Table Of ContentAmit Kumar Singh · Anand Mohan
Editors
Handbook of Multimedia
Information Security:
Techniques and
Applications
Handbook of Multimedia Information Security:
Techniques and Applications
Amit Kumar Singh • Anand Mohan
Editors
Handbook of Multimedia
Information Security:
Techniques and Applications
123
Editors
AmitKumarSingh AnandMohan
DepartmentofComputer DepartmentofElectronicsEngineering
ScienceandEngineering IndianInstituteofTechnology,BHU
NITPatna,Patna,India Varanasi,UttarPradesh,India
ISBN978-3-030-15886-6 ISBN978-3-030-15887-3 (eBook)
https://doi.org/10.1007/978-3-030-15887-3
©SpringerNatureSwitzerlandAG2019
Thisworkissubjecttocopyright.AllrightsarereservedbythePublisher,whetherthewholeorpartof
thematerialisconcerned,specificallytherightsoftranslation,reprinting,reuseofillustrations,recitation,
broadcasting,reproductiononmicrofilmsorinanyotherphysicalway,andtransmissionorinformation
storageandretrieval,electronicadaptation,computersoftware,orbysimilarordissimilarmethodology
nowknownorhereafterdeveloped.
Theuseofgeneraldescriptivenames,registerednames,trademarks,servicemarks,etc.inthispublication
doesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfromtherelevant
protectivelawsandregulationsandthereforefreeforgeneraluse.
Thepublisher,theauthors,andtheeditorsaresafetoassumethattheadviceandinformationinthisbook
arebelievedtobetrueandaccurateatthedateofpublication.Neitherthepublishernortheauthorsor
theeditorsgiveawarranty,expressorimplied,withrespecttothematerialcontainedhereinorforany
errorsoromissionsthatmayhavebeenmade.Thepublisherremainsneutralwithregardtojurisdictional
claimsinpublishedmapsandinstitutionalaffiliations.
ThisSpringerimprintispublishedbytheregisteredcompanySpringerNatureSwitzerlandAG.
Theregisteredcompanyaddressis:Gewerbestrasse11,6330Cham,Switzerland
Foreword
The book entitled Handbook of Multimedia Information Security: Techniques and
Applicationsisasignificanteffortonthemultimedia,whichfocusesontheemerging
applications. The handbook intends to enhance the understanding of opportunities
andchallengesinmultimediasecurityandprocessingforreal-worldapplicationsat
thegloballevel.
It is a challenge for any researchers and scholars to identify the most popular
topics on multimedia in any instant of time due to rapid progress on research and
development. This book summarizes the recent trends in multimedia in terms of
security, processing, and applications and focuses on identifying new directions
for academic professionals, practicing engineers, and scientists. Given this, sum-
marizing the vast literature in multimedia and identifying the most cutting-edge
phenomenaisahugetask.Ihopethereaderswillfindthebookofgreatvalueinits
visionarywords.
Icongratulatetheeditorsforthisbookandlookforwardtoseeingitinprintsoon.
DepartmentofComputerScienceandEngineering SarajuP.Mohanty
UniversityofNorthTexas,Denton,TX,USA
v
Preface
Recently,multimediastandsasoneofthemostdemandingandexcitingaspectsof
theinformationera,andeverysecond,alotofmultimediainformationarecreated
and transmitted all around the world through different unsecured networks. The
multimedia information distribution through open channel using information and
communication technology (ICT) is an indispensable and cost-effective technique
fordisseminationanddistributionofdigitaldata/mediafiles.However,thepreven-
tion of copyright violation, authenticity, confidentiality, ownership identification,
andidentitythefthavebeenchallengingissuesduetoattemptsofmaliciousattacks
orhackingoftheopen-channelinformation.Criminaloffencerangingfromidentity
theft to copyright violation and from personal information exposure to medical
historydisclosureisbeingmadeeveryday.However,researchestablishedthatthe
authenticity of multimedia information/documents is strongly required in various
emerging applications such as e-health, secure multimedia contents on social
network,securede-votingsystems,automotiveindustries,military,digitalforensic,
digitalcinema,educationandinsurancecompanies,drivinglicense/passport,aswell
asmanyreal-timeapplications.Furthermore,multimediaprocessingisamulti-rate
computingproblemandrequireslow-costimplementationofhigh-volumemarkets,
highcomputationrates,andlargememorybandwidth,whichmakesitachallenging
domainforpotentialresearchers.
Outline ofthe Bookand ChapterSynopsis
Inviewofaddressingtheabovechallenges,thishandbookpresentstherecenttrends
inmultimediaintermsofsecurity,processing,andapplicationsatthegloballevel.
Wehaveprovidedpotentialthoughtsandmethodologythathelpseniorundergradu-
ateandgraduatestudents,researchers,programmers,andindustryprofessionalsin
creating new knowledge for the future to develop efficient techniques/framework
formultimediaapplications.
Abriefandorderlyintroductiontothebookchaptersinthishandbook,organized
underthreemajorparts,isprovidedinthefollowing:
vii
viii Preface
Part I includes 15 interesting chapters dealing with multimedia security for
emergingapplications.Thechaptersincludebasicconceptsofmultimediatoolsand
applications,biologicalandbehavioralbiometrics,effectivemultimediaencryption
and secure watermarking techniques for emerging applications, an adaptive face
identification approach for android mobile devices, and multimedia using chaotic
andperceptualhashingfunction.
Part II of the book includes 11 chapters dealing with multimedia processing
forvariouspotentialapplications.Thechaptersincludeadetailedsurveyofimage
processing-basedautomatedglaucomadetectiontechniquesandroleofde-noising,
recent study of dictionary learning-based image reconstruction techniques for
analyzingthebigmedicaldata,briefintroductionofquantumimageprocessingand
itsapplications,asegmentation-lessefficientAlzheimerdetectionapproach,object
recognition, image enhancements and de-noising techniques for emerging appli-
cations, improved performance of image compression approach, and automated
detectionofeye-relateddiseasesusingdigitalimageprocessing.
Part III of the book includes 11 interesting chapters dealing with multimedia
applications.Thechaptersincludetheextensivesurveyontheroleofmultimediain
medicineandmultimediaforensicclassification,afingerprint-basedauthentication
system for e-health security, and analysis of recently developed deep learning
techniques for emotion and activity recognition. Further, the book introduces a
case study on the change of ECG according to time for user identification, role
of multimedia in big data, cloud computing, the Internet of things (IoT), and
blockchainenvironmentindetailforreal-lifeapplications.
To conclude, we would like to sincerely thank all the authors for submitting
theirhigh-qualitychapterstothisbookandthelargenumberofpotentialreviewers
who have participated in the review process and provided helpful comments and
suggestionstotheauthorstoimprovetheirchapters.
We especially thank the Multimedia Systems and Applications Series Editor,
Prof.BorkoFurht,forhiscontinuoussupportandgreatguidance.
We are also grateful to Prof. Saraju P. Mohanty, Department of Computer Sci-
enceandEngineeringUniversityofNorthTexas,Denton,TX,forhisinspirational
forewordforthebook.
We would also like to thank the publishers at Springer, in particular Susan
Lagerstrom-Fife, Senior Publishing Editor/CS Springer, for their helpful guidance
andencouragementduringthecreationofthisbook.
We are sincerely thankful to all authors, editors, and publishers whose works
havebeenciteddirectly/indirectlyinthisbook.
We believe that our book will be helpful to the senior undergraduate and
graduatestudents,researchers,industryprofessionals,healthcareprofessionals,and
providers working in the area demanding state-of-the-art solutions for multimedia
applications.
Patna,India AmitKumarSingh
Varanasi,India AnandMohan
Special Acknowledgments
The first author gratefully acknowledges the authorities of National Institute of
TechnologyPatna,India,fortheirkindsupporttocomeupwiththisbook.
ThesecondauthorgratefullyacknowledgestheauthoritiesofIndianInstituteof
Technology (BHU), Varanasi, India, for their kind support to come up with this
book.
ix
Contents
PartI MultimediaSecurity
1 IntroductiontoMultimediaToolsandApplications.................... 3
Abdul Rahaman Wahab Sait, J. Uthayakumar, K. Shankar,
andK.SatheshKumar
2 AnOverviewofBiometricsMethods..................................... 15
Muhammad Sharif, Mudassar Raza, Jamal Hussain Shah,
MussaratYasmin,andStevenLawrenceFernandes
3 SIE:AnApplicationtoSecureStereoImagesUsingEncryption ..... 37
SanojKumarandGauravBhatnagar
4 ExampleBasedPrivacy-PreservingVideoColorGrading............. 63
AmiteshSinghRajputandBalasubramanianRaman
5 ANovelWatermarkingTechniqueforMultimediaSecurity .......... 89
SatendraPalSinghandGauravBhatnagar
6 A Secure Medical Image Watermarking Technique for
E-HealthcareApplications................................................. 119
NasirN.Hurrah,ShabirA.Parah,andJavaidA.Sheikh
7 HybridTransformsBasedObliviousFragileWatermarking
Techniques................................................................... 143
GeetaKasana
8 Performance Analysis of Invariant Quaternion Moments
inColorImageWatermarking............................................ 167
KhalidM.HosnyandMohamedM.Darwish
9 SecurityofBiometricandBiomedicalImagesUsingSparse
DomainBasedWatermarkingTechnique................................ 209
RohitThanki,SurekhaBorra,andDevenTrivedi
xi
xii Contents
10 PerformanceAnalysisofImageEncryptionMethodsUsing
Chaotic,MultipleChaoticandHyper-ChaoticMaps................... 233
T.GopalakrishnanandS.Ramakrishnan
11 PerceptualHashFunctionforImagesBasedonHierarchical
OrdinalPattern............................................................. 267
ArambamNeelimaandKh.ManglemSingh
12 Hash Function Based Optimal Block Chain Model for
theInternetofThings(IoT) ............................................... 289
AndinoMaseleno,MariniOthman,P.Deepalakshmi,K.Shankar,
andM.Ilayaraja
13 An Adaptive and Viable Face Identification for Android
MobileDevices.............................................................. 301
TehseenMehraj,BurhanUl IslamKhan,RashidahF.Olanrewaju,
FarhatAnwar,andAhmadZamani BinJusoh
14 RealizationofChaos-BasedPrivateMultiprocessorNetwork
ViaUSARTofEmbeddedDevices........................................ 323
SivaJanakiraman,K.Thenmozhi,JohnBosco BalaguruRayappan,
V.MoorthiParamasivam,andRengarajanAmirtharajan
15 Robust and Secure Hiding Scheme for Open Channel
TransmissionofDigitalImages ........................................... 341
HarshVikramSinghandPurnimaPal
PartII MultimediaProcessing
16 Image Processing Based Automated Glaucoma Detection
TechniquesandRoleofDe-Noising:ATechnicalSurvey.............. 359
SimaSahu,HarshVikramSingh,BasantKumar,AmitKumarSingh,
andPrabhatKumar
17 AStudyonDictionaryLearningBasedImageReconstruction
TechniquesforBigMedicalData ......................................... 377
ShailendraTiwari,KavkiratKaur,andK.V.Arya
18 QuantumImageProcessingandItsApplications....................... 395
J.J.Ranjani
19 3-DShapeReconstructionBasedCTImageEnhancement............ 413
ManojDiwakarandPardeepKumar
20 ASegmentation-LessEfficientAlzheimerDetectionApproach
UsingHybridImageFeatures............................................. 421
SitaraAfzal,MubashirJaved,MuazzamMaqsood,FarhanAadil,
SeungminRho,andIrfanMehmood