EconPapers    
Economics at your fingertips  
 

Secure Information Delivery through High Bitrate Data Embedding within Digital Video and its Application to Audio/Video Synchronization

Ming Yang, Chih-Cheng Hung and Edward Jung
Additional contact information
Ming Yang: Department of Information Technology, Center for Biometric Research, Southern Polytechnic State University, GA, USA
Chih-Cheng Hung: Anyang Normal University, Anyang, China & Department of Computer Science and Software Engineering, Center for Biometric Research, Southern Polytechnic State University, GA, USA
Edward Jung: Department of Computer Science and Software Engineering, Center for Biometric Research, Southern Polytechnic State University, GA, USA

International Journal of Information Security and Privacy (IJISP), 2012, vol. 6, issue 4, 71-93

Abstract: Secure communication has traditionally been ensured with data encryption, which has become easier to break than before due to the advancement of computing power. For this reason, information hiding techniques have emerged as an alternative to achieve secure communication. In this research, a novel information hiding methodology is proposed to deliver secure information with the transmission/broadcasting of digital video. Secure data will be embedded within the video frames through vector quantization. At the receiver end, the embedded information can be extracted without the presence of the original video contents. In this system, the major performance goals include visual transparency, high bitrate, and robustness to lossy compression. Based on the proposed methodology, the authors have developed a novel synchronization scheme, which ensures audio/video synchronization through speech-in-video techniques. Compared to existing algorithms, the main contributions of the proposed methodology are: (1) it achieves both high bitrate and robustness against lossy compression; (2) it has investigated impact of embedded information to the performance of video compression, which has not been addressed in previous research. The proposed algorithm is very useful in practical applications such as secure communication, captioning, speech-in-video, video-in-video, etc.

Date: 2012
References: Add references at CitEc
Citations:

Downloads: (external link)
http://services.igi-global.com/resolvedoi/resolve. ... 4018/jisp.2012100104 (application/pdf)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:igg:jisp00:v:6:y:2012:i:4:p:71-93

Access Statistics for this article

International Journal of Information Security and Privacy (IJISP) is currently edited by Yassine Maleh

More articles in International Journal of Information Security and Privacy (IJISP) from IGI Global
Bibliographic data for series maintained by Journal Editor ().

 
Page updated 2025-03-19
Handle: RePEc:igg:jisp00:v:6:y:2012:i:4:p:71-93