ebook img

Handbook of Multimedia Information Security: Techniques and Applications PDF

798 Pages·2019·32.534 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Handbook of Multimedia Information Security: Techniques and Applications

Amit Kumar Singh · Anand Mohan Editors Handbook of Multimedia Information Security: Techniques and Applications Handbook of Multimedia Information Security: Techniques and Applications Amit Kumar Singh • Anand Mohan Editors Handbook of Multimedia Information Security: Techniques and Applications 123 Editors AmitKumarSingh AnandMohan DepartmentofComputer DepartmentofElectronicsEngineering ScienceandEngineering IndianInstituteofTechnology,BHU NITPatna,Patna,India Varanasi,UttarPradesh,India ISBN978-3-030-15886-6 ISBN978-3-030-15887-3 (eBook) https://doi.org/10.1007/978-3-030-15887-3 ©SpringerNatureSwitzerlandAG2019 Thisworkissubjecttocopyright.AllrightsarereservedbythePublisher,whetherthewholeorpartof thematerialisconcerned,specificallytherightsoftranslation,reprinting,reuseofillustrations,recitation, broadcasting,reproductiononmicrofilmsorinanyotherphysicalway,andtransmissionorinformation storageandretrieval,electronicadaptation,computersoftware,orbysimilarordissimilarmethodology nowknownorhereafterdeveloped. Theuseofgeneraldescriptivenames,registerednames,trademarks,servicemarks,etc.inthispublication doesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfromtherelevant protectivelawsandregulationsandthereforefreeforgeneraluse. Thepublisher,theauthors,andtheeditorsaresafetoassumethattheadviceandinformationinthisbook arebelievedtobetrueandaccurateatthedateofpublication.Neitherthepublishernortheauthorsor theeditorsgiveawarranty,expressorimplied,withrespecttothematerialcontainedhereinorforany errorsoromissionsthatmayhavebeenmade.Thepublisherremainsneutralwithregardtojurisdictional claimsinpublishedmapsandinstitutionalaffiliations. ThisSpringerimprintispublishedbytheregisteredcompanySpringerNatureSwitzerlandAG. Theregisteredcompanyaddressis:Gewerbestrasse11,6330Cham,Switzerland Foreword The book entitled Handbook of Multimedia Information Security: Techniques and Applicationsisasignificanteffortonthemultimedia,whichfocusesontheemerging applications. The handbook intends to enhance the understanding of opportunities andchallengesinmultimediasecurityandprocessingforreal-worldapplicationsat thegloballevel. It is a challenge for any researchers and scholars to identify the most popular topics on multimedia in any instant of time due to rapid progress on research and development. This book summarizes the recent trends in multimedia in terms of security, processing, and applications and focuses on identifying new directions for academic professionals, practicing engineers, and scientists. Given this, sum- marizing the vast literature in multimedia and identifying the most cutting-edge phenomenaisahugetask.Ihopethereaderswillfindthebookofgreatvalueinits visionarywords. Icongratulatetheeditorsforthisbookandlookforwardtoseeingitinprintsoon. DepartmentofComputerScienceandEngineering SarajuP.Mohanty UniversityofNorthTexas,Denton,TX,USA v Preface Recently,multimediastandsasoneofthemostdemandingandexcitingaspectsof theinformationera,andeverysecond,alotofmultimediainformationarecreated and transmitted all around the world through different unsecured networks. The multimedia information distribution through open channel using information and communication technology (ICT) is an indispensable and cost-effective technique fordisseminationanddistributionofdigitaldata/mediafiles.However,thepreven- tion of copyright violation, authenticity, confidentiality, ownership identification, andidentitythefthavebeenchallengingissuesduetoattemptsofmaliciousattacks orhackingoftheopen-channelinformation.Criminaloffencerangingfromidentity theft to copyright violation and from personal information exposure to medical historydisclosureisbeingmadeeveryday.However,researchestablishedthatthe authenticity of multimedia information/documents is strongly required in various emerging applications such as e-health, secure multimedia contents on social network,securede-votingsystems,automotiveindustries,military,digitalforensic, digitalcinema,educationandinsurancecompanies,drivinglicense/passport,aswell asmanyreal-timeapplications.Furthermore,multimediaprocessingisamulti-rate computingproblemandrequireslow-costimplementationofhigh-volumemarkets, highcomputationrates,andlargememorybandwidth,whichmakesitachallenging domainforpotentialresearchers. Outline ofthe Bookand ChapterSynopsis Inviewofaddressingtheabovechallenges,thishandbookpresentstherecenttrends inmultimediaintermsofsecurity,processing,andapplicationsatthegloballevel. Wehaveprovidedpotentialthoughtsandmethodologythathelpseniorundergradu- ateandgraduatestudents,researchers,programmers,andindustryprofessionalsin creating new knowledge for the future to develop efficient techniques/framework formultimediaapplications. Abriefandorderlyintroductiontothebookchaptersinthishandbook,organized underthreemajorparts,isprovidedinthefollowing: vii viii Preface Part I includes 15 interesting chapters dealing with multimedia security for emergingapplications.Thechaptersincludebasicconceptsofmultimediatoolsand applications,biologicalandbehavioralbiometrics,effectivemultimediaencryption and secure watermarking techniques for emerging applications, an adaptive face identification approach for android mobile devices, and multimedia using chaotic andperceptualhashingfunction. Part II of the book includes 11 chapters dealing with multimedia processing forvariouspotentialapplications.Thechaptersincludeadetailedsurveyofimage processing-basedautomatedglaucomadetectiontechniquesandroleofde-noising, recent study of dictionary learning-based image reconstruction techniques for analyzingthebigmedicaldata,briefintroductionofquantumimageprocessingand itsapplications,asegmentation-lessefficientAlzheimerdetectionapproach,object recognition, image enhancements and de-noising techniques for emerging appli- cations, improved performance of image compression approach, and automated detectionofeye-relateddiseasesusingdigitalimageprocessing. Part III of the book includes 11 interesting chapters dealing with multimedia applications.Thechaptersincludetheextensivesurveyontheroleofmultimediain medicineandmultimediaforensicclassification,afingerprint-basedauthentication system for e-health security, and analysis of recently developed deep learning techniques for emotion and activity recognition. Further, the book introduces a case study on the change of ECG according to time for user identification, role of multimedia in big data, cloud computing, the Internet of things (IoT), and blockchainenvironmentindetailforreal-lifeapplications. To conclude, we would like to sincerely thank all the authors for submitting theirhigh-qualitychapterstothisbookandthelargenumberofpotentialreviewers who have participated in the review process and provided helpful comments and suggestionstotheauthorstoimprovetheirchapters. We especially thank the Multimedia Systems and Applications Series Editor, Prof.BorkoFurht,forhiscontinuoussupportandgreatguidance. We are also grateful to Prof. Saraju P. Mohanty, Department of Computer Sci- enceandEngineeringUniversityofNorthTexas,Denton,TX,forhisinspirational forewordforthebook. We would also like to thank the publishers at Springer, in particular Susan Lagerstrom-Fife, Senior Publishing Editor/CS Springer, for their helpful guidance andencouragementduringthecreationofthisbook. We are sincerely thankful to all authors, editors, and publishers whose works havebeenciteddirectly/indirectlyinthisbook. We believe that our book will be helpful to the senior undergraduate and graduatestudents,researchers,industryprofessionals,healthcareprofessionals,and providers working in the area demanding state-of-the-art solutions for multimedia applications. Patna,India AmitKumarSingh Varanasi,India AnandMohan Special Acknowledgments The first author gratefully acknowledges the authorities of National Institute of TechnologyPatna,India,fortheirkindsupporttocomeupwiththisbook. ThesecondauthorgratefullyacknowledgestheauthoritiesofIndianInstituteof Technology (BHU), Varanasi, India, for their kind support to come up with this book. ix Contents PartI MultimediaSecurity 1 IntroductiontoMultimediaToolsandApplications.................... 3 Abdul Rahaman Wahab Sait, J. Uthayakumar, K. Shankar, andK.SatheshKumar 2 AnOverviewofBiometricsMethods..................................... 15 Muhammad Sharif, Mudassar Raza, Jamal Hussain Shah, MussaratYasmin,andStevenLawrenceFernandes 3 SIE:AnApplicationtoSecureStereoImagesUsingEncryption ..... 37 SanojKumarandGauravBhatnagar 4 ExampleBasedPrivacy-PreservingVideoColorGrading............. 63 AmiteshSinghRajputandBalasubramanianRaman 5 ANovelWatermarkingTechniqueforMultimediaSecurity .......... 89 SatendraPalSinghandGauravBhatnagar 6 A Secure Medical Image Watermarking Technique for E-HealthcareApplications................................................. 119 NasirN.Hurrah,ShabirA.Parah,andJavaidA.Sheikh 7 HybridTransformsBasedObliviousFragileWatermarking Techniques................................................................... 143 GeetaKasana 8 Performance Analysis of Invariant Quaternion Moments inColorImageWatermarking............................................ 167 KhalidM.HosnyandMohamedM.Darwish 9 SecurityofBiometricandBiomedicalImagesUsingSparse DomainBasedWatermarkingTechnique................................ 209 RohitThanki,SurekhaBorra,andDevenTrivedi xi xii Contents 10 PerformanceAnalysisofImageEncryptionMethodsUsing Chaotic,MultipleChaoticandHyper-ChaoticMaps................... 233 T.GopalakrishnanandS.Ramakrishnan 11 PerceptualHashFunctionforImagesBasedonHierarchical OrdinalPattern............................................................. 267 ArambamNeelimaandKh.ManglemSingh 12 Hash Function Based Optimal Block Chain Model for theInternetofThings(IoT) ............................................... 289 AndinoMaseleno,MariniOthman,P.Deepalakshmi,K.Shankar, andM.Ilayaraja 13 An Adaptive and Viable Face Identification for Android MobileDevices.............................................................. 301 TehseenMehraj,BurhanUl IslamKhan,RashidahF.Olanrewaju, FarhatAnwar,andAhmadZamani BinJusoh 14 RealizationofChaos-BasedPrivateMultiprocessorNetwork ViaUSARTofEmbeddedDevices........................................ 323 SivaJanakiraman,K.Thenmozhi,JohnBosco BalaguruRayappan, V.MoorthiParamasivam,andRengarajanAmirtharajan 15 Robust and Secure Hiding Scheme for Open Channel TransmissionofDigitalImages ........................................... 341 HarshVikramSinghandPurnimaPal PartII MultimediaProcessing 16 Image Processing Based Automated Glaucoma Detection TechniquesandRoleofDe-Noising:ATechnicalSurvey.............. 359 SimaSahu,HarshVikramSingh,BasantKumar,AmitKumarSingh, andPrabhatKumar 17 AStudyonDictionaryLearningBasedImageReconstruction TechniquesforBigMedicalData ......................................... 377 ShailendraTiwari,KavkiratKaur,andK.V.Arya 18 QuantumImageProcessingandItsApplications....................... 395 J.J.Ranjani 19 3-DShapeReconstructionBasedCTImageEnhancement............ 413 ManojDiwakarandPardeepKumar 20 ASegmentation-LessEfficientAlzheimerDetectionApproach UsingHybridImageFeatures............................................. 421 SitaraAfzal,MubashirJaved,MuazzamMaqsood,FarhanAadil, SeungminRho,andIrfanMehmood

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.