Académique Documents
Professionnel Documents
Culture Documents
Volume: 6 Issue: 2 87 – 91
_______________________________________________________________________________________________
DCT based Reversible Information Hiding Scheme
For Video using Quantized Blocks
Yakesh Jadala
Department of Computer Science and Engineering
Sreenidhi Institute of science and technology
Hyderabad , Telangana.
Abstract—The reversible data hiding is used for lossless and reversible streganography scheme for hiding secret data in
quantized descret cosine transformation (DCT) blocks. The requirement of reversibility may lead to more modifications to the
cover content which result in the tradeoff between the visual quality and hiding capacity. In this paper we propose a
reversible information hiding scheme for video, t o embeds the information into non-zero AC coefficients of quantized DCT
blocks. The experimental results show that the proposed scheme improves both the visual quality and hiding capacity.
get the quantized DC T coefficients and embed the data Let B^ i={B^1, B^2,…. B^l} be the set of 8x8 blocks of DCT
into it. Note that we present only the steps of interest in coefficients of Yi,and Q be a 8X8 block of the quantization
MPEG-4 compression in Figure 1. table used in intraframe coding .Let Ci= {C1,C2,C3….Cl} be
the set of 8x8 blocks of quantized DCT coefficients and
a. Models and Notations Ci^={C’1,C2’,……C,l}be the set of embedded blocks of
The raw YUV video consist of sequence of frame F = {f¯1 Yi.Let Di(1≤i≤9) be the set of quantized DCT coefficients
from high frequency to low frequency of a 8x8 block as
, f¯2 , ..., f¯n } be the sequence of original frames of raw
show in figure 2[6]. Let (di,1,di,2,….di,k(i)) be the sequence of
YUV video ,where ‗n‘is the total number of frames .each
quantized DCT coefficients in the set Di,where k(i) is given
frame fi€ F consists of one luminance ,two chroma
in table (1).
components. Let f¯i = {Y, Cb, Cr} where Y is the
luminance component and Cb, Cr are the two chroma
components of fi. .all these components can be compressed
using MPEG-4 encoder. While the compression process is
being carried out, the MPEG-4 encoder expresses the frames
in F as the sequence of I-,P-,B- frames. Then F-=I ᴗPᴗB,
where I is the set of I-frames called reference frames and
P,B are the sets of P-,B- frames, which are the predicted
frames .Though, all the frames in F- can be used for
embedding the data ,we use only I-frames for embedding
Figure 2: Chosen sets for embedding
.Let Let I ={I1 , I2 , ..., Im }where m<n. as we
concern with I, let Ii={Yi,Cib,Cri},where Yi is the luminance i 1 2 3 4 5 6 7 8 9
component of Ii, Ciband ,Cri are the two chroma components K(k) 7 7 7 6 6 5 5 4 4
of Ii. we consider Yi embedding the data. Here each Yi, of
size n1 xn2 ,is partitioned into 8x8 blocks of intensity values. Table 1 : The size of the chosen sets for embedding
we assume that both n1,n2 are the multiples of 8. Let
b. Data Embedding Procedure
Yi={B1i,Bi2 ….,Bil},Where Bij is the jth 8X8 block of Yi and l=
(n1xn2)/64.Here m^=mxl gives the total number of blocks in We embed the data intonon zero AC coefficient of
the setI . These 8x8 non-overlapping blocks are transformed quantized DCT blocks . The sets Dk (1 ≤ k ≤ 9) are
into 2-dimensional DCT using (1). considered for embedding as shown in Figure 2[7]. I x =
dk,p h e r e 1 ≤ p ≤ K (k), use the following f, S, g functions
where f is used to hide the bit, S is used to extract the data
bit and g is used to restore the modified coefficients.
88
IJRITCC | February 2018, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 6 Issue: 2 87 – 91
_______________________________________________________________________________________________
x +1 if x ≥ 2 C. Data Extraction Procedure
x-1 if x≤ -2 The data extraction is an inverse process of data
x’ = f(x) = x if 𝑥 = ±1 and 𝑠 = 1, (3) embedding. We extract the data bits using the function
x+1 if x = 1 and s = 0, S and restore the modified coefficients using the
function g. The data extraction and restoration is
x -1 if x = -1 and s = 0,
presented in Algorithm 2. We can prove that the
0 if x = 0.
proposed scheme is reversible by showing the function f
is invertible to the function g.
where t is data bit in I to be embedded .
1 if x =± 1 Algorithm 2: Data extraction scheme:
S(x) = 0 if 𝑥 = ±2 (4) Input: I, the set of I-frames with embedded data
┴ otherwise Output: the set of restored I-Frames, and the extracted Data:
Ї‘
forall the Ii€ I do
x +1 if x ≥ 2 Extract the Ci^ from Ii;
g (x) = x-1 if x≤ -2 (5) Partition Ci^ →{C‘1,C‘2,……C‘l}
x if 𝑥 = ±1 foreach Cj‘€ C^I do
0 if x = 0. consider DK (1 ≤ k ≤ 9) sets of C‘j as shown in
figure 2;
begin
These functions satisfy the following conditions:
if x = d k,p where 1 ≤ p ≤ K (k), extract the data bits
1) |x – x ’| ≤ 1.
using the fuction S in the equation (4)
2) For all x; f(x) = x’ ⇒ g(x’) = x.
restore the modified coefficients using the
3) For all x; the function S(x) outputs abit from the set { function g in the equation (5)
0, 1} or the symbol ┴ , which indicate that no bit is end
embedded in x. Let the resultant block be Ej‘;
The algoritham for above proposed method is presented as De-quantize the elements of Ej‘ as follows :
following During the compression, F is given as input to the for i1← 1to 8 do
encoder . as it is stated as earlier the encoder expresses the for i2← 1to 8 do
frames of F as the sequence of I -, P -, B-f rames. We Rj(i1,i2)=Ej‘(i1,i2) x Q(i1,i2);
consider the set of I -f rames for embedding the data bits. end
We present our proposed data embedding scheme in end
Algorithm 1. Rj‘(i1,i2)= IDCT(Rj‘);
end
Algorithm 1: Data embedding scheme combine all the Rj‘ blocks to get the Ri^
Input : I={I1,I2,………….Im} be the set of I-frames Rj^←{R‘1,R‘2,……..Rl‘};
and Ї be the data to be embedded . Restore the Ri^ back to Ii={Ri^,Cbi,Cri}
Output: the set of I-frames with embedded data end
forall the Ii € I do
extract the Yi from Ii III. R ESULTS AND D ISCUSSION
partition Yi →{B1i,B2i…….,Bil} We use various QCIF formatted videos in our
for each Bji€ Yi ,where 1 ≤ j ≤ l do experiment, including MissAm, Akiyo, Foreman,
find the DCT coefficients in Bij :Ḃji = DCT(Bji); SalesMan, etc. Some of the test videos are shown in Figure
quantized DCT coefficients in Ḃji in as 4. The frame size of all these test videos is 176 × 144
Below : pixels. We compress these test videos by the standard
For i1 ← 1 to 8 do MPEG-4 encoder. The widely used measurement for
for i2← 1 to 8 do evaluating the visual quality of a stego-video (watermarked
Cj(i1,i2)= Ḃji(i1,i2)/Q(i1,i2);
video) is PSNR (Peak Signal to Noise Ratio). The PSNR
end
for each YUV channel of a frame is given by the following
end
equation:
consider Dk(1≤k≤9) sets of Cj as shown in figure2;
if x = d k,p where 1 ≤ p ≤ K (k), embed the bit S
from I using the function f in equation (3)
Let the resultant block be Cj‘;
end
combine all the C‘j;
C^i←{C1,C2,.....,Cl‘};
restore the C^i back to Ii={Ci,Cbi,Cri}
end
89
IJRITCC | February 2018, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 6 Issue: 2 87 – 91
_______________________________________________________________________________________________
Are the pixel values at the coordinate (x, y) of original improved in terms of both the PSNR and 𝑃𝑆𝑁 𝑅𝑀
and distorted (embedded) video YUV channels compared to C-C. Chen scheme. Further the embedding
respectively, each of size M × N . capacity is also higher for most of the test
Further, we use the HVS based visual quality mesure video sequences. This is because our design minimizes the
PSNR-HVS-M [9] denoted by 𝑃 𝑆 𝑁 𝑅𝑀 , which takes alterations to the coefficients and utilize coefficient ∣ 1∣
into account the sensitivity of human eyes to distortions in for embedding the data which are more in the number. The
high, low spatial frequencies and the masking effects
embedded 𝐼 -frames of various test video sequences are
given as follows.
shown in Figure 4.
IV. CONCLUSION
where M S E HVS-M is computed between the original and When the data is hidden in the DCT domain. The
embedded (distorted) luminance component 𝑌 𝑖 . modifications to the cover content need to be minimal for
Another measurement used for evaluating the achieving reversibility. This results into a better trade off
performance of a data embedding scheme is embedding
between the visual quality and hiding capacity. Int the
capacity. We define the embedding capacity as the number
proposed scheme improves both the visual quality and the
of bits that can be embedded into a single 𝑌 𝑖 . The results
hiding capacity.
are shown in Table II. From the Table II, it is evident
that using the proposed scheme the visual quality is
90
IJRITCC | February 2018, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 6 Issue: 2 87 – 91
_______________________________________________________________________________________________
REFERENCES
[1] I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Hiding and Multimedia Signal Processing (IIH-
Kalker, Digital Water- marking and Steganography. MSP’07), vol. 2. IEEE Computer Society, 2007,
Morgan Kaufman, 2008. pp. 489–492.
[2] D. Salomon, Data Compression: The Complete [7] C.-C. Chang, C.-C. Lin, C.-S. Tseng, and W.-L. Tai,
Reference. Springer- Verlag, 2007. ―Reversible hiding in DCT-based compressed
[3] B. Furht, ―A survey of multimedia compression images,‖ Inf. Sci., vol. 177, pp. 2768–2786, Jul
techniques and standards. Part I: JPEG standard,‖ 2007.
Real-Time Imaging, vol. 1, pp. 49–67, Apr. 1995. [8] C.-Y. Lin, C.-C. Chang, and Y.-Z. Wang,
[4] S. Lin and C.-F. Chen, ―A robust dct-based ―Reversible steganographic method with high
watermarking for copyright protection,‖ IEEE payload for jpeg images,‖ IEICE - Transactions on
Transactions on Consumer Electronics, vol. 46, no. Information and Systems, vol. E91-D, no. 3, pp.
3, pp. 415–421, aug 2000. 836–845, mar 2008.
[5] C.-T. Hsu and J.-L. Wu, ―Dct-based watermarking [9] G. Sagar and B. B. Amberker, ―A DCT based near
for video,‖ IEEE Transactions on Consumer reversible data embedding scheme for MPEG-4
Electronics, vol. 44, no. 1, pp. 206–216, feb1998. video,‖ in The 4th International Conference on
[6] C.-C. Chen and D.-S. Kao, ―DCT-based reversible Signal and Image Processing(ICSIP’12), Dec. 2012,
image watermarking approach,‖ in Proc. of the Third pp. 69–79.
International Conference on InternationalInformation
91
IJRITCC | February 2018, Available @ http://www.ijritcc.org
_______________________________________________________________________________________