Security in Digital Images: From Information Hiding Perspective

Due to the swift growth of the using of the digital multimedia in the internet these days, the security in digital images has become a very important issue. Lately, significant attentions are given by many researchers in the field of the security for digital images, and several image encryption techniques have been developed to improve the security levels of these images. Different techniques can be applied to protect intellectual property rights for digital images and prohibit illegal copying. The aim of this chapter is to introduce the most important techniques that have been developed to implement the security in digital images such as digital watermarking and image steganography.

[1]  Ahmed H. Tewfik,et al.  Transparent robust image watermarking , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[2]  Vani Kalloo,et al.  An Exploration of Developing Mathematics Content for Mobile Learning , 2015 .

[3]  Gunver Majgaard,et al.  Teaching Design of Emerging Embodied Technologies , 2014 .

[4]  Dimitris Kanellopoulos,et al.  Recent Advances in Multimedia Information System Security , 2009, Informatica.

[5]  Yong-Huai Huang,et al.  Hiding digital watermarks using multiresolution wavelet transform , 2001, IEEE Trans. Ind. Electron..

[6]  Huaiqing Wang,et al.  Cyber warfare: steganography vs. steganalysis , 2004, CACM.

[7]  Rajeev Srivastava,et al.  Detection of Cancer from Microscopic Biopsy Images Using Image Processing Tools , 2014 .

[8]  Tomás Pevný,et al.  Merging Markov and DCT features for multi-class JPEG steganalysis , 2007, Electronic Imaging.

[9]  Gary Friedman,et al.  The trustworthy digital camera: restoring credibility to the photographic image , 1993 .

[10]  Saraju P. Mohanty,et al.  Hardware assisted watermarking for multimedia , 2009, Comput. Electr. Eng..

[11]  Arun Kumar Yadav,et al.  A Survey on Digital Image Steganography and Steganalysis , 2013 .

[12]  Carlos Munuera,et al.  Steganography and error-correcting codes , 2007, Signal Process..

[13]  Sung-Hwan Jung,et al.  A survey of watermarking techniques applied to multimedia , 2001, ISIE 2001. 2001 IEEE International Symposium on Industrial Electronics Proceedings (Cat. No.01TH8570).

[14]  Shivani Khurana,et al.  A Review on Digital Image Watermarking , 2013 .

[15]  Chin-Chen Chang,et al.  Robust authentication scheme for protecting copyrights of images and graphics , 2002 .

[16]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[17]  Imre J. Rudas,et al.  From concept to market: Surgical robot development , 2015 .

[18]  D. Artz,et al.  Digital steganography: hiding data within data , 2001 .

[19]  Pedro Isaias,et al.  Emerging Research and Trends in Interactivity and the Human-Computer Interface , 2013 .

[20]  Lawrence O'Gorman,et al.  Protecting ownership rights through digital watermarking , 1996 .

[21]  Jean-Jacques Quisquater,et al.  Cryptology for digital TV broadcasting , 1995, Proc. IEEE.

[22]  Francisco Vicente Cipolla-Ficarra Advanced Research and Trends in New Technologies, Software, Human-Computer Interaction, and Communicability , 2013 .

[23]  G. Coatrieux,et al.  A Review of Image Watermarking Applications in Healthcare , 2006, 2006 International Conference of the IEEE Engineering in Medicine and Biology Society.

[24]  Tariq Jamil Steganography: the art of hiding information in plain sight , 1999 .

[25]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[26]  Kshama Pandey Mobile Education Mitigating the Heavy Magnitude of Illiteracy in India , 2015 .

[27]  M. Zamani,et al.  An Introduction to Image Steganography Techniques , 2012, 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT).

[28]  Valentina Nisi,et al.  Experience Prototyping: Gathering Rich Understandings to Guide Design , 2012 .

[29]  Panayiotis Zaphiris,et al.  Human computer interaction : concepts, methodologies, tools, and applications , 2009 .

[30]  Frank Y. Shih,et al.  Robust watermarking and compression for medical images based on genetic algorithms , 2005, Inf. Sci..

[31]  Simon Nyaga Mwendia,et al.  Culture aware M-Learning classification framework for African countries , 2014 .

[32]  Bin Li,et al.  A Survey on Image Steganography and Steganalysis , 2011, J. Inf. Hiding Multim. Signal Process..

[33]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[34]  W. J. Dowling,et al.  Watermarking digital images for copyright protection , 1996 .

[35]  Harold Joseph Highland,et al.  Data encryption: A non-mathematical approach , 1997, Comput. Secur..

[36]  Ioannis Pitas,et al.  A method for signature casting on digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.