Cryptographic and Steganographic Approaches to Ensure Multimedia Information Security and Privacy
نویسندگان
چکیده
Information security and privacy have traditionally been ensured with data encryption techniques. Generic data encryption standards, such as DES, RSA, AES, are not very efficient in the encryption of multimedia contents due to the large volume. In order to address this issue, different image/video encryption methodologies have been developed. These methodologies encrypt only the key parameters of image/video data instead of encrypting it as a bitstream. Joint compression-encryption is a very promising direction for image/video encryption. Nowadays, researchers start to utilize information hiding techniques to enhance the security level of data encryption methodologies. Information hiding conceals not only the content of the secret message, but also its very existence. In terms of the amount of data to be embedded, information hiding methodologies can be classified into low bitrate and high bitrate algorithms. In terms of the domain for embedding, they can be classified into spatial domain and transform domain algorithms. Different categories of information hiding methodologies, as well as data embedding and watermarking strategies for digital video contents, will be reviewed. A joint cryptograph-steganography methodology, which combines both encryption and information hiding techniques to ensure patient information security and privacy in medical images, is also presented. DOI: 10.4018/jisp.2009100703 IGI PUBLISHING This paper appears in the publication, International Journal of Information Security and Privacy, Volume 3, Issue 3 edited by Hamid Nemati © 2009, IGI Global 701 E. Ch colate Avenue, Hershey PA 17033-1240, USA Tel: 717/533-8845; Fax 717/533-8661; URL-http://www.igi-global.com ITJ 5469 38 International Journal of Information Security and Privacy, 3(3), 37-54, July-September 2009 Copyright © 2009, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. methodologies have been developed. They encrypt only the key parameters of image/video data instead of encrypting it as a bitstream. Joint compression-encryption is a very promising direction for image/video encryption. Nowadays, researchers start to utilize information hiding techniques to enhance the security level of data encryption systems. Information hiding conceals not only the content of the secret message, but also its very existence. In terms of the amount of data to be embedded, information hiding methodologies can be classified into low bitrate and high bitrate algorithms. In terms of the domain for embedding, they can be classified into spatial domain and transform domain algorithms. Information hiding techniques have been utilized in many application scenarios, such as secure communication, ownership verification, distribution tracking, etc. Information hiding techniques can be combined with encryption to enhance the level of security in multimedia communication systems. In this paper, we will first present some representative image/video encryption algorithms. After that, we will move to image/video information hiding techniques and watermarking strategies. At the end, we will present a joint cryptographsteganographic approach, which combines encryption and information hiding techniques to ensure patient information security and privacy in medical images. This paper is organized as following: in Section-2, we give a brief introduction to image encryption algorithms; Section-3 presents a review of representative joint compression-encryption algorithms; Section-4 presents different video encryption methodologies; Section-5 gives a brief introduction to information hiding techniques; Section-6 reviews different low bitrate information hiding algorithms; Section-7 addresses a special application of low bitrate information hiding – digital watermarking; Section-8 moves to high bitrate information hiding algorithms; Section-9 discusses the embedding strategies within digital video contents; Section-10 presents a joint cryptography-steganography methodology to ensure patient information security and privacy in medical images; this paper is summarized in Section-11.
منابع مشابه
A Computational Model for Watermark Robustness
Multimedia security schemes often combine cryptographic schemes with information hiding techniques such as steganography or watermarking. Example applications are dispute resolving, proof of ownership, (asymmetric/anonymous) fingerprinting and zero-knowledge watermark detection. The need for formal security definitions of watermarking schemes is manifold, whereby the core need is to provide sui...
متن کاملEfficient Techniques for Multimedia Information Hiding using Color Visual Cryptography
In this paper, a novel approach is presented for multimedia information hiding using visual cryptography. The approach combines both the steganographic and cryptographic effect to improve the quality of security and to increase the payload. Both are important parameters in information hiding. The proposed techniques provide three levels of security without reducing the payload and the image qua...
متن کاملPrivacy in Cyberspace
Information technology provides better medical services and so appropriate conditions for misuse of personal information. Medical information is an important part of sensitive computer data. For the growing of information technology. Protection of patient`s privacy in cyberspace has become one of the main matters of medical law. To this end. The rules are set out in international documents incl...
متن کاملDesign of cybernetic metamodel of cryptographic algorithms and ranking of its supporting components using ELECTRE III method
Nowadays, achieving desirable and stable security in networks with national and organizational scope and even in sensitive information systems, should be based on a systematic and comprehensive method and should be done step by step. Cryptography is the most important mechanism for securing information. a cryptographic system consists of three main components: cryptographic algorithms, cryptogr...
متن کاملSteganographic Approach to Ensure Data Storage Security in Cloud Computing Using Huffman Coding (SAHC)
Cloud computing offers the on demand computational infrastructure to the users which has the potential to decrease the huge cost to build IT based services. It can provide ubiquitous, convenient data storage facility. It is a significant issue as the whole data stored to a set of interconnected resource pools which are situated over different location of the world. Stored data can be accessed t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IJISP
دوره 3 شماره
صفحات -
تاریخ انتشار 2009