Secure Information Delivery through High Bitrate Data Embedding within Digital Video and its Application to Audio/Video Synchronization

Secure communication has traditionally been ensured with data encryption, which has become easier to break than before due to the advancement of computing power. For this reason, information hiding techniques have emerged as an alternative to achieve secure communication. In this research, a novel information hiding methodology is proposed to deliver secure information with the transmission/broadcasting of digital video. Secure data will be embedded within the video frames through vector quantization. At the receiver end, the embedded information can be extracted without the presence of the original video contents. In this system, the major performance goals include visual transparency, high bitrate, and robustness to lossy compression. Based on the proposed methodology, the authors have developed a novel synchronization scheme, which ensures audio/video synchronization through speech-in-video techniques. Compared to existing algorithms, the main contributions of the proposed methodology are: (1) it achieves both high bitrate and robustness against lossy compression; (2) it has investigated impact of embedded information to the performance of video compression, which has not been addressed in previous research. The proposed algorithm is very useful in practical applications such as secure communication, captioning, speech-in-video, video-in-video, etc.

[1]  Lamjed Ben Said,et al.  A New Fuzzy-Based Approach for Anonymity Quantification in E-Services , 2014, Int. J. Inf. Secur. Priv..

[2]  Johann A. Briffa,et al.  Channel models for high-capacity information hiding in images , 2003, SPIE Optics + Photonics.

[3]  B. S. Manjunath,et al.  High-volume data hiding in images: Introducing perceptual criteria into quantization based embedding , 2002, 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[4]  Deepa Kundur,et al.  The choice of watermark domain in the presence of compression , 2001, Proceedings International Conference on Information Technology: Coding and Computing.

[5]  Nikolaos G. Bourbakis,et al.  Lossless compression and information hiding in images , 2004, Pattern Recognit..

[6]  Sanjit K. Mitra,et al.  A source and channel coding approach to data hiding with application to hiding speech in video , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[7]  N. Bourbakis,et al.  Data-image-video encryption , 2004, IEEE Potentials.

[8]  Wei Su,et al.  Robust lossless image data hiding , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).

[9]  Deepa Kundur Implications for high capacity data hiding in the presence of lossy compression , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).

[10]  Chin-Chen Chang,et al.  Information hiding based on search-order coding for VQ indices , 2004, Pattern Recognit. Lett..

[11]  A. Murat Tekalp,et al.  Robust watermarking of fingerprint images , 2002, Pattern Recognit..

[12]  Andrew B. Watson,et al.  DCT quantization matrices visually optimized for individual images , 1993, Electronic Imaging.

[13]  Russell M. Mersereau,et al.  A novel approach for increasing security and data embedding capacity in images for data hiding applications , 2001, Proceedings International Conference on Information Technology: Coding and Computing.

[14]  Pierre Moulin,et al.  A framework for evaluating the data-hiding capacity of image sources , 2002, IEEE Trans. Image Process..

[15]  Nikolaos G. Bourbakis,et al.  An Efficient Packet Loss Recovery Methodology for Video Streaming Over IP Networks , 2009, IEEE Transactions on Broadcasting.

[16]  Hamid R. Nemati International Journal of Information Security and Privacy , 2007 .

[17]  A. Cavoukian Privacy by Design: Origins, Meaning, and Prospects for Assuring Privacy and Trust in the Information Era , 2012 .

[18]  Shih-Fu Chang,et al.  Watermarking capacity of digital images based on domain-specific masking effects , 2001, Proceedings International Conference on Information Technology: Coding and Computing.

[19]  L. Janczewski Internet and Intranet Security Management: Risks and Solutions , 1999 .

[20]  Andrew B. Watson,et al.  Visibility of DCT basis functions: effects of contrast masking , 1994, Proceedings of IEEE Data Compression Conference (DCC'94).

[21]  N. Bourbakis,et al.  A high bitrate information hiding algorithm for digital video content under H.264/AVC compression , 2005, 48th Midwest Symposium on Circuits and Systems, 2005..

[22]  Ebroul Izquierdo,et al.  High-capacity data hiding in MPEG-2 compressed video , 2002 .

[23]  N. Cvejic,et al.  Channel capacity of high bit rate audio data hiding algorithms in diverse transform domains , 2004, IEEE International Symposium on Communications and Information Technology, 2004. ISCIT 2004..

[24]  George Yee Privacy Protection Measures and Technologies in Business Organizations: Aspects and Standards , 2011 .

[25]  Reginald L. Lagendijk,et al.  Perceptual optimization of image coding algorithms , 1995, Proceedings., International Conference on Image Processing.

[26]  Moshe Zviran,et al.  Goals and Practices in Maintaining Information Systems Security , 2010, Int. J. Inf. Secur. Priv..

[27]  B. S. Manjunath,et al.  Data hiding in video , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).

[28]  Ahmed H. Tewfik,et al.  Data hiding for video-in-video , 1997, Proceedings of International Conference on Image Processing.