{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T22:40:01Z","timestamp":1745966401845,"version":"3.40.4"},"reference-count":27,"publisher":"IGI Global","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,10,1]]},"abstract":"<p>Secure communication has traditionally been ensured with data encryption, which has become easier to break than before due to the advancement of computing power. For this reason, information hiding techniques have emerged as an alternative to achieve secure communication. In this research, a novel information hiding methodology is proposed to deliver secure information with the transmission\/broadcasting of digital video. Secure data will be embedded within the video frames through vector quantization. At the receiver end, the embedded information can be extracted without the presence of the original video contents. In this system, the major performance goals include visual transparency, high bitrate, and robustness to lossy compression. Based on the proposed methodology, the authors have developed a novel synchronization scheme, which ensures audio\/video synchronization through speech-in-video techniques. Compared to existing algorithms, the main contributions of the proposed methodology are: (1) it achieves both high bitrate and robustness against lossy compression; (2) it has investigated impact of embedded information to the performance of video compression, which has not been addressed in previous research. The proposed algorithm is very useful in practical applications such as secure communication, captioning, speech-in-video, video-in-video, etc.<\/p>","DOI":"10.4018\/jisp.2012100104","type":"journal-article","created":{"date-parts":[[2013,2,22]],"date-time":"2013-02-22T16:58:36Z","timestamp":1361552316000},"page":"71-93","source":"Crossref","is-referenced-by-count":0,"title":["Secure Information Delivery through High Bitrate Data Embedding within Digital Video and its Application to Audio\/Video Synchronization"],"prefix":"10.4018","volume":"6","author":[{"given":"Ming","family":"Yang","sequence":"first","affiliation":[{"name":"Department of Information Technology, Center for Biometric Research, Southern Polytechnic State University, GA, USA"}]},{"given":"Chih-Cheng","family":"Hung","sequence":"additional","affiliation":[{"name":"Anyang Normal University, Anyang, China & Department of Computer Science and Software Engineering, Center for Biometric Research, Southern Polytechnic State University, GA, USA"}]},{"given":"Edward","family":"Jung","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Software Engineering, Center for Biometric Research, Southern Polytechnic State University, GA, USA"}]}],"member":"2432","reference":[{"key":"jisp.2012100104-0","doi-asserted-by":"crossref","unstructured":"Alturki, F., & Mersereau, R. (2001, April 2-4). A novel approach for increasing security and data embedding capacity in images for data hiding applications. In Proceedings of the International Conference on Information Technology: Coding and Computing (pp. 228\u2013233).","DOI":"10.1109\/ITCC.2001.918796"},{"key":"jisp.2012100104-1","doi-asserted-by":"crossref","unstructured":"Briffa, J. A., & Das, M. (2002, July 7-11). Channel models for high-capacity information hiding in images. In Proceeding of the SPIE, Seattle, WA (LNCS 4793).","DOI":"10.1117\/12.451259"},{"key":"jisp.2012100104-2","doi-asserted-by":"crossref","unstructured":"Chae, J. J., & Manjunath, B. S. (1999, Oct). Data hiding in video. In Proceedings of the 6th IEEE International Conference on Image Processing (ICIP'99), Kobe, Japan (Vol. 1, pp. 311-315).","DOI":"10.1109\/ICIP.1999.821620"},{"key":"jisp.2012100104-3","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2004.04.003"},{"key":"jisp.2012100104-4","unstructured":"Cvejic, N., & Seppiinen, T. (2004, October 26-29). Channel capacity of high bit rate audio data hiding algorithms in diverse transform domains. In Proceedings of the International Symposium on Communications and Information Technologies 2004 (ISCIT 2004), Sapporo, Japan."},{"key":"jisp.2012100104-5","unstructured":"Fei, C., Kundur, D., & Kwong, R. (2001, April 2-4). The choice of watermark domain in the presence of compression. In Proceedings of the International Conference on Information Technology: Coding and Computing, Las Vegas, NV (pp. 79-84)."},{"key":"jisp.2012100104-6","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(01)00250-3"},{"key":"jisp.2012100104-7","doi-asserted-by":"crossref","unstructured":"Kundur, D. (2000, March 27-29). Implications for high capacity data hiding in the presence of lossy compression. In Proceeding of International Conference on Information Technology: Coding and Computing (pp. 16-21).","DOI":"10.1109\/ITCC.2000.844177"},{"key":"jisp.2012100104-8","unstructured":"Lin, C. Y., & Chang, S. F. (2001, April). Watermarking capacity of digital images based on domain-specific masking effects. In Proceeding of International Conference on Information Technology: Coding and Computing (ITCC '01), Las Vegas, NV."},{"key":"jisp.2012100104-9","doi-asserted-by":"crossref","unstructured":"Maniccam, S. S., & Bourbakis, N. (2004). Lossless compression and information hiding in images. Pattern Recognition Journal, 36.","DOI":"10.1016\/j.patcog.2003.08.010"},{"key":"jisp.2012100104-10","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(00)00062-5"},{"key":"jisp.2012100104-11","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2002.802512"},{"key":"jisp.2012100104-12","doi-asserted-by":"crossref","unstructured":"Mukherjee, D., Chae, J. J., & Mitra, S. K. (1998, October). A source and channel coding approach to data hiding with application to hiding speech in video. In Proceedings of IEEE International Conference on Image Processing, Chicago, IL (Part I, pp. 348-352).","DOI":"10.1109\/ICIP.1998.723494"},{"key":"jisp.2012100104-13","unstructured":"Ni, Z., Shi, Y., Ansari, N., Su, W., Sun, Q., & Lin, X. (2004, June 27-30). Robust lossless image data hiding. In Proceedings of the International Conference on Multimedia & Expo 2004 (Vol. 3, pp. 2199\u20132202)."},{"key":"jisp.2012100104-14","unstructured":"Ni, Z., Shi, Y. Q., Ansari, N., Su, W., Sun, Q., & Lin, X. (2004, June 27-30). Robust lossless image data hiding. In Proceedings of the 2004 IEEE International Conference on Multimedia and Expo (ICME\u20192004), Taipei, Taiwan."},{"key":"jisp.2012100104-15","doi-asserted-by":"crossref","unstructured":"Solanki, K., Jacobsen, N., Chandrasekaran, S., Madhow, U., & Manjunath, B. S. (2002). High-volume data hiding in images: Introducing perceptual criteria into quantization-based embedding. In Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (Vol. 4, pp. 3485-3488).","DOI":"10.1109\/ICASSP.2002.1004663"},{"key":"jisp.2012100104-16","doi-asserted-by":"crossref","unstructured":"Solomon, J. A., Watson, A. B., & Ahumada, A. (1994). Visibility of DCT basis functions: Effects of contrast masking. In Proceedings of Data Compression Conferences, Snowbird, UT (pp. 361-370).","DOI":"10.1109\/DCC.1994.305944"},{"key":"jisp.2012100104-17","doi-asserted-by":"crossref","unstructured":"Swanson, M. D., Zhu, B., & Tewfik, A. H. (1997, October). Data hiding for video-in-video. In Proceeding of the 1997 International Conference on Image Processing (ICIP \u201997), Santa Barbara, CA (Vol. 2, pp. 676-679).","DOI":"10.1109\/ICIP.1997.638586"},{"journal-title":"Digital video processing","year":"1995","author":"A. M.Tekalp","key":"jisp.2012100104-18"},{"key":"jisp.2012100104-19","doi-asserted-by":"crossref","unstructured":"Wang, Y., & Izquierdo, E. (2002, November 7-8). High-capacity data hiding in MPEG-2 compressed video. In Proceedings of the 9th International Workshop on Systems, Signals and Image Processing, Manchester, UK.","DOI":"10.1142\/9789812776266_0031"},{"key":"jisp.2012100104-20","doi-asserted-by":"crossref","unstructured":"Watson, A. B. (1993). DCT quantization matrices visually optimized for individual images. SPIE Proceedings of Human Vision, Visual Processing, and Digital Display IV, 1913, 1913-14.","DOI":"10.1117\/12.152694"},{"key":"jisp.2012100104-21","doi-asserted-by":"crossref","unstructured":"Westen, S. J. P., Lagendijk, R. L., & Biemond, J. (1995). Perceptual optimization of image coding algorithms. In Proceeding of International Conference on Image Processing (pp. 2069-2072).","DOI":"10.1109\/ICIP.1995.537417"},{"key":"jisp.2012100104-22","unstructured":"Yang, M., & Bourbakis, N. (2005, June). A high bitrate multimedia information hiding algorithm in DCT domain. In Proceedings of the 8th World Conference on Integrated Design and Process Technology (IDPT 2005), Beijing, China."},{"key":"jisp.2012100104-23","unstructured":"Yang, M., & Bourbakis, N. (2005, August 7-10). A high bitrate information hiding algorithm for digital video content under H.264\/AVC compression. In Proceedings of the IEEE International Midwest Symposium on Circuits and Systems (MWSCAS 2005), Cincinnati, OH."},{"key":"jisp.2012100104-24","doi-asserted-by":"publisher","DOI":"10.1109\/TBC.2009.2016491"},{"key":"jisp.2012100104-25","doi-asserted-by":"crossref","unstructured":"Yang, M., Li, S., & Bourbakis, N. (2004). Data-image-video encryption. IEEE Potentials Magazine, 28-34.","DOI":"10.1109\/MP.2004.1341784"},{"key":"jisp.2012100104-26","unstructured":"Zhang, W., Cheung, S., & Chen, M. (2005, Sept 11-14). Hiding privacy information in video surveillance system. In Proceedings of the International Conference on Image Processing 2005 (ICIP\u20192005) (Vol. 3, pp. 868-871)."}],"container-title":["International Journal of Information Security and Privacy"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=75323","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T21:59:44Z","timestamp":1745963984000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/jisp.2012100104"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2012,10,1]]},"references-count":27,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2012,10]]}},"URL":"https:\/\/doi.org\/10.4018\/jisp.2012100104","relation":{},"ISSN":["1930-1650","1930-1669"],"issn-type":[{"type":"print","value":"1930-1650"},{"type":"electronic","value":"1930-1669"}],"subject":[],"published":{"date-parts":[[2012,10,1]]}}}