This book presents essential principles, technical information, and expert insights on multimedia security technology. Illustrating the need for improved content security as the Internet and digital multimedia applications rapidly evolve, it presents a wealth of everyday protection application examples in fields including. Giving readers an in-depth introduction to different aspects of information security mechanisms and methods, it also serves as an instructional tool on the fundamental theoretical framework required for the development of advanced techniques.
Author(s): S. Ramakrishnan
Publisher: CRC Press
Year: 2019
Language: English
Pages: 987
Tags: Cryptographic, Information Security, Images, Video
Cover......Page 1
Half Title......Page 2
Title Page......Page 4
Copyright Page......Page 5
Table of Contents......Page 6
Preface......Page 10
Acknowledgements......Page 14
Editor......Page 16
Contributors......Page 18
Reviewer Details......Page 22
SECTION I: ENCRYPTION......Page 26
1: Introduction to Information Security Systems Primitives......Page 28
2: Cryptographic Image Scrambling Techniques......Page 62
3: Chaos-Based Image Cryptography......Page 92
4: Fundamental Cryptographic Characteristics of Boolean Functions: A Review......Page 122
5: Phase Retrieval in Optical Cryptography......Page 148
6: Security and Cryptography in Images and Video Using Elliptic Curve Cryptography (ECC)......Page 166
7: Security of Scalable Video Coding: Encryption and Authentication......Page 196
8: Compressive Sensing in Color Image Security......Page 236
9: Secure Threshold Attribute-Based Signcryption with Constant Number of Pairings......Page 270
10: Multimedia Contents Encryption Using the Chaotic MACM System on a Smart-display......Page 288
11: Medical Image Encryption......Page 322
SECTION II: WATERMARKING......Page 346
12: Watermarking Techniques for Copyright Protection of Texts in Document Files......Page 348
13: VLSI Implementation of Video Watermarking for Secure HEVC Coding Standard......Page 378
14: Data Hiding in Compressed Images and Videos......Page 404
15: Robust Image Watermarking Based on Multiple-Criteria Decision-Making......Page 432
16: The Role of Image Fusion and Watermarking Techniques in Medical Imaging......Page 466
17: Watermarking Techniques and Its Applications in Tele-Health: A Technical Survey......Page 492
SECTION III: STEGANOGRAPHY......Page 534
18: Utilization of Small S-Boxes for Information Hiding......Page 536
19: Secure and Robust ECG Steganography Using Fractional Fourier Transform......Page 566
20: Visual Secret Sharing Scheme for (k,n) Threshold-Based on QR Code with Multiple Decryptions......Page 596
21: Steganography Based on Interpolation and Edge Detection Techniques......Page 622
22: Steganography and Medical Data Security......Page 652
SECTION IV: FORENSICS......Page 686
23: Digital Visual Media Forensics......Page 688
24: Review of Image Tampering Detection Techniques......Page 748
25: Blockchain Security for Wireless Multimedia Networks......Page 770
26: Copy-Move Image Forgery Detection Using Redundant Keypoint Elimination Method......Page 798
27: Anti-Forensics for Image and Video Tampering: A Review......Page 824
SECTION V: BIOMETRICS......Page 854
28: Securing Biometrics Using Data Hiding Techniques......Page 856
29: Secure Biometric Modalities for Effective Communication......Page 880
30: Application of Video-Based Face Recognition for Mobile Security Using Machine Learning Techniques......Page 912
31: Biometrics-Based Authentication Scheme for Cloud Environment......Page 942
Index......Page 970