Abstract
Through the past few years, an explosion in the use of digital media has been increased. A new infrastructure of digital audio, image, animation, video recorders/players, electronic commerce, and online services are speedily being deployed. These multimedia forms are applied for further transmission between users in the various applications through the Web or wireless communication that leads to security threats. Generally, the multimedia authenticity/security solution is based on using hiding techniques including digital watermarking and cryptography. This chapter introduced an extensive brief overview of the multimedia security problem in the prevailing research work in the various applications. It provided evolution of the different hiding techniques along with their properties and requirements. Finally, some challenges are addressed for future research direction.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Qiao L (1998) Multimedia security and copyright protection. Ph.D. Thesis, University of Illinois at Urbana-Champaign
Dey N, Biswas S, Das P, Das A, Chaudhuri SS (2012) Feature analysis for the reversible watermarked electrooculography signal using low distortion prediction-error expansion. In: 2012 International conference communications, devices and intelligent systems (Codis), pp 624–27
Dey N, Maji P, Das P, Biswas S, Das A, Chaudhuri S (2012) Embedding of blink frequency in electrooculography signal using difference expansion based reversible watermarking technique. Buletinul Ştiinţific Al Universităţii “Politehnica” Din Timişoara, Seria Electronică Şi Telecomunicaţii Transactions on Electronics and Communications 57(71)
Dey N, Biswas D, Roy A, Das A (2012) DWT-DCT-SVD based blind watermarking technique of gray image in electrooculogram signal. In: 2012 12th international conference on intelligent systems design and applications (ISDA), pp 680–685
Dey N, Mukhopadhyay S, Das A, Chaudhuri S (2012) Analysis of P-QRS-T components modified by blind watermarking technique within the electrocardiogram signal for authentication in wireless telecardiology using DWT. Int J Image Graph Signal Process (IJIGSP) 7:33–46
Nandi S, Roy S, Dansana J, Karaa WB, Ray R, Chowdhury SR, Chakraborty S, Dey N (2014) Cellular automata based encrypted ECG-hash code generation: an application in inter human biometric authentication system. Int J Comput Netw Inf Secur 6(11):1
Kumari G, Kumar B, Sumalatha L, Krishna V (2009) Secure and robust digital watermarking on grey level images. Int J Adv Sci Technol 11
Miyazaki A, Okamoto A (2002) Analysis and improvement of correlation-based watermarking methods for digital images. Kyushu University
Jin C, Zhang X, Chao Y, Xu H (2008) Behavior authentication technology using digital watermark. In: International conference on multimedia and information technology (MMIT ‘08), pp 7–10
Jin C, Wang S, Jin S, Zhang Q, Ye J (2009) Robust digital watermark technique for copyright protection. In: International symposium on information engineering and electronic commerce (IEEC ‘09), pp 237–240
Pan W, Coatrieux G, Cuppens-Boulahia N, Cuppens F, Roux C (2010) Watermarking to enforce medical image access and usage control policy. In: 2010 sixth international conference on signal-image technology and internet-based systems (SITIS), pp 251–260
Li M, Narayanan S, Poovendran R (2004) Tracing medical images using multi-band watermarks. In: 26th conference of the IEEE annual international engineering in medicine and biology society (IEMBS ‘04), vol 2, pp 3233–3236
Kishore P, Venkatram N, Sarvya C, Reddy L (2014) Medical image watermarking using RSA encryption in wavelet domain. In: 2014 First international conference on networks & soft computing (ICNSC), pp 258–262
Petitcolas FAP, Anderson RJ, Kuhn MG (1999) Information hiding—a survey. In: Proceedings of IEEE, pp 1062–1078
Hartung F, Kutter M (1999) Multimedia watermarking techniques. In: Proceedings of IEEE, pp 1079–1107
Dey N, Nandi B, Das P, Das A, Chaudhuri SS (2013) Retention of electrocardioGram features insiGnificantly devalorized as an effect of watermarkinG for. Advances in biometrics for secure human authentication and recognition, 175
Biswas S, Roy AB, Ghosh K, Dey N (2012) A biometric authentication based secured ATM banking system. Int J Adv Res Comput Sci Softw Eng, ISSN, 2277
Bose S, Chowdhury SR, Sen C, Chakraborty S, Redha T, Dey N (2014) Multi-thread video watermarking: a biomedical application. In: 2014 International conference on circuits, communication, control and computing (I4C). IEEE, pp 242–246
Bose S, Chowdhury SR, Chakraborty S, Acharjee S, Dey N (2014) Effect of watermarking in vector quantization based image compression. In 2014 International conference on control, instrumentation, communication and computational technologies (ICCICCT). IEEE, pp 503–508
Dey N, Samanta S, Yang XS, Das A, Chaudhuri SS (2013) Optimisation of scaling factors in electrocardiogram signal watermarking using cuckoo search. Int J Bio-Inspired Comput 5(5):315–326
Dey N, Mukhopadhyay S, Das A, Chaudhuri SS (2012) Analysis of P-QRS-T components modified by blind watermarking technique within the electrocardiogram signal for authentication in wireless telecardiology using DWT. Int J Image Graph Signal Process 4(7):33
Dey N, Maji P, Das P, Biswas S, Das A, Chaudhuri SS (2013) An edge based blind watermarking technique of medical images without devalorizing diagnostic parameters. In: 2013 international conference on advances in technology and engineering (ICATE). IEEE, pp 1–5
Chakraborty S, Samanta S, Biswas D, Dey N, Chaudhuri SS (2013) Particle swarm optimization based parameter optimization technique in medical information hiding. In: 2013 IEEE international conference on computational intelligence and computing research (ICCIC). IEEE, pp 1–6
Dey N, Biswas S, Das P, Das A, Chaudhuri SS (2012) Lifting wavelet transformation based blind watermarking technique of photoplethysmographic signals in wireless telecardiology. In: 2012 World congress on information and communication technologies (WICT). IEEE, pp 230–235
Dey N, Pal M, Das A (2012) A session based watermarking technique within the NROI of retinal fundus images for authencation using DWT, spread spectrum and Harris corner detection. Int J Mod Eng Res 2(3):749–757
Dey N, Samanta S, Chakraborty S, Das A, Chaudhuri SS, Suri JS (2014) Firefly algorithm for optimization of scaling factors during embedding of manifold medical information: an application in ophthalmology imaging. J Med Imaging Health Inform 4(3):384–394
Chakraborty S, Maji P, Pal AK, Biswas D, Dey N (2014) Reversible color image watermarking using trigonometric functions. In: 2014 International conference on electronic systems, signal processing and computing technologies (ICESC). IEEE, pp 105–110
Braudaway GW, Magerlein KA, Mintzer F (1996) Protecting publicly-available images with a visible image watermark. In: SPIE conference on optical security and counterfeit deterrence techniques, vol 2659, pp 126–133
Jain AK (1989) Fundamentals of digital image processing. Prentice Hall, Upper Saddle River
Meng J, Chang S-F (1998) Embedding visible video watermarks in the compressed domain. In: International conference on image processing (ICIP)
Serdean C (2002) Spread spectrum-based video watermarking algorithms for copyright protection. Ph.D. thesis, University of Plymouth
Cox I, Miller M, Bloom J, Fridrich J, Kalker T (2007) Digital watermarking and steganography. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA. ISBN: 978-0123725851
Yang H, Kot AC (2007) Pattern-based data hiding for binary image authentication by connectivity-preserving. IEEE Trans Multimed 9(3):475–486
Venkatesan M, MeenakshiDevi P, Duraiswamy K, Thyagarajah K (2008) Secure authentication watermarking for binary images using pattern matching. IJCSNS Int J Comput Sci Netw Secur 8(2):241–250
Jung KH, Yoo KY (2009) Data hiding method with quality control for binary images. J Softw Eng Appl 2(1):20
Wu M, Hong HY, Gelman A (1999). Multi-level data hiding for digital image and video. In: Photonics East’99. International society for optics and photonics, pp 10–21
Min WU, Heather Y, Bede L (2003) Data hiding in image and video: part II—designs and applications. IEEE Trans Image Process 12(6):696–705
Paruchuri JK, Cheung SCS (2008) Joint optimization of data hiding and video compression. In: IEEE International symposium on circuits and systems, 2008. ISCAS 2008. IEEE, pp 3021–3024
Naseem M, Hussain IM, Khan MK, Ajmal A (2011) An optimum modified bit plane splicing LSB algorithm for secret data hiding. Int J Comput Appl (0975–8887), 29(12)
Dey S, Abraham A, Sanyal S (2007) An LSB data hiding technique using prime numbers. In: Third international symposium on information assurance and security, 2007. IAS 2007, pp 101–108
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Ashour, A.S., Dey, N. (2017). Security of Multimedia Contents: A Brief. In: Dey, N., Santhi, V. (eds) Intelligent Techniques in Signal Processing for Multimedia Security. Studies in Computational Intelligence, vol 660. Springer, Cham. https://doi.org/10.1007/978-3-319-44790-2_1
Download citation
DOI: https://doi.org/10.1007/978-3-319-44790-2_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-44789-6
Online ISBN: 978-3-319-44790-2
eBook Packages: EngineeringEngineering (R0)