Abstract
The protection of secret data based on data hiding technique provides the basic security services for digital video through network transmission. However, the video with secret data is stored with centralized storage, which is vulnerable from external centralized attacks, such as the loss and tampering of the digital video. The protection of copyright and privacy data for digital video is still open issues. In this paper, we propose a blockchain-based data hiding method for data protection in digital video. To improve the integrity certification of secret data and the video, we combined the blockchain and data hiding techniques by adding the hash value to the block with a traceable hash value record; to improve the protection level of privacy data such as copyright related to digital video, we designed a DCT-based data hiding scheme which interact with the blockchain record, where the external chain is utilized as the controller for the privacy data into carrier video. Similar to Bitcoin, This system removes the need for a trusted third party, enabling autonomous control of privacy data.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Christidis, K., Devetsikiotis, M.: Blockchains and smart contracts for the internet of things. IEEE Access 4, 2292–2303 (2016)
Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008). Consulted
Atzei, N., Bartoletti, M., Cimoli, T.: A survey of attacks on ethereum smart contracts (SoK). In: Maffei, M., Ryan, M. (eds.) POST 2017. LNCS, vol. 10204, pp. 164–186. Springer, Heidelberg (2017). https://doi.org/10.1007/978-3-662-54455-6_8
Zhu, W., Luo, C., Wang, J., Li, S.: Multimedia cloud computing. IEEE Signal Proc. Mag. 23(3), 59–69 (2011)
Sze, V., Budagavi, M.: High throughput CABAC entropy coding in HEVC. IEEE Trans. Circuits Syst. Video Technol. 22(12), 1778–1791 (2012)
Tew, Y., Wong, K.S.: An overview of information hiding in H. 264/AVC compressed video. IEEE Trans. Circuits Syst. Video Technol. 24(2), 305–319 (2014)
Ha, P.H., Tsigas, P., Anshus, O.J., Sname, F.: SocioNet: a social-based multimedia access system for unstructured P2P networks. IEEE T. Parall. Distr. 21(7), 1027–1041 (2010)
Liu, A.D., Du, X.H., Wang, N., Li, S.Z.: Research progress of blockchain technology and its application in information security. Journal of Software (2018)
Bogner, A., Chanson, M., Meeuw, A.: A decentralised sharing app running a smart contract on the ethereum blockchain. In: International Conference, pp. 177–178 (2016)
Kosba, A., Miller, A., Shi, E., et al.: Hawk: the blockchain model of cryptography and privacy-preserving smart contracts. In: Proceedings of the 2016 IEEE Symposium on Security and Privacy. Piscataway, NJ, pp. 839–858. IEEE (2016)
Monero: A note on chain reactions in traceability in Cryptonote 2.0 (2017). https://lab.getmonero.org/pubs/MRL-0001.pdf
Miers, I., Garman, C., Green, M., et al.: Zerocoin: anonymous distributed E-cash from bitcoin. In: IEEE Symposium on Security and Privacy Conference, Piscataway, NJ, pp. 397–411. IEEE (2014)
Ben-Sasson, E., Chiesa, A., Genkin, D., Tromer, E., Virza, M.: SNARKs for C: verifying program executions succinctly and in zero knowledge. In: Canetti, R., Garay, Juan A. (eds.) CRYPTO 2013. LNCS, vol. 8043, pp. 90–108. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-40084-1_6
Azaria, A., Ekblaw, A., Vieira, T., Lippman, A.: MedRec: using blockchain for medical data access and permission management. In: International Conference on Open and Big Data, pp. 25–30 (2016). https://doi.org/10.1109/OBD.2016.11
Neisse, R., Steri, G., Naifovino, I.: A blockchain-based approach for data accountability and provenance tracking. In: International Conference on Availability, Reliability and Security, p. 14. ACM (2017)
Lazarovich, A.: Invisible ink, blockchain for data privacy, Massachusetts Institute of Technology, Boston, Massachusetts (2015)
Zyskind, G., Nathan. O., Pentland, A.: Enigma: decentralized computation platform with guaranteed privacy. Computer Science (2015)
Kumar, M., Agrawal, S.: Reversible data hiding based on prediction error expansion using adjacent pixels. Secur. Commun. Netw. 9(16), 3703–3712 (2016)
Rad, R.M., Wong, K., Guo, J.-M.: Reversible data hiding by adaptive group modification on histogram of prediction errors. Signal Process. 125 C, 315–328 (2016)
Mstafa, R.J., Elleithy, K.M., Abdelfattah, E.: A robust and secure video steganography method in DWT-DCT domains based on multiple object tracking and ECC. IEEE Access PP(99), 1 (2017)
Ma, X.J., Li, Z.T., Lv, J.L., Wang, W.D.: Data hiding in H.264/AVC streams with limited intra-frame distortion drift. In: International Symposium on Computer Network and Multimedia Technology, pp. 1–5 (2009)
Ma, X.J., Li, Z.T., Tu, H., Zhang, B.: Data hiding agorithm for H.264/AVC video streams without intra frame distortion drift. IEEE Trans. Circuits Syst. Video Technol. 20(10), 1320–1330 (2010)
Swati, S., Hayat, K., Shahid, Z.: A watermarking scheme for high efficiency video coding (HEVC). PLoS One 9(8), e105613 (2014). https://doi.org/10.1371/journal.Pone.0105613
Liu, Y.X., Li, Z.T., Ma, X.J., Liu, J.: A robust without intra-frame distortion drift data hiding algorithm based on H.264/AVC. Multimed. Tools Appl. 72(1), 613–636 (2014)
Liu, Y.X., Jia, S.M., Hu, M.S., Jia, Z.J., Chen, L., Zhao, H.G.: A reversible data hiding method for H.264 with Shamir’s (t, n)-threshold secret sharing. Neurocomputing 188, 63–70 (2016)
Yoo, H., Jung, J., Jo, J., Park, I.C.: Area-efficient multimode encoding architecture for long BCH codes. IEEE Trans. Circuits Syst. II Express Briefs 60(12), 872–876 (2013)
Liu, Y.X., Ju, L.M., Hu, M.S.: A new data hiding method for H.264 based on secret sharing. Neurocomputing (2015)
Bhowmik, D., Feng, T.: The multimedia blockchain: a distributed and tamper-proof media transaction framework. In: International Conference on Digital Signal Processing (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Zhao, H., Liu, Y., Wang, Y., Wang, X., Li, J. (2018). A Blockchain-Based Data Hiding Method for Data Protection in Digital Video. In: Qiu, M. (eds) Smart Blockchain. SmartBlock 2018. Lecture Notes in Computer Science(), vol 11373. Springer, Cham. https://doi.org/10.1007/978-3-030-05764-0_11
Download citation
DOI: https://doi.org/10.1007/978-3-030-05764-0_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-05763-3
Online ISBN: 978-3-030-05764-0
eBook Packages: Computer ScienceComputer Science (R0)