Skip to main content

A Survey on Intelligent Security Techniques for High-Definition Multimedia Data

  • Chapter
  • First Online:
Intelligent Techniques in Signal Processing for Multimedia Security

Part of the book series: Studies in Computational Intelligence ((SCI,volume 660))

Abstract

Multimedia security has advanced tremendously over the decades due to the change in variety and volume of data. In the current security context, intelligent systems for multimedia security are very much in demand. Various applications such as biometric, e-commerce, medical imaging, forensics, aerospace, and defense require high-end data security systems. Conventional cryptography, watermarking, and steganography fall in short to provide security for high-resolution 2D/3D image and high-definition video. Persistent demand exists for designing new security algorithms for 3D graphics, animations, and HD videos. Traditional encryption method does not suffice the current need, as its securing ability is limited when it gets decoded. Steganography techniques are reported for securing text, audio, and video content, but observed to be few in number compared to image steganography techniques. Watermarking techniques for securing video content, text, and animations are reported in the literature but seem to be few in numbers as compared to image watermarking techniques. Majority of the literature is observed to apply digital watermarking as security means for video and image data. However, digital watermarking for 3D graphics is a current research topic. On the other hand, video watermarking techniques shall be broadly classified based on domain and human perception. Usually, video watermarking techniques do not alter video contents. But current trend shows that security techniques are designed based on video content. This kind of security methods is claimed to be far superior as they concentrate not only on watermarking but also on synchronization of watermark. In this chapter, we present a comprehensive review of multimedia security techniques emphasizing on their applicability, scope, and shortcomings especially when applied to high-definition multimedia data. Problematic issues of intelligent techniques in signal processing for multimedia security and outlook for the future research are discussed too. The major goal of the paper was to provide a comprehensive reference source for the researchers involved in designing multimedia security technique, regardless of particular application areas.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Dey N, Das P, Roy AB, Das A, Chaudhuri SS (2012) DWT-DCT-SVD based intravascular ultrasound video watermarking. In: 2012 World congress on information and communication technologies (WICT). IEEE, pp 224–229

    Google Scholar 

  2. Dey N, Mukhopadhyay S, Das A, Chaudhuri SS (2012) Analysis of P-QRS-T components modified by blind watermarking technique within the electrocardiogram signal for authentication in wireless telecardiology using DWT. Int J Image Graph Signal Process 4(7):33

    Article  Google Scholar 

  3. Dey N, Maji P, Das P, Biswas S, Das A, Chaudhuri SS (2013) An edge based blind watermarking technique of medical images without devalorizing diagnostic parameters. In: 2013 International conference on advances in technology and engineering (ICATE), IEEE, pp 1–5

    Google Scholar 

  4. Dey N, Biswas S, Roy AB, Das A, Chowdhuri SS (2013) Analysis of photoplethysmographic signals modified by reversible watermarking technique using prediction-error in wireless telecardiology. International conference on intelligent infrastructure the 47th annual national convention at Computer Society of India

    Google Scholar 

  5. Chakraborty S, Samanta S, Biswas D, Dey N, Chaudhuri SS (2013) Particle swarm optimization based parameter optimization technique in medical information hiding. In: 2013 IEEE International conference on computational intelligence and computing research (ICCIC). IEEE, pp 1–6

    Google Scholar 

  6. Dey N, Das P, Chaudhuri SS, Das A (2012) Feature analysis for the blind-watermarked electroencephalogram signal in wireless telemonitoring using Alattar’s method. In: Proceedings of the fifth international conference on security of information and networks. ACM, pp 87–94

    Google Scholar 

  7. Dey N, Biswas S, Das P, Das A, Chaudhuri SS (2012) Feature analysis for the reversible watermarked electrooculography signal using low distortion prediction-error expansion. In: 2012 International conference on communications, devices and intelligent systems (CODIS). IEEE, pp 624–627

    Google Scholar 

  8. Dey N, Biswas S, Das P, Das A, Chaudhuri SS (2012) Feature analysis for the reversible watermarked electrooculography signal using low distortion prediction-error expansion. In: 2012 International conference on communications, devices and intelligent systems (CODIS). IEEE, pp 624–627

    Google Scholar 

  9. Chakraborty S, Maji P, Pal AK, Biswas D, Dey N (2014) Reversible color image watermarking using trigonometric functions. In: 2014 International conference on electronic systems, signal processing and computing technologies (ICESC). IEEE, pp 105–110

    Google Scholar 

  10. Chen WY, Huang SY (2000) Digital watermarking using DCT transformation. Department of Electronic Engineering, National ChinYi Institute of Technology, Taichung

    Google Scholar 

  11. Chopra D, Gupta P, Sanjay G, Gupta A (2012) LSB based digital image watermarking for gray scale image. IOSR J Comput Eng (IOSRJCE). ISSN:2278-0661

    Google Scholar 

  12. Kaur G, Kaur K (2013) Implementing LSB on Image Watermarking using text and image. Int J Adv Res Comput Commun Eng. ISSN:2319-5940

    Google Scholar 

  13. Sharma PK (2012) Rajni, “Information security through Image watermarking using Least Significant Bit Algorithm,”. Comput Sci Inf Technol 2(2):61–67

    Google Scholar 

  14. Gajriya LR, Tiwari M, Singh J (2011) “Correlation based watermarking technique-threshold based extraction,”. Int J Emerg Technol 2(2):80–83

    Google Scholar 

  15. Awasthi M, Lodhi H (2013) Robust image watermarking based on discrete wavelet transform, discrete cosine transform & singular value decomposition. Adv Electr Electron Eng 3(8):971–976

    Google Scholar 

  16. Narang M, Vashisth S (2013) Digital watermarking using discrete wavelet transform. Int J Comput Appl 74(20)

    Google Scholar 

  17. Singh AP, Mishra A (2011) Wavelet based watermarking on digital image. Indian J Comput Sci Eng 1(2), 86–91

    Google Scholar 

  18. Kashyap N, Sinha GR (2012) Image watermarking using 2-level DWT. Adv Comput Res 4(1):42–45

    Google Scholar 

  19. Kaushik AK (2012) A novel approach for digital watermarking of an image using DFT. Int J Electron Comput Sci Eng 1(1):35–41

    Google Scholar 

  20. Marjuni A, Fauzi MFA, Logeswaran R, Heng SH (2013) An improved DCT-based image watermarking scheme using fast Walsh Hadamard transform. Int J Comput Electr Eng 5(3):271

    Article  Google Scholar 

  21. Dhar PK, Kim JM (2011) Digital watermarking scheme based on fast Fourier transformation for audio copyright protection. Int J Secur Appl 5(2):33–48

    Google Scholar 

  22. Dhar PK, Khan MI, Jong-Myon K (2010) A new audio watermarking system using discrete fourier transform for copyright protection. Int J Comput Sci Netw Secur 6:35–40

    Google Scholar 

  23. Lei B, Soon Y, Zhou F, Li Z, Lei H (2012) A robust audio watermarking scheme based on lifting wavelet transform and singular value decomposition. Sig Process 92(9):1985–2001

    Article  Google Scholar 

  24. Arnold M (2000) Audio watermarking: features, applications, and algorithms. In: IEEE international conference on multimedia and expo (II), pp 1013–1016

    Google Scholar 

  25. Doerr G, Dugelay JL (2003) A guide tour of video watermarking. Signal Process Image Commun 18(4):263–282

    Article  Google Scholar 

  26. Jaseena KU, John A (2011) Text watermarking using combined image and text for authentication and protection. Int J Comput Appl 20(4):8–13

    Google Scholar 

  27. Jaseena KU, John A (2011) An invisible zero watermarking algorithm using combined image and text for protecting text documents. Int J Comput Sci Eng 3(6):2265–2272

    Google Scholar 

  28. Jalil Z, Jaffar MA, Mirza AM (2011) A novel text watermarking algorithm using image watermark. Int J Innov Comput Inf Control 7(3)

    Google Scholar 

  29. Gupta S, Gujral G, Aggarwal N (2012) Enhanced least significant bit algorithm for image steganography. IJCEM Int J Comput Eng Manag 15(4):40–42

    Google Scholar 

  30. Banik B (2013) A DWT Method for image steganography. Int J Adv Res Comput Sci Softw Eng 3(6):983–989

    Google Scholar 

  31. Nag A, Biswas S, Sarkar D, Sarkar PP (2011) A novel technique for image steganography based on DWT and Huffman encoding. Int J Comput Sci Secur 4(6):497–610

    Google Scholar 

  32. Ghoshal N, Mandal JK (2012) Image authentication technique in frequency domain based on discrete Fourier transformation (IATFDDFT). arXiv:1212.3371

  33. Bansal D, Chhikara R (2014) An improved DCT based steganography technique. Int J Comput Appl 102(14)

    Google Scholar 

  34. Kaur B, Kaur A, Singh J (2011) Steganographic approach for hiding image in DCT domain. Int J Adv Eng Technol 1(3):72

    MathSciNet  Google Scholar 

  35. Patel BK, Pathak M (2014) Survey on cryptography algorithms. Int J Innov Technol 4(7)

    Google Scholar 

  36. Elminaam DSA, Kader HMA, Hadhoud MM (2008) Performanceevaluation of symmetric encryption algorithms. IJCSNS Int J Comput Sci Netw Secur 8(12):280286

    Google Scholar 

  37. Patel KD, Belani S (2011) Image encryption using different techniques: a review. Int J Emerg Technol Adv Eng 1(1):30–34

    Google Scholar 

  38. Mitali VK, Sharma A (2014) A survey on various cryptography techniques. Int J Emerg Trends Technol Comput Sci 3(4):6

    Google Scholar 

  39. Devi KJ (2013) A sesure image steganography using LSB technique and pseudo random encoding technique. Doctoral dissertation. National Institute of Technology-Rourkela

    Google Scholar 

  40. Kaur M, Mahajan K (2015) An existential review on text watermarking techniques. Int J Comput Appl 120(18)

    Google Scholar 

  41. Dey N, Roy AB, Dey S (2012) A novel approach of color image hiding using RGB color planes and DWT. arXiv:1208.0803

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. D. Desai .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Desai, S.D., Pudakalakatti, N.R., Baligar, V.P. (2017). A Survey on Intelligent Security Techniques for High-Definition Multimedia Data. In: Dey, N., Santhi, V. (eds) Intelligent Techniques in Signal Processing for Multimedia Security. Studies in Computational Intelligence, vol 660. Springer, Cham. https://doi.org/10.1007/978-3-319-44790-2_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-44790-2_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-44789-6

  • Online ISBN: 978-3-319-44790-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics