A H.264/AVC Video Data Hiding Method Based on Cabac Binary String Mapping
A technology of binary string and video data, applied in the direction of digital video signal modification, electrical components, image communication, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0054] A kind of encrypted domain H.264 / AVC video data hiding method based on CABAC binary string mapping that this embodiment proposes, it comprises H.264 / AVC video encryption, encrypted domain H.264 / AVC video data hiding and secret data extraction three parts.
[0055] In this specific embodiment, in order to reduce the computational complexity, and keep the code rate of the encrypted H.264 / AVC video code stream unchanged, while having high perceptual security, the method of the present invention selects the motion vector difference ( The CABAC binary string (bin string) of the MVD) symbol and the CABAC binary string of the quantized residual coefficient symbol are encrypted, and the process of H.264 / AVC video encryption (such as Figure 1a Shown) is: For all macroblocks in the original H.264 / AVC video whose prediction mode is inter-frame prediction mode and whose motion vector difference is not 0, use the binary pseudo-random sequence generated by the first key to pair each ...
Embodiment 2
[0090] The H.264 / AVC video encryption in the encrypted domain H.264 / AVC video data hiding method based on CABAC binary string mapping proposed in this embodiment and the H.264 / AVC video data hiding process in the encrypted domain are two parts, and The H.264 / AVC video encryption in the method given in the first embodiment is the same as the H.264 / AVC video data hiding in the encryption domain. Data extraction is done in the decrypted domain. In some cases, the user needs to decrypt the encrypted video first, and then extract the secret information from the decrypted video. ) authorized users receive encrypted videos containing secret information, they can first use the encryption key to decrypt the video, and the decrypted video still contains secret information, which can be used to track the data source.
[0091] like Figure 1b As shown, the method provided in this embodiment completes the specific process of extracting secret data in the decryption domain as follows:
...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com