Multimedia Information Security and Privacy: Theory and Applications

Information security has traditionally been ensured with data encryption techniques. Different generic data encryption standards, such as DES, RSA, AES, have been developed. These encryption standards provide high level of security to the encrypted data. However, they are not very efficient in the encryption of multimedia contents due to the large volume of digital image/video data. In order to address this issue, different image/video encryption methodologies have been developed. These methodologies encrypt only the key parameters of image/video data instead of encrypting it as a bitstream. Joint compressionencryption is a very promising direction for image/video encryption. Nowadays, researchers start to utilize information hiding techniques to enhance the security level of data encryption methodologies. Information hiding conceals not only the content of the secret message, but also its very existence. In terms of the amount of data to be embedded, information hiding methodologies can be classified into low bitrate and high bitrate algorithms. In terms of the domain for embedding, they can be classified into spatial domain and transform domain algorithms. In this chapter, the authors have reviewed various data encryption standards, image/video encryption algorithms, and joint compression-encryption methodologies. Besides, the authors have also presented different categories of information hiding methodologies as well as data embedding strategies for digital image/video contents.

[1]  Deepa Kundur,et al.  The choice of watermark domain in the presence of compression , 2001, Proceedings International Conference on Information Technology: Coding and Computing.

[2]  Jean-Luc Dugelay,et al.  A guide tour of video watermarking , 2003, Signal Process. Image Commun..

[3]  Li Li,et al.  A Video Watermarking Scheme Based on Motion Vectors and Mode Selection , 2008, 2008 International Conference on Computer Science and Software Engineering.

[4]  Chung Jung Kuo,et al.  Novel image encryption technique and its application in progressive transmission , 1993, J. Electronic Imaging.

[5]  Josef Scharinger Fast encryption of image data using chaotic Kolmogorov flows , 1998, J. Electronic Imaging.

[6]  Ming Yang,et al.  Security and Privacy Issues in Secure E-Mail Standards and Services , 2009, Int. J. Inf. Secur. Priv..

[7]  Minghua Chen,et al.  Hiding privacy information in video surveillance system , 2005, IEEE International Conference on Image Processing 2005.

[8]  Kuo-Liang Chung,et al.  A novel SVD- and VQ-based image hiding scheme , 2001, Pattern Recognit. Lett..

[9]  Ali Serhan Koyuncugil,et al.  Surveillance Technologies and Early Warning Systems: Data Mining Applications for Risk Detection , 2010 .

[10]  Muhammad Arsalan,et al.  Intelligent threshold selection for reversible watermarking of medical images , 2010, GECCO '10.

[11]  H. B. Kekre,et al.  Increased Capacity of Information Hiding in LSB's Method for Text and Image , 2008 .

[12]  Gin-Der Wu,et al.  Image Watermarking Using Structure Based Wavelet Tree Quantization , 2007, 6th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007).

[13]  Lintian Qiao,et al.  A New Algorithm for MPEG Video Encryption , 2007 .

[14]  Franck Davoine,et al.  Self-similarity based image watermarking , 1998, 9th European Signal Processing Conference (EUSIPCO 1998).

[15]  Chin-Chen Chang,et al.  Information hiding based on search-order coding for VQ indices , 2004, Pattern Recognit. Lett..

[16]  Y. Hu Grey-level image hiding scheme based on vector quantisation , 2003 .

[17]  Wolfgang Effelsberg,et al.  Semi-automatic registration of videos for improved watermark detection , 2010, MMSys '10.

[18]  Lei Tang,et al.  Methods for encrypting and decrypting MPEG video data efficiently , 1997, MULTIMEDIA '96.

[19]  N. Bourbakis,et al.  A high bitrate information hiding algorithm for digital video content under H.264/AVC compression , 2005, 48th Midwest Symposium on Circuits and Systems, 2005..

[20]  Sung-Min Kim,et al.  Data Hiding on H.264/AVC Compressed Video , 2007, ICIAR.

[21]  Taifan Quan,et al.  Study on Information Hiding Algorithm Based on RBF and LSB , 2008, 2008 Fourth International Conference on Natural Computation.

[22]  Chin-Chen Chang,et al.  A virtual image cryptosystem based upon vector quantization , 1998, IEEE Trans. Image Process..

[23]  B. S. Manjunath,et al.  Color image embedding using multidimensional lattice structures , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[24]  Zhifeng Ma,et al.  Information Hiding Algorithm Based on Predictive Coding , 2009, 2009 International Conference on Information Technology and Computer Science.

[25]  Xiaolin Wu,et al.  Joint image/video compression and encryption via high-order conditional entropy coding of wavelet coefficients , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.

[26]  Motoi Iwata,et al.  Digital Steganography Utilizing Features of JPEG Images , 2004 .

[27]  Pierre Moulin,et al.  A framework for evaluating the data-hiding capacity of image sources , 2002, IEEE Trans. Image Process..

[28]  Colin J. Fidge,et al.  Probabilistic Inference Channel Detection and Restriction Applied to Patients' Privacy Assurance , 2010, Int. J. Inf. Secur. Priv..

[29]  Edward J. Delp,et al.  Fragile watermarking using the VW2D watermark , 1999, Electronic Imaging.

[30]  Nikolaos G. Bourbakis,et al.  Lossless compression and information hiding in images , 2004, Pattern Recognit..

[31]  Ingemar J. Cox,et al.  A Secure, Robust Watermark for Multimedia , 1996, Information Hiding.

[32]  Xiang-Gen Xia,et al.  A multiresolution watermark for digital images , 1997, Proceedings of International Conference on Image Processing.

[33]  Bharat K. Bhargava,et al.  An efficient MPEG video encryption algorithm , 1998, Proceedings Seventeenth IEEE Symposium on Reliable Distributed Systems (Cat. No.98CB36281).

[34]  Arwa Zabian,et al.  Algorithm for Text Hiding in Digital Image for Information Security , 2009 .

[35]  Edward J. Delp,et al.  Perceptual watermarks for digital images and video , 1999, Electronic Imaging.

[36]  Gustaf Neumann,et al.  Managing Security in the World Wide Web: Architecture, Services and Techniques , 2000 .

[37]  N. Bourbakis,et al.  SCAN-Based Compression-Encryption-Hiding for Video on Demand , 2003, IEEE Multim..

[38]  Mathews Z. Nkhoma,et al.  Contributing Factors of Information Security Investments in South East Asia SMBs: A Technology- Organisational -Environment Approach , 2013, Int. J. Inf. Secur. Priv..

[39]  B. S. Manjunath,et al.  Data hiding in video , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).

[40]  Yanghee Choi,et al.  Authentication, Authorization, and Accounting (AAA) Framework in Network Mobility (NEMO) Environments , 2008 .

[41]  Chin-Chen Chang,et al.  Joint coding and embedding techniques for multimedia images , 2008, Inf. Sci..

[42]  N. Bourbakis,et al.  A synthetic stegano-crypto scheme for securing multimedia medical records and their associations , 2009, 2009 16th International Conference on Digital Signal Processing.

[43]  Chun-Xia Li A Novel Scheme for Text Information Hiding into a Carrier Image Based on BCH Code and HVS Model , 2009 .

[44]  Shih-Fu Chang,et al.  Semifragile watermarking for authenticating JPEG visual content , 2000, Electronic Imaging.

[45]  Rui Du,et al.  Invertible authentication watermark for JPEG images , 2001, Proceedings International Conference on Information Technology: Coding and Computing.

[46]  Chin-Chen Chang,et al.  Both Color and Gray Scale Secret Images Hiding in a Color Image , 2002, Int. J. Pattern Recognit. Artif. Intell..

[47]  Bharat K. Bhargava,et al.  A fast MPEG video encryption algorithm , 1998, MULTIMEDIA '98.

[48]  Dima Pröfrock,et al.  Dual watermarking for protection of rightful ownership and secure image authentication , 2006, MCPS '06.

[49]  Chin-Chen Chang,et al.  Reversible steganographic method using SMVQ approach based on declustering , 2007, Inf. Sci..

[50]  Yongcheng Li,et al.  Security enhanced MPEG player , 1996, Proceedings International Workshop on Multimedia Software Development.

[51]  Ahmed H. Tewfik,et al.  Data hiding for video-in-video , 1997, Proceedings of International Conference on Image Processing.

[52]  Dejun Mu,et al.  Study of information hiding algorithm based on GHM and color transfer theory , 2009 .

[53]  Yu-Chen Hu,et al.  High-capacity image hiding scheme based on vector quantization , 2006, Pattern Recognit..

[54]  Oscal T.-C. Chen,et al.  Data hiding in inter and intra prediction modes of H.264/AVC , 2008, 2008 IEEE International Symposium on Circuits and Systems.

[55]  Ni Rongrong,et al.  Embedding information into color images using wavelet , 2002, 2002 IEEE Region 10 Conference on Computers, Communications, Control and Power Engineering. TENCOM '02. Proceedings..

[56]  Thomas S. Huang,et al.  An additive approach to transform-domain information hiding and optimum detection structure , 2001, IEEE Trans. Multim..

[57]  Jun Tian,et al.  Reversible data embedding using a difference expansion , 2003, IEEE Trans. Circuits Syst. Video Technol..

[58]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[59]  Chin-Chen Chang,et al.  Reversible hiding in DCT-based compressed images , 2007, Inf. Sci..

[60]  Subariah bt. Ibrahim,et al.  Stenography: Random LSB Insertion Using Discrete Logarithm , 2003, CITA.

[61]  Chin-Chen Chang,et al.  An embedding technique based upon block prediction , 2008, J. Syst. Softw..

[62]  Junjie Li,et al.  An information hiding algorithm based on intra-prediction modes and matrix coding for H.264/AVC video stream , 2011 .

[63]  A. Murat Tekalp,et al.  Robust watermarking of fingerprint images , 2002, Pattern Recognit..

[64]  Jong Ryul Kim,et al.  A robust wavelet-based digital watermarking using level-adaptive thresholding , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).

[65]  Chin-Chen Chang,et al.  A new steganographic method for color and grayscale image hiding , 2007, Comput. Vis. Image Underst..

[66]  Iskender Agi,et al.  An empirical study of secure MPEG video transmissions , 1996, Proceedings of Internet Society Symposium on Network and Distributed Systems Security.

[67]  Shih-Fu Chang,et al.  Watermarking capacity of digital images based on domain-specific masking effects , 2001, Proceedings International Conference on Information Technology: Coding and Computing.

[68]  Yu-Ming Cheng,et al.  An Efficient Information Hiding Algorithm for Polygon Models , 2005, Comput. Graph. Forum.

[69]  Yuewei Dai,et al.  A new adaptive watermarking for real-time MPEG videos , 2007, Appl. Math. Comput..

[70]  Shih-Chieh Shie,et al.  Visually imperceptible image hiding scheme based on vector quantization , 2010, Inf. Process. Manag..

[71]  Dima Pröfrock,et al.  H.264/AVC video authentication using skipped macroblocks for an erasable watermark , 2005, Visual Communications and Image Processing.

[72]  Sos S. Agaian,et al.  Secure information hiding algorithm using parametric slant-Hadamard transforms , 2008, SPIE Defense + Commercial Sensing.

[73]  Jun Zheng,et al.  Handbook of Research on Wireless Security , 2008 .

[74]  Russell M. Mersereau,et al.  Towards robust compressed-domain video watermarking for H.264 , 2006, Electronic Imaging.

[75]  Tracy Bradley Maples,et al.  Performance Study of a Selective Encryption Scheme for the Security of Networked, Real-Time Video , 1995, Proceedings of Fourth International Conference on Computer Communications and Networks - IC3N'95.

[76]  Athanassios N. Skodras,et al.  Real time data hiding by exploiting the IPCM macroblocks in H.264/AVC streams , 2009, Journal of Real-Time Image Processing.

[77]  Aman Jantan,et al.  Image Encryption Using Block-Based Transformation Algorithm , 2008 .

[78]  Borko Furht,et al.  Short Paper: Enhanced 1-D Chaotic Key-Based Algorithm for Image Encryption , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[79]  C. Chang,et al.  Hiding secret data adaptively in vector quantisation index tables , 2006 .

[80]  Jean-Luc Dugelay,et al.  A Survey of Watermarking Algorithms for Image Authentication , 2002, EURASIP J. Adv. Signal Process..

[81]  N. Cvejic,et al.  Channel capacity of high bit rate audio data hiding algorithms in diverse transform domains , 2004, IEEE International Symposium on Communications and Information Technology, 2004. ISCIT 2004..

[82]  Yoshiyasu Takefuji,et al.  Damageless Information Hiding using Neural Network on YCbCr Domain , 2008 .

[83]  Chin-Chen Chang,et al.  A Reversible Data Hiding Scheme Based on Side Match Vector Quantization , 2006, IEEE Transactions on Circuits and Systems for Video Technology.

[84]  Russell M. Mersereau,et al.  A novel approach for increasing security and data embedding capacity in images for data hiding applications , 2001, Proceedings International Conference on Information Technology: Coding and Computing.

[85]  Frank Gadegast Securitymechanisms for Multimedia-Data with the Example MPEG-I-Video , 1998 .

[86]  S. D. Lin,et al.  Secret image communication scheme based on vector quantisation , 2004 .

[87]  Johann A. Briffa,et al.  Channel models for high-capacity information hiding in images , 2003, SPIE Optics + Photonics.

[88]  Lee-Ming Cheng,et al.  Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..

[89]  Dieter Fink,et al.  A Model of Information Security Governance for E-Business , 2006 .

[90]  Iwan Setyawan,et al.  Watermarking digital image and video data. A state-of-the-art overview , 2000 .

[91]  Chunhua Yang,et al.  A Large Capacity Blind Information Hiding Algorithm , 2008, 2008 International Symposium on Electronic Commerce and Security.

[92]  Z. Qiu,et al.  A DWT-based color image steganography scheme , 2002, 6th International Conference on Signal Processing, 2002..

[93]  Wei Su,et al.  Robust lossless image data hiding , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).

[94]  A. Murat Tekalp,et al.  Lossless generalized-LSB data embedding , 2005, IEEE Transactions on Image Processing.

[95]  Deepa Kundur Implications for high capacity data hiding in the presence of lossy compression , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).

[96]  Lan Anh Tran,et al.  Securing Web Services: Practical Usage of Standards and Specifications , 2008 .

[97]  Chin-Chen Chang,et al.  A steganographic method based upon JPEG and quantization table modification , 2002, Inf. Sci..

[98]  Stephen Chong,et al.  Self-identifying sensor data , 2010, IPSN '10.

[99]  W.-J. Hsu,et al.  Adaptive data hiding based on VQ compressed images , 2003 .

[100]  W. Tsai,et al.  Data hiding in images via multiple-based number conversion and lossy compression , 1998 .

[101]  Ajay Luthra,et al.  Overview of the H.264/AVC video coding standard , 2003, IEEE Trans. Circuits Syst. Video Technol..

[102]  Sheng-bing Che,et al.  A Fragile Information Hiding Technique Based on Human Visual Gray Sensitivity , 2010 .

[103]  Andreas Uhl,et al.  Experimental study on the impact of robust watermarking on iris recognition accuracy , 2010, SAC '10.

[104]  Jennifer L. Davidson,et al.  Steganography using the minimax eigenvalue decomposition , 1998, Optics & Photonics.

[105]  Hamid R. Nemati International Journal of Information Security and Privacy , 2007 .

[106]  H. B. Kekre,et al.  Mixing Codebooks of LBG, KPE and KFCG Algorithms to Increase Capacity of Information Hiding , 2010 .

[107]  Zhicheng Ni,et al.  Distortionless data hiding based on integer wavelet transform , 2002 .