Security of Multimedia Contents: A Brief

  • Amira S. Ashour
  • Nilanjan DeyEmail author
Part of the Studies in Computational Intelligence book series (SCI, volume 660)


Through the past few years, an explosion in the use of digital media has been increased. A new infrastructure of digital audio, image, animation, video recorders/players, electronic commerce, and online services are speedily being deployed. These multimedia forms are applied for further transmission between users in the various applications through the Web or wireless communication that leads to security threats. Generally, the multimedia authenticity/security solution is based on using hiding techniques including digital watermarking and cryptography. This chapter introduced an extensive brief overview of the multimedia security problem in the prevailing research work in the various applications. It provided evolution of the different hiding techniques along with their properties and requirements. Finally, some challenges are addressed for future research direction.


Multimedia Multimedia security Watermarking techniques Cryptography Hiding techniques 


  1. 1.
    Qiao L (1998) Multimedia security and copyright protection. Ph.D. Thesis, University of Illinois at Urbana-ChampaignGoogle Scholar
  2. 2.
    Dey N, Biswas S, Das P, Das A, Chaudhuri SS (2012) Feature analysis for the reversible watermarked electrooculography signal using low distortion prediction-error expansion. In: 2012 International conference communications, devices and intelligent systems (Codis), pp 624–27Google Scholar
  3. 3.
    Dey N, Maji P, Das P, Biswas S, Das A, Chaudhuri S (2012) Embedding of blink frequency in electrooculography signal using difference expansion based reversible watermarking technique. Buletinul Ştiinţific Al Universităţii “Politehnica” Din Timişoara, Seria Electronică Şi Telecomunicaţii Transactions on Electronics and Communications 57(71)Google Scholar
  4. 4.
    Dey N, Biswas D, Roy A, Das A (2012) DWT-DCT-SVD based blind watermarking technique of gray image in electrooculogram signal. In: 2012 12th international conference on intelligent systems design and applications (ISDA), pp 680–685Google Scholar
  5. 5.
    Dey N, Mukhopadhyay S, Das A, Chaudhuri S (2012) Analysis of P-QRS-T components modified by blind watermarking technique within the electrocardiogram signal for authentication in wireless telecardiology using DWT. Int J Image Graph Signal Process (IJIGSP) 7:33–46CrossRefGoogle Scholar
  6. 6.
    Nandi S, Roy S, Dansana J, Karaa WB, Ray R, Chowdhury SR, Chakraborty S, Dey N (2014) Cellular automata based encrypted ECG-hash code generation: an application in inter human biometric authentication system. Int J Comput Netw Inf Secur 6(11):1Google Scholar
  7. 7.
    Kumari G, Kumar B, Sumalatha L, Krishna V (2009) Secure and robust digital watermarking on grey level images. Int J Adv Sci Technol 11Google Scholar
  8. 8.
    Miyazaki A, Okamoto A (2002) Analysis and improvement of correlation-based watermarking methods for digital images. Kyushu UniversityGoogle Scholar
  9. 9.
    Jin C, Zhang X, Chao Y, Xu H (2008) Behavior authentication technology using digital watermark. In: International conference on multimedia and information technology (MMIT ‘08), pp 7–10Google Scholar
  10. 10.
    Jin C, Wang S, Jin S, Zhang Q, Ye J (2009) Robust digital watermark technique for copyright protection. In: International symposium on information engineering and electronic commerce (IEEC ‘09), pp 237–240Google Scholar
  11. 11.
    Pan W, Coatrieux G, Cuppens-Boulahia N, Cuppens F, Roux C (2010) Watermarking to enforce medical image access and usage control policy. In: 2010 sixth international conference on signal-image technology and internet-based systems (SITIS), pp 251–260Google Scholar
  12. 12.
    Li M, Narayanan S, Poovendran R (2004) Tracing medical images using multi-band watermarks. In: 26th conference of the IEEE annual international engineering in medicine and biology society (IEMBS ‘04), vol 2, pp 3233–3236Google Scholar
  13. 13.
    Kishore P, Venkatram N, Sarvya C, Reddy L (2014) Medical image watermarking using RSA encryption in wavelet domain. In: 2014 First international conference on networks & soft computing (ICNSC), pp 258–262Google Scholar
  14. 14.
    Petitcolas FAP, Anderson RJ, Kuhn MG (1999) Information hiding—a survey. In: Proceedings of IEEE, pp 1062–1078Google Scholar
  15. 15.
    Hartung F, Kutter M (1999) Multimedia watermarking techniques. In: Proceedings of IEEE, pp 1079–1107Google Scholar
  16. 16.
    Dey N, Nandi B, Das P, Das A, Chaudhuri SS (2013) Retention of electrocardioGram features insiGnificantly devalorized as an effect of watermarkinG for. Advances in biometrics for secure human authentication and recognition, 175Google Scholar
  17. 17.
    Biswas S, Roy AB, Ghosh K, Dey N (2012) A biometric authentication based secured ATM banking system. Int J Adv Res Comput Sci Softw Eng, ISSN, 2277Google Scholar
  18. 18.
    Bose S, Chowdhury SR, Sen C, Chakraborty S, Redha T, Dey N (2014) Multi-thread video watermarking: a biomedical application. In: 2014 International conference on circuits, communication, control and computing (I4C). IEEE, pp 242–246Google Scholar
  19. 19.
    Bose S, Chowdhury SR, Chakraborty S, Acharjee S, Dey N (2014) Effect of watermarking in vector quantization based image compression. In 2014 International conference on control, instrumentation, communication and computational technologies (ICCICCT). IEEE, pp 503–508Google Scholar
  20. 20.
    Dey N, Samanta S, Yang XS, Das A, Chaudhuri SS (2013) Optimisation of scaling factors in electrocardiogram signal watermarking using cuckoo search. Int J Bio-Inspired Comput 5(5):315–326CrossRefGoogle Scholar
  21. 21.
    Dey N, Mukhopadhyay S, Das A, Chaudhuri SS (2012) Analysis of P-QRS-T components modified by blind watermarking technique within the electrocardiogram signal for authentication in wireless telecardiology using DWT. Int J Image Graph Signal Process 4(7):33CrossRefGoogle Scholar
  22. 22.
    Dey N, Maji P, Das P, Biswas S, Das A, Chaudhuri SS (2013) An edge based blind watermarking technique of medical images without devalorizing diagnostic parameters. In: 2013 international conference on advances in technology and engineering (ICATE). IEEE, pp 1–5Google Scholar
  23. 23.
    Chakraborty S, Samanta S, Biswas D, Dey N, Chaudhuri SS (2013) Particle swarm optimization based parameter optimization technique in medical information hiding. In: 2013 IEEE international conference on computational intelligence and computing research (ICCIC). IEEE, pp 1–6Google Scholar
  24. 24.
    Dey N, Biswas S, Das P, Das A, Chaudhuri SS (2012) Lifting wavelet transformation based blind watermarking technique of photoplethysmographic signals in wireless telecardiology. In: 2012 World congress on information and communication technologies (WICT). IEEE, pp 230–235Google Scholar
  25. 25.
    Dey N, Pal M, Das A (2012) A session based watermarking technique within the NROI of retinal fundus images for authencation using DWT, spread spectrum and Harris corner detection. Int J Mod Eng Res 2(3):749–757Google Scholar
  26. 26.
    Dey N, Samanta S, Chakraborty S, Das A, Chaudhuri SS, Suri JS (2014) Firefly algorithm for optimization of scaling factors during embedding of manifold medical information: an application in ophthalmology imaging. J Med Imaging Health Inform 4(3):384–394CrossRefGoogle Scholar
  27. 27.
    Chakraborty S, Maji P, Pal AK, Biswas D, Dey N (2014) Reversible color image watermarking using trigonometric functions. In: 2014 International conference on electronic systems, signal processing and computing technologies (ICESC). IEEE, pp 105–110Google Scholar
  28. 28.
    Braudaway GW, Magerlein KA, Mintzer F (1996) Protecting publicly-available images with a visible image watermark. In: SPIE conference on optical security and counterfeit deterrence techniques, vol 2659, pp 126–133Google Scholar
  29. 29.
    Jain AK (1989) Fundamentals of digital image processing. Prentice Hall, Upper Saddle RiverzbMATHGoogle Scholar
  30. 30.
    Meng J, Chang S-F (1998) Embedding visible video watermarks in the compressed domain. In: International conference on image processing (ICIP)Google Scholar
  31. 31.
    Serdean C (2002) Spread spectrum-based video watermarking algorithms for copyright protection. Ph.D. thesis, University of PlymouthGoogle Scholar
  32. 32.
    Cox I, Miller M, Bloom J, Fridrich J, Kalker T (2007) Digital watermarking and steganography. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA. ISBN: 978-0123725851Google Scholar
  33. 33.
    Yang H, Kot AC (2007) Pattern-based data hiding for binary image authentication by connectivity-preserving. IEEE Trans Multimed 9(3):475–486CrossRefGoogle Scholar
  34. 34.
    Venkatesan M, MeenakshiDevi P, Duraiswamy K, Thyagarajah K (2008) Secure authentication watermarking for binary images using pattern matching. IJCSNS Int J Comput Sci Netw Secur 8(2):241–250Google Scholar
  35. 35.
    Jung KH, Yoo KY (2009) Data hiding method with quality control for binary images. J Softw Eng Appl 2(1):20CrossRefGoogle Scholar
  36. 36.
    Wu M, Hong HY, Gelman A (1999). Multi-level data hiding for digital image and video. In: Photonics East’99. International society for optics and photonics, pp 10–21Google Scholar
  37. 37.
    Min WU, Heather Y, Bede L (2003) Data hiding in image and video: part II—designs and applications. IEEE Trans Image Process 12(6):696–705CrossRefGoogle Scholar
  38. 38.
    Paruchuri JK, Cheung SCS (2008) Joint optimization of data hiding and video compression. In: IEEE International symposium on circuits and systems, 2008. ISCAS 2008. IEEE, pp 3021–3024Google Scholar
  39. 39.
    Naseem M, Hussain IM, Khan MK, Ajmal A (2011) An optimum modified bit plane splicing LSB algorithm for secret data hiding. Int J Comput Appl (0975–8887), 29(12)Google Scholar
  40. 40.
    Dey S, Abraham A, Sanyal S (2007) An LSB data hiding technique using prime numbers. In: Third international symposium on information assurance and security, 2007. IAS 2007, pp 101–108Google Scholar

Copyright information

© Springer International Publishing Switzerland 2017

Authors and Affiliations

  1. 1.Department of Electronics and Electrical Communications Engineering, Faculty of EngineeringTanta UniversityTantaEgypt
  2. 2.Department of Information TechnologyTechno India College of TechnologyKolkataIndia

Personalised recommendations