Multimedia Information Security: Cryptography and Steganography

Multimedia Information Security: Cryptography and Steganography

Ming Yang (Jacksonville State University, USA), Monica Trifas (Jacksonville State University, USA), Nikolaos Bourbakis (Wright State University, USA) and Lei Chen (Sam Houston State University, USA)
DOI: 10.4018/978-1-61520-783-1.ch011
OnDemand PDF Download:


Information security has traditionally been ensured with data encryption techniques. Different generic data encryption standards, such as DES, RSA, AES, have been developed. These encryption standards provide high level of security to the encrypted data. However, they are not very efficient in the encryption of multimedia contents due to the large volume of digital image/video data. In order to address this issue, different image/video encryption methodologies have been developed. These methodologies encrypt only the key parameters of image/video data instead of encrypting it as a bitstream. Joint compression-encryption is a very promising direction for image/video encryption. Nowadays, researchers start to utilize information hiding techniques to enhance the security level of data encryption methodologies. Information hiding conceals not only the content of the secret message, but also its very existence. In terms of the amount of data to be embedded, information hiding methodologies can be classified into low bitrate and high bitrate algorithms. In terms of the domain for embedding, they can be classified into spatial domain and transform domain algorithms. In this chapter, we have reviewed various data encryption standards, image/video encryption algorithms, and joint compression-encryption methodologies. Besides, we have also presented different categories of information hiding methodologies as well as data embedding strategies for digital image/video contents. This chapter is organized as following: in Section-1, we give a brief introduction to data encryption system as well as the state-of-the-art encryption standards; Section-2 presents a review of representative image encryption algorithms; Section-3 first gives a brief introduction of lossless compression and then moves to joint compression-encryption algorithms; Section-4 presents different video encryption methodologies; Section-5 gives a brief introduction to information hiding techniques; Section-6 presents different categories of low bitrate information algorithms; Section-7 presents different categories of high bitrate information algorithms; Section-8 discusses the embedding strategies within digital video contents; this chapter is summarized in Section-9.
Chapter Preview

Introduction To Encryption

In modern information and communication systems, information security is becoming an increasingly important issue due to the threats from all different types of attacks. Traditionally, information security has been ensured with data encryption. With the development of modern information hiding theory, researchers start to resort to information hiding techniques to enhance the security level of data encryption systems. In this chapter, we will first review different encryption techniques for multimedia data, including digital image and video contents. After that, we will move to the information hiding techniques for digital multimedia contents.

General Model

Encryption is a method to protect information from undesirable attacks by converting it into a form that is non-recognizable by its attackers. Data encryption mainly is the scrambling of the content of data, such as text, image, audio, video, etc. to make the data unreadable, invisible or incomprehensible during transmission. The inverse of data encryption is data decryption, which recovers the original data. Fig. 1 is the general model of a typical encryption/decryption system. The encryption procedure could be described as C = E (P, K), where P is the plaintext (original message), E is the encryption algorithm, K is the encryption key, and C is the ciphertext (scrambled message). The ciphertext is transmitted through the communication channel, which is subject to attacks. At the receiver end, the decryption procedure could be described as P = D (C, K’), where C is the ciphertext, D is the decryption algorithm, K’ is the decryption key (not necessarily the same as the encryption key K), and P is the recovered plaintext.

Figure 1.

Data Encryption/Decryption System

Claude Shannon pointed out that the fundamental techniques to encrypt a block of symbols are confusion and diffusion. Confusion can obscure the relationship between the plaintext and the ciphertext, and diffusion can spread the change throughout the whole ciphertext. Substitution is the simplest type of confusion, and permutation is the simplest method of diffusion. Substitution replaces a symbol with another one; permutation changes the sequence of the symbols in the block to make them unreadable. These two techniques are the foundations of encryption algorithms.

Secret-Key versus Public-Key

Kerckhoff claimed that the security of an encryption/decryption system should rely on the secrecy of the key instead of on the algorithm itself. The security level of an encryption algorithm is measured by the length of the key or the size of the key space. Based on the types of encryption/decryption key, the encryption systems can be classified into secret-key systems and public-key systems. The secret-key system is also called the symmetric system because the decryption key is the same as the encryption key. In a secret-key system, the encryption/decryption key has to be transmitted prior to the transmission of the ciphertext, and this requires a separate secure communication channel. The public-key system, which is also called the asymmetric system, has a decryption key that is different from the encryption key. Each person in the group knows the encryption key. This way each member can use the public key to encrypt a message, but only the person who has the decryption key can decrypt the ciphertext. With the public-key encryption system, there is no need for a secure communication channel to transmit the encryption key.

Complete Chapter List

Search this Book:
Hamid R. Nemati, Li Yang
List of Reviewers
Table of Contents
Hamid R. Nemati, Li Yang
Chapter 1
Network Security  (pages 1-31)
Ramakrishna Thurimella, Leemon C. Baird
Three pillars of security—confidentiality, integrity, and availability—are examined in the context of networks. Each is explained with known... Sample PDF
Network Security
Chapter 2
Xunhua Wang, Hua Lin
Entity authentication is a fundamental building block for system security and has been widely used to protect cyber systems. Nonetheless, the role... Sample PDF
Cryptography-Based Authentication for Protecting Cyber Systems
Chapter 3
Wasim A Al-Hamdani
Cryptography is the study and practice of protecting information and has been used since ancient times in many different shapes and forms to protect... Sample PDF
E-Mail, Web Service and Cryptography
Chapter 4
Wasim A Al-Hamdani
Cryptography has been used since ancient times in many different shapes and forms to protect messages from being intercepted. However, since 1976... Sample PDF
Cryptography in E-Mail and Web Services
Chapter 5
Lei Chen, Wen-Chen Hu, Ming Yang, Lei Zhang
E-mail services are the method of sending and receiving electronic messages over communication networks. Web services on the other hand provide a... Sample PDF
Applied Cryptography in E-mail Services and Web Services
Chapter 6
Dulal C. Kar, Hung L. Ngo, Clifton J. Mulkey
It is challenging to secure a wireless sensor network (WSN) because of its use of inexpensive sensor nodes of very limited processing capability... Sample PDF
Applied Cryptography in Wireless Sensor Networks
Chapter 7
Lei Zhang, Chih-Cheng Chang, Danfeng Yao
This chapter presents the technical challenges and solutions in securing wireless networks, in particular infrastructure-less wireless networks such... Sample PDF
Applied Cryptography in Infrastructure-Free Wireless Networks
Chapter 8
Slawomir Grzonkowski, Brian D. Ensor, Bill McDaniel
Electronic commerce has grown into a vital segment of the economy of many nations. It is a global phenomenon providing markets and commercialization... Sample PDF
Applied Cryptography in Electronic Commerce
Chapter 9
Harkeerat Bedi, Li Yang, Joseph M. Kizza
Fair exchange between a pair of parties can be defined as the fundamental concept of trade where none of the parties involved in the exchange have... Sample PDF
An Electronic Contract Signing Protocol Using Fingerprint Biometrics
Chapter 10
Feng Zhu, Wei Zhu
With the convergence of embedded computers and wireless communication, pervasive computing has become the inevitable future of computing. Every... Sample PDF
Secure and Private Service Discovery in Pervasive Computing Environments
Chapter 11
Ming Yang, Monica Trifas, Nikolaos Bourbakis, Lei Chen
Information security has traditionally been ensured with data encryption techniques. Different generic data encryption standards, such as DES, RSA... Sample PDF
Multimedia Information Security: Cryptography and Steganography
Chapter 12
Xunhua Wang, Ralph Grove, M. Hossain Heydari
In recent years, computer and network-based voting technologies have been gradually adopted for various elections. However, due to the fragile... Sample PDF
Secure Electronic Voting with Cryptography
Chapter 13
Kunal Sharma, A.J. Singh
The rising number of networked computers and the evolution of the WWW have witnessed the emergence of an E-World where the users are often referred... Sample PDF
Biometric Security in the E-World
About the Contributors