Skip to main content
Contribution to Book
Multimedia Information Security: Cryptography and Steganography
Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering (2011)
  • Ming Yang, Jacksonville State University
  • Monica Trifas, Jacksonville State University
  • Nikolaos Bourbakis, Wright State University
  • Lei Chen, Georgia Southern University
Abstract
Information security has traditionally been ensured with data encryption techniques. Different generic data encryption standards, such as DES, RSA, AES, have been developed. These encryption standards provide high level of security to the encrypted data. However, they are not very efficient in the encryption of multimedia contents due to the large volume of digital image/video data. In order to address this issue, different image/video encryption methodologies have been developed. These methodologies encrypt only the key parameters of image/video data instead of encrypting it as a bitstream. Joint compression-encryption is a very promising direction for image/video encryption. Nowadays, researchers start to utilize information hiding techniques to enhance the security level of data encryption methodologies. Information hiding conceals not only the content of the secret message, but also its very existence. In terms of the amount of data to be embedded, information hiding methodologies can be classified into low bitrate and high bitrate algorithms. In terms of the domain for embedding, they can be classified into spatial domain and transform domain algorithms. In this chapter, we have reviewed various data encryption standards, image/video encryption algorithms, and joint compression-encryption methodologies. Besides, we have also presented different categories of information hiding methodologies as well as data embedding strategies for digital image/video contents. This chapter is organized as following: in Section-1, we give a brief introduction to data encryption system as well as the state-of-the-art encryption standards; Section-2 presents a review of representative image encryption algorithms; Section-3 first gives a brief introduction of lossless compression and then moves to joint compression-encryption algorithms; Section-4 presents different video encryption methodologies; Section-5 gives a brief introduction to information hiding techniques; Section-6 presents different categories of low bitrate information algorithms; Section-7 presents different categories of high bitrate information algorithms; Section-8 discusses the embedding strategies within digital video contents; this chapter is summarized in Section-9.
Keywords
  • Multimedia information security,
  • Crytography,
  • Steganograhy,
  • Data encryption techniques
Publication Date
2011
Editor
Hamid R. Nemati and Li Yang
Publisher
IGI Global
ISBN
9781615207848
DOI
10.4018/978-1-61520-783-1.ch011
Citation Information
Ming Yang, Monica Trifas, Nikolaos Bourbakis and Lei Chen. "Multimedia Information Security: Cryptography and Steganography" Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering (2011) p. 244 - 270
Available at: http://works.bepress.com/lei-chen/50/