IDEAS home Printed from https://ideas.repec.org/a/igg/jisp00/v3y2009i3p37-54.html
   My bibliography  Save this article

Cryptographic and Steganographic Approaches to Ensure Multimedia Information Security and Privacy

Author

Listed:
  • Ming Yang

    (Jacksonville State University, USA)

  • Monica Trifas

    (Jacksonville State University, USA)

  • Guillermo Francia III

    (Jacksonville State University, USA)

  • Lei Chen

    (Sam Houston State University, USA)

Abstract

Information security and privacy have traditionally been ensured with data encryption techniques. Generic data encryption standards, such as DES, RSA, AES, are not very efficient in the encryption of multimedia contents due to the large volume. In order to address this issue, different image/video encryption methodologies have been developed. These methodologies encrypt only the key parameters of image/video data instead of encrypting it as a bitstream. Joint compression-encryption is a very promising direction for image/video encryption. Nowadays, researchers start to utilize information hiding techniques to enhance the security level of data encryption methodologies. Information hiding conceals not only the content of the secret message, but also its very existence. In terms of the amount of data to be embedded, information hiding methodologies can be classified into low bitrate and high bitrate algorithms. In terms of the domain for embedding, they can be classified into spatial domain and transform domain algorithms. Different categories of information hiding methodologies, as well as data embedding and watermarking strategies for digital video contents, will be reviewed. A joint cryptograph-steganography methodology, which combines both encryption and information hiding techniques to ensure patient information security and privacy in medical images, is also presented.

Suggested Citation

  • Ming Yang & Monica Trifas & Guillermo Francia III & Lei Chen, 2009. "Cryptographic and Steganographic Approaches to Ensure Multimedia Information Security and Privacy," International Journal of Information Security and Privacy (IJISP), IGI Global, vol. 3(3), pages 37-54, July.
  • Handle: RePEc:igg:jisp00:v:3:y:2009:i:3:p:37-54
    as

    Download full text from publisher

    File URL: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jisp.2009100703
    Download Restriction: no
    ---><---

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:igg:jisp00:v:3:y:2009:i:3:p:37-54. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Journal Editor (email available below). General contact details of provider: https://www.igi-global.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.