Abstract
Multimedia security has advanced tremendously over the decades due to the change in variety and volume of data. In the current security context, intelligent systems for multimedia security are very much in demand. Various applications such as biometric, e-commerce, medical imaging, forensics, aerospace, and defense require high-end data security systems. Conventional cryptography, watermarking, and steganography fall in short to provide security for high-resolution 2D/3D image and high-definition video. Persistent demand exists for designing new security algorithms for 3D graphics, animations, and HD videos. Traditional encryption method does not suffice the current need, as its securing ability is limited when it gets decoded. Steganography techniques are reported for securing text, audio, and video content, but observed to be few in number compared to image steganography techniques. Watermarking techniques for securing video content, text, and animations are reported in the literature but seem to be few in numbers as compared to image watermarking techniques. Majority of the literature is observed to apply digital watermarking as security means for video and image data. However, digital watermarking for 3D graphics is a current research topic. On the other hand, video watermarking techniques shall be broadly classified based on domain and human perception. Usually, video watermarking techniques do not alter video contents. But current trend shows that security techniques are designed based on video content. This kind of security methods is claimed to be far superior as they concentrate not only on watermarking but also on synchronization of watermark. In this chapter, we present a comprehensive review of multimedia security techniques emphasizing on their applicability, scope, and shortcomings especially when applied to high-definition multimedia data. Problematic issues of intelligent techniques in signal processing for multimedia security and outlook for the future research are discussed too. The major goal of the paper was to provide a comprehensive reference source for the researchers involved in designing multimedia security technique, regardless of particular application areas.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Dey N, Das P, Roy AB, Das A, Chaudhuri SS (2012) DWT-DCT-SVD based intravascular ultrasound video watermarking. In: 2012 World congress on information and communication technologies (WICT). IEEE, pp 224–229
Dey N, Mukhopadhyay S, Das A, Chaudhuri SS (2012) Analysis of P-QRS-T components modified by blind watermarking technique within the electrocardiogram signal for authentication in wireless telecardiology using DWT. Int J Image Graph Signal Process 4(7):33
Dey N, Maji P, Das P, Biswas S, Das A, Chaudhuri SS (2013) An edge based blind watermarking technique of medical images without devalorizing diagnostic parameters. In: 2013 International conference on advances in technology and engineering (ICATE), IEEE, pp 1–5
Dey N, Biswas S, Roy AB, Das A, Chowdhuri SS (2013) Analysis of photoplethysmographic signals modified by reversible watermarking technique using prediction-error in wireless telecardiology. International conference on intelligent infrastructure the 47th annual national convention at Computer Society of India
Chakraborty S, Samanta S, Biswas D, Dey N, Chaudhuri SS (2013) Particle swarm optimization based parameter optimization technique in medical information hiding. In: 2013 IEEE International conference on computational intelligence and computing research (ICCIC). IEEE, pp 1–6
Dey N, Das P, Chaudhuri SS, Das A (2012) Feature analysis for the blind-watermarked electroencephalogram signal in wireless telemonitoring using Alattar’s method. In: Proceedings of the fifth international conference on security of information and networks. ACM, pp 87–94
Dey N, Biswas S, Das P, Das A, Chaudhuri SS (2012) Feature analysis for the reversible watermarked electrooculography signal using low distortion prediction-error expansion. In: 2012 International conference on communications, devices and intelligent systems (CODIS). IEEE, pp 624–627
Dey N, Biswas S, Das P, Das A, Chaudhuri SS (2012) Feature analysis for the reversible watermarked electrooculography signal using low distortion prediction-error expansion. In: 2012 International conference on communications, devices and intelligent systems (CODIS). IEEE, pp 624–627
Chakraborty S, Maji P, Pal AK, Biswas D, Dey N (2014) Reversible color image watermarking using trigonometric functions. In: 2014 International conference on electronic systems, signal processing and computing technologies (ICESC). IEEE, pp 105–110
Chen WY, Huang SY (2000) Digital watermarking using DCT transformation. Department of Electronic Engineering, National ChinYi Institute of Technology, Taichung
Chopra D, Gupta P, Sanjay G, Gupta A (2012) LSB based digital image watermarking for gray scale image. IOSR J Comput Eng (IOSRJCE). ISSN:2278-0661
Kaur G, Kaur K (2013) Implementing LSB on Image Watermarking using text and image. Int J Adv Res Comput Commun Eng. ISSN:2319-5940
Sharma PK (2012) Rajni, “Information security through Image watermarking using Least Significant Bit Algorithm,”. Comput Sci Inf Technol 2(2):61–67
Gajriya LR, Tiwari M, Singh J (2011) “Correlation based watermarking technique-threshold based extraction,”. Int J Emerg Technol 2(2):80–83
Awasthi M, Lodhi H (2013) Robust image watermarking based on discrete wavelet transform, discrete cosine transform & singular value decomposition. Adv Electr Electron Eng 3(8):971–976
Narang M, Vashisth S (2013) Digital watermarking using discrete wavelet transform. Int J Comput Appl 74(20)
Singh AP, Mishra A (2011) Wavelet based watermarking on digital image. Indian J Comput Sci Eng 1(2), 86–91
Kashyap N, Sinha GR (2012) Image watermarking using 2-level DWT. Adv Comput Res 4(1):42–45
Kaushik AK (2012) A novel approach for digital watermarking of an image using DFT. Int J Electron Comput Sci Eng 1(1):35–41
Marjuni A, Fauzi MFA, Logeswaran R, Heng SH (2013) An improved DCT-based image watermarking scheme using fast Walsh Hadamard transform. Int J Comput Electr Eng 5(3):271
Dhar PK, Kim JM (2011) Digital watermarking scheme based on fast Fourier transformation for audio copyright protection. Int J Secur Appl 5(2):33–48
Dhar PK, Khan MI, Jong-Myon K (2010) A new audio watermarking system using discrete fourier transform for copyright protection. Int J Comput Sci Netw Secur 6:35–40
Lei B, Soon Y, Zhou F, Li Z, Lei H (2012) A robust audio watermarking scheme based on lifting wavelet transform and singular value decomposition. Sig Process 92(9):1985–2001
Arnold M (2000) Audio watermarking: features, applications, and algorithms. In: IEEE international conference on multimedia and expo (II), pp 1013–1016
Doerr G, Dugelay JL (2003) A guide tour of video watermarking. Signal Process Image Commun 18(4):263–282
Jaseena KU, John A (2011) Text watermarking using combined image and text for authentication and protection. Int J Comput Appl 20(4):8–13
Jaseena KU, John A (2011) An invisible zero watermarking algorithm using combined image and text for protecting text documents. Int J Comput Sci Eng 3(6):2265–2272
Jalil Z, Jaffar MA, Mirza AM (2011) A novel text watermarking algorithm using image watermark. Int J Innov Comput Inf Control 7(3)
Gupta S, Gujral G, Aggarwal N (2012) Enhanced least significant bit algorithm for image steganography. IJCEM Int J Comput Eng Manag 15(4):40–42
Banik B (2013) A DWT Method for image steganography. Int J Adv Res Comput Sci Softw Eng 3(6):983–989
Nag A, Biswas S, Sarkar D, Sarkar PP (2011) A novel technique for image steganography based on DWT and Huffman encoding. Int J Comput Sci Secur 4(6):497–610
Ghoshal N, Mandal JK (2012) Image authentication technique in frequency domain based on discrete Fourier transformation (IATFDDFT). arXiv:1212.3371
Bansal D, Chhikara R (2014) An improved DCT based steganography technique. Int J Comput Appl 102(14)
Kaur B, Kaur A, Singh J (2011) Steganographic approach for hiding image in DCT domain. Int J Adv Eng Technol 1(3):72
Patel BK, Pathak M (2014) Survey on cryptography algorithms. Int J Innov Technol 4(7)
Elminaam DSA, Kader HMA, Hadhoud MM (2008) Performanceevaluation of symmetric encryption algorithms. IJCSNS Int J Comput Sci Netw Secur 8(12):280286
Patel KD, Belani S (2011) Image encryption using different techniques: a review. Int J Emerg Technol Adv Eng 1(1):30–34
Mitali VK, Sharma A (2014) A survey on various cryptography techniques. Int J Emerg Trends Technol Comput Sci 3(4):6
Devi KJ (2013) A sesure image steganography using LSB technique and pseudo random encoding technique. Doctoral dissertation. National Institute of Technology-Rourkela
Kaur M, Mahajan K (2015) An existential review on text watermarking techniques. Int J Comput Appl 120(18)
Dey N, Roy AB, Dey S (2012) A novel approach of color image hiding using RGB color planes and DWT. arXiv:1208.0803
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Desai, S.D., Pudakalakatti, N.R., Baligar, V.P. (2017). A Survey on Intelligent Security Techniques for High-Definition Multimedia Data. In: Dey, N., Santhi, V. (eds) Intelligent Techniques in Signal Processing for Multimedia Security. Studies in Computational Intelligence, vol 660. Springer, Cham. https://doi.org/10.1007/978-3-319-44790-2_2
Download citation
DOI: https://doi.org/10.1007/978-3-319-44790-2_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-44789-6
Online ISBN: 978-3-319-44790-2
eBook Packages: EngineeringEngineering (R0)