Multimedia Information Security and Privacy: Theory and Applications

Multimedia Information Security and Privacy: Theory and Applications

Ming Yang, Monica Trifas, Guillermo Francia, Lei Chen, Yongliang Hu
ISBN13: 9781609602000|ISBN10: 1609602005|EISBN13: 9781609602024
DOI: 10.4018/978-1-60960-200-0.ch015
Cite Chapter Cite Chapter

MLA

Yang, Ming, et al. "Multimedia Information Security and Privacy: Theory and Applications." Security and Privacy Assurance in Advancing Technologies: New Developments, edited by Hamid Nemati, IGI Global, 2011, pp. 214-251. https://doi.org/10.4018/978-1-60960-200-0.ch015

APA

Yang, M., Trifas, M., Francia, G., Chen, L., & Hu, Y. (2011). Multimedia Information Security and Privacy: Theory and Applications. In H. Nemati (Ed.), Security and Privacy Assurance in Advancing Technologies: New Developments (pp. 214-251). IGI Global. https://doi.org/10.4018/978-1-60960-200-0.ch015

Chicago

Yang, Ming, et al. "Multimedia Information Security and Privacy: Theory and Applications." In Security and Privacy Assurance in Advancing Technologies: New Developments, edited by Hamid Nemati, 214-251. Hershey, PA: IGI Global, 2011. https://doi.org/10.4018/978-1-60960-200-0.ch015

Export Reference

Mendeley
Favorite

Abstract

Information security has traditionally been ensured with data encryption techniques. Different generic data encryption standards, such as DES, RSA, AES, have been developed. These encryption standards provide high level of security to the encrypted data. However, they are not very efficient in the encryption of multimedia contents due to the large volume of digital image/video data. In order to address this issue, different image/video encryption methodologies have been developed. These methodologies encrypt only the key parameters of image/video data instead of encrypting it as a bitstream. Joint compression-encryption is a very promising direction for image/video encryption. Nowadays, researchers start to utilize information hiding techniques to enhance the security level of data encryption methodologies. Information hiding conceals not only the content of the secret message, but also its very existence. In terms of the amount of data to be embedded, information hiding methodologies can be classified into low bitrate and high bitrate algorithms. In terms of the domain for embedding, they can be classified into spatial domain and transform domain algorithms. In this chapter, the authors have reviewed various data encryption standards, image/video encryption algorithms, and joint compression-encryption methodologies. Besides, the authors have also presented different categories of information hiding methodologies as well as data embedding strategies for digital image/video contents.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.