Encryption domain H.264/AVC (Advanced Video Coding) video data hiding method compatible with CABAC (Context-based Adaptive Binary Arithmetic Coding)
A technology of video data, encryption domain, applied in the direction of digital video signal modification, electrical components, image communication, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0054] A method for hiding H.264 / AVC video data in the encryption domain compatible with CABAC proposed in this embodiment includes three parts: H.264 / AVC video encryption, H.264 / AVC video data hiding in the encryption domain, and secret data extraction.
[0055] In this specific embodiment, in order to reduce the computational complexity, and keep the code rate of the encrypted H.264 / AVC video code stream unchanged, while having high perceptual security, the method of the present invention selects the motion vector difference ( The CABAC binary string (bin string) of the MVD) symbol and the CABAC binary string of the quantized residual coefficient symbol are encrypted, and the process of H.264 / AVC video encryption (such as Figure 1a Shown) is: For all macroblocks in the original H.264 / AVC video whose prediction mode is inter-frame prediction mode and whose motion vector difference is not 0, use the binary pseudo-random sequence generated by the first key to pair each macrobloc...
Embodiment 2
[0086] The H.264 / AVC video encryption in the H.264 / AVC video data hiding method in the CABAC-compatible encryption domain proposed in this embodiment and the H.264 / AVC video data hiding in the encryption domain are two-part processing, which is the same as that in Embodiment 1 The H.264 / AVC video encryption in the provided method is consistent with the H.264 / AVC video data hiding in the encrypted domain. The difference is that the secret data extraction in the method provided in this embodiment is The decrypted domain is complete. In some cases, the user needs to decrypt the encrypted video first, and then extract the secret information from the decrypted video. ) authorized users receive encrypted videos containing secret information, they can first use the encryption key to decrypt the video, and the decrypted video still contains secret information, which can be used to track the data source.
[0087] Such as Figure 1b As shown, the method provided in this embodiment com...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com