Skip to main content

2017 | OriginalPaper | Buchkapitel

Intelligent Morphing and Steganography Techniques for Multimedia Security

verfasst von : Anant M. Bagade, Sanjay N. Talbar

Erschienen in: Intelligent Techniques in Signal Processing for Multimedia Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Data security plays an important role in today’s digital world. There is a potential need to do the research in the field of image morphing and steganography for data security. The development of morphing over the past years allows an organization into three categories of morphing algorithms namely geometric, interpolation and specialized algorithms depending upon the pixel mapping procedure. It gives an insight of how an appropriate morphing method is useful for different steganographic methods categorized into spatial domain, transform-based domain, spread spectrum, statistical and Internet Protocol. The geometric transformation morphing methods are more suitable in spatial domain steganography. This chapter includes the review of different morphing and steganography techniques. Hybrid approaches using morphing for steganography have a special status among steganographic systems as they combine both the features of morphing and steganography to overcome the shortcomings of individual methods.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Cohen-Or D, Solomovici A, Levin D (1998) Three-dimensional distance field metamorphosis. ACM Trans Graph 17(2):116–141CrossRef Cohen-Or D, Solomovici A, Levin D (1998) Three-dimensional distance field metamorphosis. ACM Trans Graph 17(2):116–141CrossRef
2.
Zurück zum Zitat Arad N, Dyn N, Reisfeld D, Yeshurun Y (1994) Image warping by radial basis functions: applications to facial expressions. J Graph Models Image Process 56(2):161–172CrossRef Arad N, Dyn N, Reisfeld D, Yeshurun Y (1994) Image warping by radial basis functions: applications to facial expressions. J Graph Models Image Process 56(2):161–172CrossRef
3.
Zurück zum Zitat Bagade AM, Talbar SN (2014) A review of image morphing techniques. Elixir Electr Eng J 70(2):24076–24079 Bagade AM, Talbar SN (2014) A review of image morphing techniques. Elixir Electr Eng J 70(2):24076–24079
4.
Zurück zum Zitat Kayarkar H, Sugata S (2012) A survey on various data hiding techniques and their comparative analysis. ACTA Techn Corviniensis 5(3):35–40 Kayarkar H, Sugata S (2012) A survey on various data hiding techniques and their comparative analysis. ACTA Techn Corviniensis 5(3):35–40
5.
Zurück zum Zitat Acharjee S, Chakraborty S, Samanta S, Azar AT, Hassanien AE, Dey N (2014) Highly secured multilayered motion vector watermarking. In: Advanced machine learning technologies and applications. Springer, pp 121–134 Acharjee S, Chakraborty S, Samanta S, Azar AT, Hassanien AE, Dey N (2014) Highly secured multilayered motion vector watermarking. In: Advanced machine learning technologies and applications. Springer, pp 121–134
6.
Zurück zum Zitat Fant KM (1986) A nonaliasing real-time spatial transform technique. IEEE Comput Graph Appl 6(1):71–80CrossRef Fant KM (1986) A nonaliasing real-time spatial transform technique. IEEE Comput Graph Appl 6(1):71–80CrossRef
7.
Zurück zum Zitat Wolberg G (1990) Digital image warping. IEEE Computer Society, Los Alamitos, pp 222–240 Wolberg G (1990) Digital image warping. IEEE Computer Society, Los Alamitos, pp 222–240
8.
Zurück zum Zitat Beier T, Neely S (1992) Feature-based image metamorphosis. Comput Graph 26(2):35–42CrossRef Beier T, Neely S (1992) Feature-based image metamorphosis. Comput Graph 26(2):35–42CrossRef
9.
Zurück zum Zitat Lee S, Wolberg G, Chwa K-Y, Shin SY (1996) Image metamorphosis with scattered feature constraints. IEEE Trans Vis Comput Graph 2(4):337–354CrossRef Lee S, Wolberg G, Chwa K-Y, Shin SY (1996) Image metamorphosis with scattered feature constraints. IEEE Trans Vis Comput Graph 2(4):337–354CrossRef
10.
Zurück zum Zitat Beier T, Costa B, Darsa L, Velho L (1977) Warping and morphing of graphics objects. Course notes siggraph Beier T, Costa B, Darsa L, Velho L (1977) Warping and morphing of graphics objects. Course notes siggraph
11.
Zurück zum Zitat Vlad A (2010) Image morphing techniques. JIDEG 5(1):25–28 Vlad A (2010) Image morphing techniques. JIDEG 5(1):25–28
12.
Zurück zum Zitat Klein R (1998) Multiresolution representation for surfaces meshes based on vertex decimation method. Comput Graph 22(1):13–26CrossRef Klein R (1998) Multiresolution representation for surfaces meshes based on vertex decimation method. Comput Graph 22(1):13–26CrossRef
13.
Zurück zum Zitat Lee AWF, Dobkin D, Sweldens W, Schröder P (1999) Multiresolution mesh morphing. Comput Graph Interact Techn 99:343–350 Lee AWF, Dobkin D, Sweldens W, Schröder P (1999) Multiresolution mesh morphing. Comput Graph Interact Techn 99:343–350
14.
Zurück zum Zitat Bookstein FL (1989) Principal warps: thin-plate splines and the decomposition of deformations. IEEE Trans Pattern Anal Mach Intell 2(6):567–585MATHCrossRef Bookstein FL (1989) Principal warps: thin-plate splines and the decomposition of deformations. IEEE Trans Pattern Anal Mach Intell 2(6):567–585MATHCrossRef
15.
Zurück zum Zitat Alexa M (2003) Differential coordinates for local mesh morphing and deformation. Vis Comp 105–114 Alexa M (2003) Differential coordinates for local mesh morphing and deformation. Vis Comp 105–114
16.
Zurück zum Zitat Lee W-S, Thalmann NM (1998) Head modeling from pictures and morphing in 3D with image metamorphosis based on triangulation modeling and motion capture techniques for virtual environments. In: Lecture notes in computer science, pp 254–267 Lee W-S, Thalmann NM (1998) Head modeling from pictures and morphing in 3D with image metamorphosis based on triangulation modeling and motion capture techniques for virtual environments. In: Lecture notes in computer science, pp 254–267
17.
Zurück zum Zitat Bremermann H (1976) Pattern recognition by deformable prototypes in structural stability, the theory of catastrophes and applications in the sciences. In: Springer notes in mathematics, vol 25. Springer, pp 15–57 Bremermann H (1976) Pattern recognition by deformable prototypes in structural stability, the theory of catastrophes and applications in the sciences. In: Springer notes in mathematics, vol 25. Springer, pp 15–57
18.
Zurück zum Zitat Bagade AM, Talbar SN (2010) Image morphing concept for secure transfer of image data contents over internet. J Comput Sci 6(9):987–992CrossRef Bagade AM, Talbar SN (2010) Image morphing concept for secure transfer of image data contents over internet. J Comput Sci 6(9):987–992CrossRef
19.
Zurück zum Zitat Sederberg TW, Greenwood E (1992) A physically based approach to 2D shape blending. Comput Graph 26(2):25–34CrossRef Sederberg TW, Greenwood E (1992) A physically based approach to 2D shape blending. Comput Graph 26(2):25–34CrossRef
20.
Zurück zum Zitat Shoemake K, Duff T (1992) Matrix animation and polar decomposition. In: Proceedings of graphics interface, pp 258–264 Shoemake K, Duff T (1992) Matrix animation and polar decomposition. In: Proceedings of graphics interface, pp 258–264
21.
Zurück zum Zitat Sederberg TW, Gao P, Wang G, Mu1 H (1993) 2D shape blending: an intrinsic solution to the vertex path problem. In: ACM computer graphics (proceedings of SIGGRAPH’93), pp 15–18 Sederberg TW, Gao P, Wang G, Mu1 H (1993) 2D shape blending: an intrinsic solution to the vertex path problem. In: ACM computer graphics (proceedings of SIGGRAPH’93), pp 15–18
22.
Zurück zum Zitat Zhang Y (1996) A fuzzy approach to digital image warping. IEEE Comput Graph Appl 16(4):34–41CrossRef Zhang Y (1996) A fuzzy approach to digital image warping. IEEE Comput Graph Appl 16(4):34–41CrossRef
23.
Zurück zum Zitat Palmer SD (1999) Vision science-photons to phenomenology. MIT Press, Cambridge, pp 171–185 Palmer SD (1999) Vision science-photons to phenomenology. MIT Press, Cambridge, pp 171–185
24.
Zurück zum Zitat Chen SE, Williams L (1993) View interpolation for image synthesis. In: (Proceedings of SIGGRAPH’93) computer graphics and interactive techniques, pp 279–288 Chen SE, Williams L (1993) View interpolation for image synthesis. In: (Proceedings of SIGGRAPH’93) computer graphics and interactive techniques, pp 279–288
25.
Zurück zum Zitat Seitz SM, Dyer CR (1996) View morphing: synthesizing 3D metamorphoses using image transforms. In: (Proceedings of SIGGRAPH’96), pp 21–30 Seitz SM, Dyer CR (1996) View morphing: synthesizing 3D metamorphoses using image transforms. In: (Proceedings of SIGGRAPH’96), pp 21–30
26.
Zurück zum Zitat Shum H-Y, He L-W (1999) Rendering with concentric mosaics. In: (Proceedings of SIGGRAPH’99), pp 299–306 Shum H-Y, He L-W (1999) Rendering with concentric mosaics. In: (Proceedings of SIGGRAPH’99), pp 299–306
27.
Zurück zum Zitat Endo T, Katayama A, Tamura H, Hirose M, Tanikawa T, Saito M (1998) Image-based walk-through system for large-scale scenes. In: Proceedings of VSMM’98, pp 269–274 Endo T, Katayama A, Tamura H, Hirose M, Tanikawa T, Saito M (1998) Image-based walk-through system for large-scale scenes. In: Proceedings of VSMM’98, pp 269–274
28.
Zurück zum Zitat Gong M, Yang Y-H (2001) Layered based morphing. Elsevier J Graph Models 63(1):45–59MATHCrossRef Gong M, Yang Y-H (2001) Layered based morphing. Elsevier J Graph Models 63(1):45–59MATHCrossRef
30.
Zurück zum Zitat Hughes JF (1992) Scheduled Fourier volume morphing. In: ACM Proceedings of SIGGRAPH’92, pp 43–46 Hughes JF (1992) Scheduled Fourier volume morphing. In: ACM Proceedings of SIGGRAPH’92, pp 43–46
31.
Zurück zum Zitat Cheung KK, Yu K, Kui K (1997) Volume invariant metamorphosis for solid and hollow rolled shape. Proc Shape Model 226–232 Cheung KK, Yu K, Kui K (1997) Volume invariant metamorphosis for solid and hollow rolled shape. Proc Shape Model 226–232
32.
Zurück zum Zitat Chen L-L, Wang GF, Hsiao K-A, Liang J (2003) Affective product shapes through image morphing. In: Proceedings of DPPI’03, pp 11–16 Chen L-L, Wang GF, Hsiao K-A, Liang J (2003) Affective product shapes through image morphing. In: Proceedings of DPPI’03, pp 11–16
33.
Zurück zum Zitat Kanai T, Suzuki H, Kimura F (2000) Metamorphosis of arbitrary triangular meshes. IEEE Comput Graph Appl 20(2):62–75CrossRef Kanai T, Suzuki H, Kimura F (2000) Metamorphosis of arbitrary triangular meshes. IEEE Comput Graph Appl 20(2):62–75CrossRef
34.
Zurück zum Zitat Dey N, Roy AB, Das A, Chaudhuri SS (2012) Stationary wavelet transformation based self-recovery of blind-watermark from electrocardiogram signal in wireless telecardiology. Recent Trends Comput Netw Distrib Syst Secur. Springer, Berlin, pp 347–357CrossRef Dey N, Roy AB, Das A, Chaudhuri SS (2012) Stationary wavelet transformation based self-recovery of blind-watermark from electrocardiogram signal in wireless telecardiology. Recent Trends Comput Netw Distrib Syst Secur. Springer, Berlin, pp 347–357CrossRef
35.
Zurück zum Zitat Dey N, Dey M, Mahata SK, Das A, Chaudhuri SS (2015) Tamper detection of electrocardiographic signal using watermarked bio-hash code in wireless cardiology. Int J Signal Imaging Syst Eng 8(1–2):46–58CrossRef Dey N, Dey M, Mahata SK, Das A, Chaudhuri SS (2015) Tamper detection of electrocardiographic signal using watermarked bio-hash code in wireless cardiology. Int J Signal Imaging Syst Eng 8(1–2):46–58CrossRef
36.
Zurück zum Zitat Gortler SJ, Grzeszczuk R, Szeliski R, Cohen MF (1996) The lumigraph. In: Proceedings of SIGGRAPH’96, pp 43–54 Gortler SJ, Grzeszczuk R, Szeliski R, Cohen MF (1996) The lumigraph. In: Proceedings of SIGGRAPH’96, pp 43–54
37.
Zurück zum Zitat Levoy M, Hanrahan P (1996) Light field rendering. In: Proceedings of SIGGRAPH’96, pp 31–42 Levoy M, Hanrahan P (1996) Light field rendering. In: Proceedings of SIGGRAPH’96, pp 31–42
38.
Zurück zum Zitat Wang L, Lin S, Lee S, Guo B, Shum H-Y (2005) Light field morphing using 2D features. IEEE Trans Vis Comput Graph 11(1) Wang L, Lin S, Lee S, Guo B, Shum H-Y (2005) Light field morphing using 2D features. IEEE Trans Vis Comput Graph 11(1)
39.
Zurück zum Zitat Zhang Z, Wang L, Guo B, Shum H-Y (2002) Feature-based light field morphing. ACM Trans Graph 21(3):457–464CrossRef Zhang Z, Wang L, Guo B, Shum H-Y (2002) Feature-based light field morphing. ACM Trans Graph 21(3):457–464CrossRef
40.
Zurück zum Zitat Chan C-K, Cheng LM (2004) Hiding data in images by simple LSB substitution. Elsevier J Pattern Recogn 37(3):469–474MATHCrossRef Chan C-K, Cheng LM (2004) Hiding data in images by simple LSB substitution. Elsevier J Pattern Recogn 37(3):469–474MATHCrossRef
41.
Zurück zum Zitat Yu L, Zhao Y, Ni R, Li T (2010) Improved adaptive LSB steganography based on chaos and genetic algorithm. EURASIP J Adv Signal Process 2010:1–6 Yu L, Zhao Y, Ni R, Li T (2010) Improved adaptive LSB steganography based on chaos and genetic algorithm. EURASIP J Adv Signal Process 2010:1–6
42.
Zurück zum Zitat Chang K-C, Huang PS, Tu T-M, Chang C-P (2008) A novel image steganographic method using tri-way pixel-value differencing. J Multimedia 3(2):37–44 Chang K-C, Huang PS, Tu T-M, Chang C-P (2008) A novel image steganographic method using tri-way pixel-value differencing. J Multimedia 3(2):37–44
43.
Zurück zum Zitat Liao X, Wen Q, Zhang J (2011) A steganographic method for digital images with four-pixel differencing and modified LSB substitution. Elsevier J Vis Commun Image Represent 22:1–8CrossRef Liao X, Wen Q, Zhang J (2011) A steganographic method for digital images with four-pixel differencing and modified LSB substitution. Elsevier J Vis Commun Image Represent 22:1–8CrossRef
44.
Zurück zum Zitat Yadollahpour A, Naimi HM (2009) Attack on LSB steganography in color and grayscale images using autocorrelation coefficients. Eur J Sci Res 31(2):172–183 Yadollahpour A, Naimi HM (2009) Attack on LSB steganography in color and grayscale images using autocorrelation coefficients. Eur J Sci Res 31(2):172–183
45.
Zurück zum Zitat Hsieh C-H, Zhao Q (2006) Image enhancement and image hiding based on linear image fusion. In: Ubiquitous intelligence and computing, Lecture notes in computer science, vol 4159, pp 806–815 Hsieh C-H, Zhao Q (2006) Image enhancement and image hiding based on linear image fusion. In: Ubiquitous intelligence and computing, Lecture notes in computer science, vol 4159, pp 806–815
46.
Zurück zum Zitat Bagade AM, Talbar SN (2014) A high quality steganographic method using morphing. KIPS J Inf Process Syst 10(2):256–270CrossRef Bagade AM, Talbar SN (2014) A high quality steganographic method using morphing. KIPS J Inf Process Syst 10(2):256–270CrossRef
47.
Zurück zum Zitat Yang C-H, Wang S-J (2006) Weighted bipartite graph for locating optimal LSB substitution for secret embedding. J Discrete Math Sci Cryptogr 9(1):152–154MathSciNetMATH Yang C-H, Wang S-J (2006) Weighted bipartite graph for locating optimal LSB substitution for secret embedding. J Discrete Math Sci Cryptogr 9(1):152–154MathSciNetMATH
48.
Zurück zum Zitat Wang Y, Moulin P (2008) Perfectly secure steganography: capacity, error exponents, and code constructions. IEEE Trans Inf Theory 54(6):2706–2722MathSciNetMATHCrossRef Wang Y, Moulin P (2008) Perfectly secure steganography: capacity, error exponents, and code constructions. IEEE Trans Inf Theory 54(6):2706–2722MathSciNetMATHCrossRef
49.
Zurück zum Zitat Zhang X (2010) Efficient data hiding with plus–minus one or two. IEEE Signal Process Lett 17(7):635–638CrossRef Zhang X (2010) Efficient data hiding with plus–minus one or two. IEEE Signal Process Lett 17(7):635–638CrossRef
50.
Zurück zum Zitat Liao X, Wen Q, Zhang J (2011) A steganographic method for digital images with four-pixel differencing and modified LSB substitution. Elsevier J Vis Commun Image Represent 22(1):1–8CrossRef Liao X, Wen Q, Zhang J (2011) A steganographic method for digital images with four-pixel differencing and modified LSB substitution. Elsevier J Vis Commun Image Represent 22(1):1–8CrossRef
51.
Zurück zum Zitat El-Emam NN (2007) Hiding a large amount of data with high security using steganography algorithm. J Comput Sci 3(4):223–232CrossRef El-Emam NN (2007) Hiding a large amount of data with high security using steganography algorithm. J Comput Sci 3(4):223–232CrossRef
52.
Zurück zum Zitat Wang C-M, Wu N-I, Tsai C-S, Hwang M-S (2007) A high quality steganographic method with pixel-value differencing and modulus function. J Syst Softw 1–8 Wang C-M, Wu N-I, Tsai C-S, Hwang M-S (2007) A high quality steganographic method with pixel-value differencing and modulus function. J Syst Softw 1–8
53.
Zurück zum Zitat Narayana S, Prasad G (2010) Two new approaches for secured image steganography using cryptographic techniques and type conversions. Signal Image Process Int J 1(2):60–73CrossRef Narayana S, Prasad G (2010) Two new approaches for secured image steganography using cryptographic techniques and type conversions. Signal Image Process Int J 1(2):60–73CrossRef
54.
Zurück zum Zitat Regalia PA (2008) Cryptographic secrecy of steganographic matrix embedding. IEEE Trans Inf Forensics Secur 3(4):786–791CrossRef Regalia PA (2008) Cryptographic secrecy of steganographic matrix embedding. IEEE Trans Inf Forensics Secur 3(4):786–791CrossRef
55.
Zurück zum Zitat Kharrazi M, Sencar HT, Memon N (2006) Improving steganalysis by fusion techniques: a case study with image steganography. Springer transactions on data hiding and multimedia security I, pp 123–137 Kharrazi M, Sencar HT, Memon N (2006) Improving steganalysis by fusion techniques: a case study with image steganography. Springer transactions on data hiding and multimedia security I, pp 123–137
56.
Zurück zum Zitat Manjunatha Reddy HS, Raja KB (2010) High capacity and security steganography using discrete wavelet transform. Int J Comput Sci Secur 3(6):462–472 Manjunatha Reddy HS, Raja KB (2010) High capacity and security steganography using discrete wavelet transform. Int J Comput Sci Secur 3(6):462–472
57.
Zurück zum Zitat Westfeld A (2001) F5—a steganographic algorithm. In: Proceedings of the 4th international workshop on information hiding, pp 289–302 Westfeld A (2001) F5—a steganographic algorithm. In: Proceedings of the 4th international workshop on information hiding, pp 289–302
58.
Zurück zum Zitat Hetzl S, Mutzel P (2005) A graph-theoretic approach to steganography. In: Lecture notes in computer science, pp 119–128 Hetzl S, Mutzel P (2005) A graph-theoretic approach to steganography. In: Lecture notes in computer science, pp 119–128
59.
Zurück zum Zitat Dey N, Das P, Roy AB, Das A, Chaudhuri SS (2012) DWT-DCT-SVD based intravascular ultrasound video watermarking. In: 2012 World congress information and communication technologies (WICT), pp 224–229 Dey N, Das P, Roy AB, Das A, Chaudhuri SS (2012) DWT-DCT-SVD based intravascular ultrasound video watermarking. In: 2012 World congress information and communication technologies (WICT), pp 224–229
60.
Zurück zum Zitat Dey N, Mukhopadhyay S, Das A, Chaudhuri SS (2012) Analysis of P-QRS-T components modified by blind watermarking technique within the electrocardiogram signal for authentication in wireless telecardiology using DWT. Int J Image Graph Signal Process 4(7) Dey N, Mukhopadhyay S, Das A, Chaudhuri SS (2012) Analysis of P-QRS-T components modified by blind watermarking technique within the electrocardiogram signal for authentication in wireless telecardiology using DWT. Int J Image Graph Signal Process 4(7)
61.
Zurück zum Zitat Dey N, Maji P, Das P, Biswas S, Das A, Chaudhuri SS (2013) Embedding of blink frequency in electrooculography signal using difference expansion based reversible watermarking technique. arXiv preprint arXiv:1304.2310 Dey N, Maji P, Das P, Biswas S, Das A, Chaudhuri SS (2013) Embedding of blink frequency in electrooculography signal using difference expansion based reversible watermarking technique. arXiv preprint arXiv:​1304.​2310
62.
Zurück zum Zitat Al-Ataby A, Al-Naima F (2010) A modified high capacity image steganography technique based on wavelet transform. Int Arab J Inf Technol 7(4):358–364 Al-Ataby A, Al-Naima F (2010) A modified high capacity image steganography technique based on wavelet transform. Int Arab J Inf Technol 7(4):358–364
63.
Zurück zum Zitat Upham D (1999) JSteg steganographic algorithm. Available on the internet ftp://ftp.funet.fi/pub/crypt/steganography Upham D (1999) JSteg steganographic algorithm. Available on the internet ftp://ftp.funet.fi/pub/crypt/steganography
64.
Zurück zum Zitat Provos N, Honeyman P (2003) Hide and Seek: an introduction to steganography. In: IEEE Computer Society, pp 32–44 Provos N, Honeyman P (2003) Hide and Seek: an introduction to steganography. In: IEEE Computer Society, pp 32–44
65.
Zurück zum Zitat Marvel LM, Boncelet CG, Retter CT (1999) Spread spectrum image steganography. IEEE Trans Image Process 8(8):1075–1083CrossRef Marvel LM, Boncelet CG, Retter CT (1999) Spread spectrum image steganography. IEEE Trans Image Process 8(8):1075–1083CrossRef
66.
Zurück zum Zitat Dey N, Mishra G, Nandi B, Pal M, Das A, Chaudhuri SS (2012) Wavelet based watermarked normal and abnormal heart sound identification using spectrogram analysis. In: IEEE international conference on computational intelligence and computing research (ICCIC), pp 1–7 Dey N, Mishra G, Nandi B, Pal M, Das A, Chaudhuri SS (2012) Wavelet based watermarked normal and abnormal heart sound identification using spectrogram analysis. In: IEEE international conference on computational intelligence and computing research (ICCIC), pp 1–7
67.
Zurück zum Zitat Dey N, Acharjee S, Biswas D, Das A, Chaudhuri SS (2013) Medical information embedding in compressed watermarked intravascular ultrasound video. arXiv preprint arXiv:1303.2211 Dey N, Acharjee S, Biswas D, Das A, Chaudhuri SS (2013) Medical information embedding in compressed watermarked intravascular ultrasound video. arXiv preprint arXiv:​1303.​2211
68.
Zurück zum Zitat Banerjee S, Chakraborty S, Dey N, Kumar Pal A, Ray R (2015) High payload watermarking using residue number system. Int J Image Graph Signal Process 7(3):1–8CrossRef Banerjee S, Chakraborty S, Dey N, Kumar Pal A, Ray R (2015) High payload watermarking using residue number system. Int J Image Graph Signal Process 7(3):1–8CrossRef
69.
Zurück zum Zitat Dey N, Samanta S, Yang XS, Das A, Chaudhuri SS (2013) Optimisation of scaling factors in electrocardiogram signal watermarking using cuckoo search. Int J Bio-Inspired Comput 5(5):315–332CrossRef Dey N, Samanta S, Yang XS, Das A, Chaudhuri SS (2013) Optimisation of scaling factors in electrocardiogram signal watermarking using cuckoo search. Int J Bio-Inspired Comput 5(5):315–332CrossRef
70.
Zurück zum Zitat Provos N (2001) Defending against statistical steganalysis. In: Proceedings of the 10th conference on USENIX security symposium, vol 10, pp 24–24 Provos N (2001) Defending against statistical steganalysis. In: Proceedings of the 10th conference on USENIX security symposium, vol 10, pp 24–24
71.
Zurück zum Zitat Pal AK, Das P, Dey N (2013) Odd–even embedding scheme based modified reversible watermarking technique using Blueprint. arXiv preprint arXiv:1303.5972 Pal AK, Das P, Dey N (2013) Odd–even embedding scheme based modified reversible watermarking technique using Blueprint. arXiv preprint arXiv:​1303.​5972
72.
Zurück zum Zitat Sallee P (2004) Model-based steganography. Springer, IWDW, digital watermarking, pp 154–167 Sallee P (2004) Model-based steganography. Springer, IWDW, digital watermarking, pp 154–167
73.
Zurück zum Zitat Solanki K, Sullivan K, Madhow U, Manjunath BS, Chandrasekaran S (2005) Statistical restoration for robust and secure steganography. In: IEEE international conference on image processing, vol 2, pp II-1118–II-1121 Solanki K, Sullivan K, Madhow U, Manjunath BS, Chandrasekaran S (2005) Statistical restoration for robust and secure steganography. In: IEEE international conference on image processing, vol 2, pp II-1118–II-1121
74.
Zurück zum Zitat Keanini T (2005) Protecting TCP IP. Elsevier J Netw Secur 2005:13–16CrossRef Keanini T (2005) Protecting TCP IP. Elsevier J Netw Secur 2005:13–16CrossRef
75.
Zurück zum Zitat Murdoch SJ, Lewis S (2005) Embedding covert channel in TCP/IP. In: Lecture notes in computer science, vol 3727, pp 247–261 Murdoch SJ, Lewis S (2005) Embedding covert channel in TCP/IP. In: Lecture notes in computer science, vol 3727, pp 247–261
76.
Zurück zum Zitat Bagade AM, Talba SN (2014) Secure transmission of morphed stego keys over Internet using IP steganography. Int J Inf Comput Secur 6(2):133–142 Bagade AM, Talba SN (2014) Secure transmission of morphed stego keys over Internet using IP steganography. Int J Inf Comput Secur 6(2):133–142
77.
Zurück zum Zitat Ahsan K, Kundur D (2002) Covert channel analysis and data hiding in TCP/IP. M.A.Sc. thesis, Deptartment of Electrical and Computer Engineering, University of Toronto Ahsan K, Kundur D (2002) Covert channel analysis and data hiding in TCP/IP. M.A.Sc. thesis, Deptartment of Electrical and Computer Engineering, University of Toronto
78.
Zurück zum Zitat Ahsan K, Kundur D (2006) Practical data hiding in TCP/IP. In: Proceedings of workshop on multimedia security at ACM multimedia Ahsan K, Kundur D (2006) Practical data hiding in TCP/IP. In: Proceedings of workshop on multimedia security at ACM multimedia
79.
Zurück zum Zitat Panajotov B, Aleksanda M (2013) Covert channel in TCP/IP protocol stack. In: ICT innovations web proceedings, pp 190–199 Panajotov B, Aleksanda M (2013) Covert channel in TCP/IP protocol stack. In: ICT innovations web proceedings, pp 190–199
80.
Zurück zum Zitat Bellovin SM (2004) A look back at security problems in TCP/IP protocol suite. In: Proceedings of the 20th annual computer security applications, pp 229–249 Bellovin SM (2004) A look back at security problems in TCP/IP protocol suite. In: Proceedings of the 20th annual computer security applications, pp 229–249
Metadaten
Titel
Intelligent Morphing and Steganography Techniques for Multimedia Security
verfasst von
Anant M. Bagade
Sanjay N. Talbar
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-44790-2_3