when 1 ratio to be embedded When special secret information is 0, enableWhen 1 bit secret information to be embedded is 1, It enablesWherein, x4 is the integer less than -2;
IfAndThen exist1 bit secret information of middle insertion, when 1 ratio to be embedded When special secret information is 0, enableWhen 1 bit secret information to be embedded is 1, It enablesWherein, y4 is the integer less than -2.
4. a kind of H.264/AVC video reversible data concealing method according to claim 3, it is characterised in that the step Suddenly 2. _ 6 in fromIn extract the detailed process of secret information are as follows:
If 2. _ 6a,OrOrThen fromIn extract 2 bit secret informations 00;
IfOrOrThen fromIn extract 2 bit secret informations 01;
IfOrOrThen fromIn extract 2 bit secret informations 10;
IfOrOrThen fromIn extract 2 bit secret informations 11;
IfOrThen fromIn extract 1 A bit secret information 0;Wherein, x1' is the integer greater than 2, and y1' is the integer greater than 2;
IfOrThen fromIn extract 1 bit secret information 1;
If 2. _ 6b,OrOrThen fromIn extract 2 bit secret informations 00;
IfOrOrThen fromIn extract 2 bit secret informations 01;
IfOrOrThen fromIn extract 2 bit secret informations 10;
IfOrOrThen fromIn extract 2 bit secret informations 11;
IfOrThen fromMiddle extraction 1 bit secret information 0 out;Wherein, x2' is the integer less than -2, and y2' is the integer greater than 2;
IfOrThen fromMiddle extraction 1 bit secret information 1 out;
If 2. _ 6c,OrOrThen fromIn extract 2 bit secret informations 00;
IfOrOrThen fromIn extract 2 bit secret informations 01;
IfOrOrThen fromIn extract 2 bit secret informations 10;
IfOrOrThen fromIn extract 2 bit secret informations 11;
IfOrThen fromIn extract 1 bit secret information 0;Wherein, x3' is the integer greater than 2, and y3' is the integer less than -2;
IfOrThen fromMiddle extraction 1 bit secret information 1 out;
If 2. _ 6d,OrOrThen fromIn extract 2 bit secret informations 00;
IfOrOrThen fromIn extract 2 bit secret informations 01;
IfOrOrThen fromIn extract 2 bit secret informations 10;
IfOrOrThen fromIn extract 2 bit secret informations 11;
IfOrThen fromMiddle extraction 1 bit secret information 0 out;Wherein, x4' is the integer less than -2, and y4' is the integer less than -2;
IfOrThen fromIn mention Take out 1 bit secret information 1.
5. a kind of H.264/AVC video reversible data concealing method according to claim 4, it is characterised in that the step Suddenly 2. _ 7 in it is rightInitial data recovery is carried out, is obtainedDetailed process are as follows:
If 2. _ 7a,OrOrOrThen enableAnd
IfOrOrOrThen enableAnd
IfOrOrOrThen enableAnd
IfOrThen enableAnd
IfOrThen enableAnd
IfAndThen enableAnd
If 2. _ 7b,OrOrOrThen enableAnd
IfOrOrOrThen enableAnd
IfOrOrOrThen enableAnd
IfOrThen enableAnd
IfOrThen enableAnd
IfAndThen enableAnd
If 2. _ 7c,OrOrOrThen enableAnd
IfOrOrOrThen enableAnd
IfOrOrOrThen enableAnd
IfOrThen enableAnd
IfOrThen enableAnd
IfAndThen enableAnd
If 2. _ 7d,OrOr OrThen enableAnd
IfOrOrOrThen enableAnd
IfOrOrOrThen enableAnd
IfOrThen enableAnd
IfOrThen enableAnd
IfAndThen enableAnd
CN201611198146.7A 2016-12-22 2016-12-22 A kind of H.264/AVC video reversible data concealing method Active CN106817586B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611198146.7A CN106817586B (en) 2016-12-22 2016-12-22 A kind of H.264/AVC video reversible data concealing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611198146.7A CN106817586B (en) 2016-12-22 2016-12-22 A kind of H.264/AVC video reversible data concealing method

Publications (2)

Publication Number Publication Date
CN106817586A CN106817586A (en) 2017-06-09
CN106817586B true CN106817586B (en) 2019-06-18

Family

ID=59109367

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611198146.7A Active CN106817586B (en) 2016-12-22 2016-12-22 A kind of H.264/AVC video reversible data concealing method

Country Status (1)

Country Link
CN (1) CN106817586B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107333139B (en) * 2017-06-27 2019-12-13 郑州师范学院 H.265 semi-reversible video steganography information method based on intra-frame prediction mode
CN107197298B (en) * 2017-06-27 2019-06-25 郑州师范学院 A kind of reversible steganography method of HEVC video of the undistorted drift based on multi-component system
CN107105275B (en) * 2017-06-27 2019-05-21 郑州师范学院 A kind of information concealing method based on H.265 video pixel domain
CN107318022B (en) * 2017-06-27 2019-12-17 郑州师范学院 video steganography method based on H.265 standard undistorted drift
CN107172434B (en) * 2017-06-27 2019-06-18 郑州师范学院 A method of built-in steganography is carried out to H.265 video
CN108683921B (en) * 2018-06-07 2020-04-07 四川大学 Video reversible information hiding method based on zero quantization DCT coefficient group
CN109361926B (en) * 2018-11-27 2020-04-28 华南理工大学 Lossless reversible information hiding method for H.264/AVC video visual quality
CN110113605A (en) * 2019-05-13 2019-08-09 四川大学 A kind of video error coverage method hiding based on histogram translation reversible information
CN111787332B (en) * 2020-07-09 2022-03-08 宁波工程学院 HEVC video data hiding method based on residual coefficient pairing

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101572805A (en) * 2009-06-05 2009-11-04 中山大学 Safe video transmission system and application method thereof

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100375822B1 (en) * 2000-12-18 2003-03-15 한국전자통신연구원 Watermark Embedding/Detecting Apparatus and Method for Digital Audio

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101572805A (en) * 2009-06-05 2009-11-04 中山大学 Safe video transmission system and application method thereof

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
A novel two-dimensional histogram modification for reversible data embedding into stereo H.264 video;Juan Zhao;《Multimedia Tools and Applications》;20150319;第5959页-第5980页,表1-4,附图1-12

Also Published As

Publication number Publication date
CN106817586A (en) 2017-06-09

Similar Documents

Publication Publication Date Title
CN106817586B (en) A kind of H.264/AVC video reversible data concealing method
Tan et al. A robust watermarking scheme in YCbCr color space based on channel coding
CN103761702B (en) Image hiding and authentication method based on secret sharing
CN105426709B (en) Private information communication means based on jpeg image Information hiding and system
CN109348228A (en) A kind of hiding System and method for of the image encryption domain reversible information based on image segmentation and image space correlation
CN106023053B (en) High capacity file encryption steganography and extracting method based on jpeg image
CN102801947B (en) Semantic information transmission and protection method based on H264
CN103955878A (en) DWT-SVD geometric attack prevention blind watermark method based on SIFT
CN103955879A (en) DWT-SVD robust blind watermark method based on multilevel DCT
CN103414892A (en) Method for hiding high-capacity compression-resisting image information
CN102014239A (en) High-capacity steganographic method based on JPEG (Joint Photographic Experts Group) digital image
CN105162686B (en) The hidden close communication means of polymorphic instant messages and system based on figure medium
CN109829845A (en) The variable step size color image blind watermark method decomposed based on matrix Schur
CN109102454A (en) A kind of colored QR code digital blind watermark method merging Fast Fourier Transform (FFT)
Harshitha et al. Secure data hiding algorithm using encrypted secret message
Kuo A data hiding scheme based on square formula fully exploiting modification directions
CN101252683A (en) Multifunctional watermark video camera
Muttoo et al. Data hiding in JPEG images
CN114745475A (en) Robust reversible information hiding method for encrypted image
Meng et al. Coverless video steganography based on maximum DC coefficients
Han et al. DWT-domain dual watermarking algorithm of color image based on visual cryptography
CN105721873A (en) Hidden transmission method based on MPEG4/2
Kumar et al. A Neural Network Based Image Steganography Method using Cyclic Chaos and Integer Wavelet Transform
CN114598887A (en) Anti-recompression video watermarking method for controlling bit rate increase
Kuo et al. High embedding reversible data hiding scheme for JPEG

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant