Secure Information Delivery through High Bitrate Data Embedding within Digital Video and its Application to Audio/Video Synchronization

Secure Information Delivery through High Bitrate Data Embedding within Digital Video and its Application to Audio/Video Synchronization

Ming Yang (Department of Information Technology, Center for Biometric Research, Southern Polytechnic State University, GA, USA), Chih-Cheng Hung (Anyang Normal University, Anyang, China & Department of Computer Science and Software Engineering, Center for Biometric Research, Southern Polytechnic State University, GA, USA) and Edward Jung (Department of Computer Science and Software Engineering, Center for Biometric Research, Southern Polytechnic State University, GA, USA)
Copyright: © 2012 |Pages: 23
DOI: 10.4018/jisp.2012100104
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

Secure communication has traditionally been ensured with data encryption, which has become easier to break than before due to the advancement of computing power. For this reason, information hiding techniques have emerged as an alternative to achieve secure communication. In this research, a novel information hiding methodology is proposed to deliver secure information with the transmission/broadcasting of digital video. Secure data will be embedded within the video frames through vector quantization. At the receiver end, the embedded information can be extracted without the presence of the original video contents. In this system, the major performance goals include visual transparency, high bitrate, and robustness to lossy compression. Based on the proposed methodology, the authors have developed a novel synchronization scheme, which ensures audio/video synchronization through speech-in-video techniques. Compared to existing algorithms, the main contributions of the proposed methodology are: (1) it achieves both high bitrate and robustness against lossy compression; (2) it has investigated impact of embedded information to the performance of video compression, which has not been addressed in previous research. The proposed algorithm is very useful in practical applications such as secure communication, captioning, speech-in-video, video-in-video, etc.
Article Preview

1. Introduction

Secure communication has been extensively studied in modern information and communication systems. Traditionally, the security of transmitted information is ensured with data encryption (Yang, Li & Bourbakis, 2004; Maniccam & Bourbakis, 2001). Nowadays, in order to enhance the level of security, researchers have started to utilize information hiding techniques, which conceal not only the content and location of the protected data, but also its very existence. In terms of the amount of data to be embedded, information hiding algorithms can be classified as high bitrate and low bitrate. According to modern information hiding theory, the embedding capability of the host video frames provides an additional communication channel with a certain capacity, which could be used to transmit secure data without degrading host video’s visual quality. The applications of high bitrate video information hiding include secure communication, captioning, speech-in-video, video-in-video, etc. (Yang & Bourbakis, 2005; Yang & Bourbakis, 2005). In high bitrate video information hiding, the following performance goals are mainly concerned:

  • 1.

    Visual Transparency: The embedding data should not interfere with the visual fidelity of host video (Zhang, Cheung & Chen, 2005; Ni et al.,2004);

  • 2.

    High Bitrate (also known as Channel Capacity): Large amount of data need to be effectively embedded (Cvejic & Seppiinen, 2004; Yang & Bourbakis, 2009; Kundur, 2000;Lin & Chang, 2001; Moulin&Mihcak, 2002; Mukherjee, Chae & Mitra, 1998; Wang & Izquierdo, 2002; Briffa & Das, 2002);

  • 3.

    Blind Retrieval: The presence of original video contents should not be required for information extraction (Yang & Bourbakis, 2005; Yang & Bourbakis, 2005);

  • 4.

    Robustness to lossy video codec: The embedded information should be robust to lossy video codec (Gunsel, Uludag & Tekalp, 2002; Fei, Kundur & Kwong, 2001; Ni et al., 2004);

  • 5.

    Minimum impact to video compression: The impact to the performance of video codec should be minimized (Chang, Chen & Lin, 2004).

Complete Article List

Search this Journal:
Reset
Open Access Articles: Forthcoming
Volume 12: 4 Issues (2018): 1 Released, 3 Forthcoming
Volume 11: 4 Issues (2017)
Volume 10: 4 Issues (2016)
Volume 9: 4 Issues (2015)
Volume 8: 4 Issues (2014)
Volume 7: 4 Issues (2013)
Volume 6: 4 Issues (2012)
Volume 5: 4 Issues (2011)
Volume 4: 4 Issues (2010)
Volume 3: 4 Issues (2009)
Volume 2: 4 Issues (2008)
Volume 1: 4 Issues (2007)
View Complete Journal Contents Listing