Skip to main content
Erschienen in:
Buchtitelbild

2017 | OriginalPaper | Buchkapitel

Security of Multimedia Contents: A Brief

verfasst von : Amira S. Ashour, Nilanjan Dey

Erschienen in: Intelligent Techniques in Signal Processing for Multimedia Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Through the past few years, an explosion in the use of digital media has been increased. A new infrastructure of digital audio, image, animation, video recorders/players, electronic commerce, and online services are speedily being deployed. These multimedia forms are applied for further transmission between users in the various applications through the Web or wireless communication that leads to security threats. Generally, the multimedia authenticity/security solution is based on using hiding techniques including digital watermarking and cryptography. This chapter introduced an extensive brief overview of the multimedia security problem in the prevailing research work in the various applications. It provided evolution of the different hiding techniques along with their properties and requirements. Finally, some challenges are addressed for future research direction.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Qiao L (1998) Multimedia security and copyright protection. Ph.D. Thesis, University of Illinois at Urbana-Champaign Qiao L (1998) Multimedia security and copyright protection. Ph.D. Thesis, University of Illinois at Urbana-Champaign
2.
Zurück zum Zitat Dey N, Biswas S, Das P, Das A, Chaudhuri SS (2012) Feature analysis for the reversible watermarked electrooculography signal using low distortion prediction-error expansion. In: 2012 International conference communications, devices and intelligent systems (Codis), pp 624–27 Dey N, Biswas S, Das P, Das A, Chaudhuri SS (2012) Feature analysis for the reversible watermarked electrooculography signal using low distortion prediction-error expansion. In: 2012 International conference communications, devices and intelligent systems (Codis), pp 624–27
3.
Zurück zum Zitat Dey N, Maji P, Das P, Biswas S, Das A, Chaudhuri S (2012) Embedding of blink frequency in electrooculography signal using difference expansion based reversible watermarking technique. Buletinul Ştiinţific Al Universităţii “Politehnica” Din Timişoara, Seria Electronică Şi Telecomunicaţii Transactions on Electronics and Communications 57(71) Dey N, Maji P, Das P, Biswas S, Das A, Chaudhuri S (2012) Embedding of blink frequency in electrooculography signal using difference expansion based reversible watermarking technique. Buletinul Ştiinţific Al Universităţii “Politehnica” Din Timişoara, Seria Electronică Şi Telecomunicaţii Transactions on Electronics and Communications 57(71)
4.
Zurück zum Zitat Dey N, Biswas D, Roy A, Das A (2012) DWT-DCT-SVD based blind watermarking technique of gray image in electrooculogram signal. In: 2012 12th international conference on intelligent systems design and applications (ISDA), pp 680–685 Dey N, Biswas D, Roy A, Das A (2012) DWT-DCT-SVD based blind watermarking technique of gray image in electrooculogram signal. In: 2012 12th international conference on intelligent systems design and applications (ISDA), pp 680–685
5.
Zurück zum Zitat Dey N, Mukhopadhyay S, Das A, Chaudhuri S (2012) Analysis of P-QRS-T components modified by blind watermarking technique within the electrocardiogram signal for authentication in wireless telecardiology using DWT. Int J Image Graph Signal Process (IJIGSP) 7:33–46CrossRef Dey N, Mukhopadhyay S, Das A, Chaudhuri S (2012) Analysis of P-QRS-T components modified by blind watermarking technique within the electrocardiogram signal for authentication in wireless telecardiology using DWT. Int J Image Graph Signal Process (IJIGSP) 7:33–46CrossRef
6.
Zurück zum Zitat Nandi S, Roy S, Dansana J, Karaa WB, Ray R, Chowdhury SR, Chakraborty S, Dey N (2014) Cellular automata based encrypted ECG-hash code generation: an application in inter human biometric authentication system. Int J Comput Netw Inf Secur 6(11):1 Nandi S, Roy S, Dansana J, Karaa WB, Ray R, Chowdhury SR, Chakraborty S, Dey N (2014) Cellular automata based encrypted ECG-hash code generation: an application in inter human biometric authentication system. Int J Comput Netw Inf Secur 6(11):1
7.
Zurück zum Zitat Kumari G, Kumar B, Sumalatha L, Krishna V (2009) Secure and robust digital watermarking on grey level images. Int J Adv Sci Technol 11 Kumari G, Kumar B, Sumalatha L, Krishna V (2009) Secure and robust digital watermarking on grey level images. Int J Adv Sci Technol 11
8.
Zurück zum Zitat Miyazaki A, Okamoto A (2002) Analysis and improvement of correlation-based watermarking methods for digital images. Kyushu University Miyazaki A, Okamoto A (2002) Analysis and improvement of correlation-based watermarking methods for digital images. Kyushu University
9.
Zurück zum Zitat Jin C, Zhang X, Chao Y, Xu H (2008) Behavior authentication technology using digital watermark. In: International conference on multimedia and information technology (MMIT ‘08), pp 7–10 Jin C, Zhang X, Chao Y, Xu H (2008) Behavior authentication technology using digital watermark. In: International conference on multimedia and information technology (MMIT ‘08), pp 7–10
10.
Zurück zum Zitat Jin C, Wang S, Jin S, Zhang Q, Ye J (2009) Robust digital watermark technique for copyright protection. In: International symposium on information engineering and electronic commerce (IEEC ‘09), pp 237–240 Jin C, Wang S, Jin S, Zhang Q, Ye J (2009) Robust digital watermark technique for copyright protection. In: International symposium on information engineering and electronic commerce (IEEC ‘09), pp 237–240
11.
Zurück zum Zitat Pan W, Coatrieux G, Cuppens-Boulahia N, Cuppens F, Roux C (2010) Watermarking to enforce medical image access and usage control policy. In: 2010 sixth international conference on signal-image technology and internet-based systems (SITIS), pp 251–260 Pan W, Coatrieux G, Cuppens-Boulahia N, Cuppens F, Roux C (2010) Watermarking to enforce medical image access and usage control policy. In: 2010 sixth international conference on signal-image technology and internet-based systems (SITIS), pp 251–260
12.
Zurück zum Zitat Li M, Narayanan S, Poovendran R (2004) Tracing medical images using multi-band watermarks. In: 26th conference of the IEEE annual international engineering in medicine and biology society (IEMBS ‘04), vol 2, pp 3233–3236 Li M, Narayanan S, Poovendran R (2004) Tracing medical images using multi-band watermarks. In: 26th conference of the IEEE annual international engineering in medicine and biology society (IEMBS ‘04), vol 2, pp 3233–3236
13.
Zurück zum Zitat Kishore P, Venkatram N, Sarvya C, Reddy L (2014) Medical image watermarking using RSA encryption in wavelet domain. In: 2014 First international conference on networks & soft computing (ICNSC), pp 258–262 Kishore P, Venkatram N, Sarvya C, Reddy L (2014) Medical image watermarking using RSA encryption in wavelet domain. In: 2014 First international conference on networks & soft computing (ICNSC), pp 258–262
14.
Zurück zum Zitat Petitcolas FAP, Anderson RJ, Kuhn MG (1999) Information hiding—a survey. In: Proceedings of IEEE, pp 1062–1078 Petitcolas FAP, Anderson RJ, Kuhn MG (1999) Information hiding—a survey. In: Proceedings of IEEE, pp 1062–1078
15.
Zurück zum Zitat Hartung F, Kutter M (1999) Multimedia watermarking techniques. In: Proceedings of IEEE, pp 1079–1107 Hartung F, Kutter M (1999) Multimedia watermarking techniques. In: Proceedings of IEEE, pp 1079–1107
16.
Zurück zum Zitat Dey N, Nandi B, Das P, Das A, Chaudhuri SS (2013) Retention of electrocardioGram features insiGnificantly devalorized as an effect of watermarkinG for. Advances in biometrics for secure human authentication and recognition, 175 Dey N, Nandi B, Das P, Das A, Chaudhuri SS (2013) Retention of electrocardioGram features insiGnificantly devalorized as an effect of watermarkinG for. Advances in biometrics for secure human authentication and recognition, 175
17.
Zurück zum Zitat Biswas S, Roy AB, Ghosh K, Dey N (2012) A biometric authentication based secured ATM banking system. Int J Adv Res Comput Sci Softw Eng, ISSN, 2277 Biswas S, Roy AB, Ghosh K, Dey N (2012) A biometric authentication based secured ATM banking system. Int J Adv Res Comput Sci Softw Eng, ISSN, 2277
18.
Zurück zum Zitat Bose S, Chowdhury SR, Sen C, Chakraborty S, Redha T, Dey N (2014) Multi-thread video watermarking: a biomedical application. In: 2014 International conference on circuits, communication, control and computing (I4C). IEEE, pp 242–246 Bose S, Chowdhury SR, Sen C, Chakraborty S, Redha T, Dey N (2014) Multi-thread video watermarking: a biomedical application. In: 2014 International conference on circuits, communication, control and computing (I4C). IEEE, pp 242–246
19.
Zurück zum Zitat Bose S, Chowdhury SR, Chakraborty S, Acharjee S, Dey N (2014) Effect of watermarking in vector quantization based image compression. In 2014 International conference on control, instrumentation, communication and computational technologies (ICCICCT). IEEE, pp 503–508 Bose S, Chowdhury SR, Chakraborty S, Acharjee S, Dey N (2014) Effect of watermarking in vector quantization based image compression. In 2014 International conference on control, instrumentation, communication and computational technologies (ICCICCT). IEEE, pp 503–508
20.
Zurück zum Zitat Dey N, Samanta S, Yang XS, Das A, Chaudhuri SS (2013) Optimisation of scaling factors in electrocardiogram signal watermarking using cuckoo search. Int J Bio-Inspired Comput 5(5):315–326CrossRef Dey N, Samanta S, Yang XS, Das A, Chaudhuri SS (2013) Optimisation of scaling factors in electrocardiogram signal watermarking using cuckoo search. Int J Bio-Inspired Comput 5(5):315–326CrossRef
21.
Zurück zum Zitat Dey N, Mukhopadhyay S, Das A, Chaudhuri SS (2012) Analysis of P-QRS-T components modified by blind watermarking technique within the electrocardiogram signal for authentication in wireless telecardiology using DWT. Int J Image Graph Signal Process 4(7):33CrossRef Dey N, Mukhopadhyay S, Das A, Chaudhuri SS (2012) Analysis of P-QRS-T components modified by blind watermarking technique within the electrocardiogram signal for authentication in wireless telecardiology using DWT. Int J Image Graph Signal Process 4(7):33CrossRef
22.
Zurück zum Zitat Dey N, Maji P, Das P, Biswas S, Das A, Chaudhuri SS (2013) An edge based blind watermarking technique of medical images without devalorizing diagnostic parameters. In: 2013 international conference on advances in technology and engineering (ICATE). IEEE, pp 1–5 Dey N, Maji P, Das P, Biswas S, Das A, Chaudhuri SS (2013) An edge based blind watermarking technique of medical images without devalorizing diagnostic parameters. In: 2013 international conference on advances in technology and engineering (ICATE). IEEE, pp 1–5
23.
Zurück zum Zitat Chakraborty S, Samanta S, Biswas D, Dey N, Chaudhuri SS (2013) Particle swarm optimization based parameter optimization technique in medical information hiding. In: 2013 IEEE international conference on computational intelligence and computing research (ICCIC). IEEE, pp 1–6 Chakraborty S, Samanta S, Biswas D, Dey N, Chaudhuri SS (2013) Particle swarm optimization based parameter optimization technique in medical information hiding. In: 2013 IEEE international conference on computational intelligence and computing research (ICCIC). IEEE, pp 1–6
24.
Zurück zum Zitat Dey N, Biswas S, Das P, Das A, Chaudhuri SS (2012) Lifting wavelet transformation based blind watermarking technique of photoplethysmographic signals in wireless telecardiology. In: 2012 World congress on information and communication technologies (WICT). IEEE, pp 230–235 Dey N, Biswas S, Das P, Das A, Chaudhuri SS (2012) Lifting wavelet transformation based blind watermarking technique of photoplethysmographic signals in wireless telecardiology. In: 2012 World congress on information and communication technologies (WICT). IEEE, pp 230–235
25.
Zurück zum Zitat Dey N, Pal M, Das A (2012) A session based watermarking technique within the NROI of retinal fundus images for authencation using DWT, spread spectrum and Harris corner detection. Int J Mod Eng Res 2(3):749–757 Dey N, Pal M, Das A (2012) A session based watermarking technique within the NROI of retinal fundus images for authencation using DWT, spread spectrum and Harris corner detection. Int J Mod Eng Res 2(3):749–757
26.
Zurück zum Zitat Dey N, Samanta S, Chakraborty S, Das A, Chaudhuri SS, Suri JS (2014) Firefly algorithm for optimization of scaling factors during embedding of manifold medical information: an application in ophthalmology imaging. J Med Imaging Health Inform 4(3):384–394CrossRef Dey N, Samanta S, Chakraborty S, Das A, Chaudhuri SS, Suri JS (2014) Firefly algorithm for optimization of scaling factors during embedding of manifold medical information: an application in ophthalmology imaging. J Med Imaging Health Inform 4(3):384–394CrossRef
27.
Zurück zum Zitat Chakraborty S, Maji P, Pal AK, Biswas D, Dey N (2014) Reversible color image watermarking using trigonometric functions. In: 2014 International conference on electronic systems, signal processing and computing technologies (ICESC). IEEE, pp 105–110 Chakraborty S, Maji P, Pal AK, Biswas D, Dey N (2014) Reversible color image watermarking using trigonometric functions. In: 2014 International conference on electronic systems, signal processing and computing technologies (ICESC). IEEE, pp 105–110
28.
Zurück zum Zitat Braudaway GW, Magerlein KA, Mintzer F (1996) Protecting publicly-available images with a visible image watermark. In: SPIE conference on optical security and counterfeit deterrence techniques, vol 2659, pp 126–133 Braudaway GW, Magerlein KA, Mintzer F (1996) Protecting publicly-available images with a visible image watermark. In: SPIE conference on optical security and counterfeit deterrence techniques, vol 2659, pp 126–133
29.
Zurück zum Zitat Jain AK (1989) Fundamentals of digital image processing. Prentice Hall, Upper Saddle RiverMATH Jain AK (1989) Fundamentals of digital image processing. Prentice Hall, Upper Saddle RiverMATH
30.
Zurück zum Zitat Meng J, Chang S-F (1998) Embedding visible video watermarks in the compressed domain. In: International conference on image processing (ICIP) Meng J, Chang S-F (1998) Embedding visible video watermarks in the compressed domain. In: International conference on image processing (ICIP)
31.
Zurück zum Zitat Serdean C (2002) Spread spectrum-based video watermarking algorithms for copyright protection. Ph.D. thesis, University of Plymouth Serdean C (2002) Spread spectrum-based video watermarking algorithms for copyright protection. Ph.D. thesis, University of Plymouth
32.
Zurück zum Zitat Cox I, Miller M, Bloom J, Fridrich J, Kalker T (2007) Digital watermarking and steganography. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA. ISBN: 978-0123725851 Cox I, Miller M, Bloom J, Fridrich J, Kalker T (2007) Digital watermarking and steganography. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA. ISBN: 978-0123725851
33.
Zurück zum Zitat Yang H, Kot AC (2007) Pattern-based data hiding for binary image authentication by connectivity-preserving. IEEE Trans Multimed 9(3):475–486CrossRef Yang H, Kot AC (2007) Pattern-based data hiding for binary image authentication by connectivity-preserving. IEEE Trans Multimed 9(3):475–486CrossRef
34.
Zurück zum Zitat Venkatesan M, MeenakshiDevi P, Duraiswamy K, Thyagarajah K (2008) Secure authentication watermarking for binary images using pattern matching. IJCSNS Int J Comput Sci Netw Secur 8(2):241–250 Venkatesan M, MeenakshiDevi P, Duraiswamy K, Thyagarajah K (2008) Secure authentication watermarking for binary images using pattern matching. IJCSNS Int J Comput Sci Netw Secur 8(2):241–250
35.
Zurück zum Zitat Jung KH, Yoo KY (2009) Data hiding method with quality control for binary images. J Softw Eng Appl 2(1):20CrossRef Jung KH, Yoo KY (2009) Data hiding method with quality control for binary images. J Softw Eng Appl 2(1):20CrossRef
36.
Zurück zum Zitat Wu M, Hong HY, Gelman A (1999). Multi-level data hiding for digital image and video. In: Photonics East’99. International society for optics and photonics, pp 10–21 Wu M, Hong HY, Gelman A (1999). Multi-level data hiding for digital image and video. In: Photonics East’99. International society for optics and photonics, pp 10–21
37.
Zurück zum Zitat Min WU, Heather Y, Bede L (2003) Data hiding in image and video: part II—designs and applications. IEEE Trans Image Process 12(6):696–705CrossRef Min WU, Heather Y, Bede L (2003) Data hiding in image and video: part II—designs and applications. IEEE Trans Image Process 12(6):696–705CrossRef
38.
Zurück zum Zitat Paruchuri JK, Cheung SCS (2008) Joint optimization of data hiding and video compression. In: IEEE International symposium on circuits and systems, 2008. ISCAS 2008. IEEE, pp 3021–3024 Paruchuri JK, Cheung SCS (2008) Joint optimization of data hiding and video compression. In: IEEE International symposium on circuits and systems, 2008. ISCAS 2008. IEEE, pp 3021–3024
39.
Zurück zum Zitat Naseem M, Hussain IM, Khan MK, Ajmal A (2011) An optimum modified bit plane splicing LSB algorithm for secret data hiding. Int J Comput Appl (0975–8887), 29(12) Naseem M, Hussain IM, Khan MK, Ajmal A (2011) An optimum modified bit plane splicing LSB algorithm for secret data hiding. Int J Comput Appl (0975–8887), 29(12)
40.
Zurück zum Zitat Dey S, Abraham A, Sanyal S (2007) An LSB data hiding technique using prime numbers. In: Third international symposium on information assurance and security, 2007. IAS 2007, pp 101–108 Dey S, Abraham A, Sanyal S (2007) An LSB data hiding technique using prime numbers. In: Third international symposium on information assurance and security, 2007. IAS 2007, pp 101–108
Metadaten
Titel
Security of Multimedia Contents: A Brief
verfasst von
Amira S. Ashour
Nilanjan Dey
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-44790-2_1