Springer, 2017. — 483 p.
Through the recent years, innovative computational intelligence procedures and frameworks have been established as convenient techniques to address the various security issues. Computational intelligence approaches are widely used for modeling, predicting, and recognition tasks in several research domains. One of these is denoted by multimedia that finds enormous applications in security, entertainment, and health. Advancement in sensor technology, signal processing, and digital hardware lead to a variety of signal types including text, audio, animation, and video. Technological advancement in this media production and computer hardware/communications as well make information processing/transmission relatively simple and quick. However, the rate of exposure to various threats increases for multimedia data. Thus, providing security for multimedia data becomes an urgent challenging task.
Recently, various security mechanisms are developed to provide security for multimedia data, such as cryptography, steganography, and digital watermarking. Cryptographic techniques are used to protect digital data during the transmission from the sender to the receiver, but once it gets decrypted at the reception end, there is no control over the data for providing further security. In contrast, steganography is applied for secret communication between trusted parties with the limitation of payload. Moreover, digital watermarking uses the identity of the multimedia data owner. Thus, signal processing provides a major role in providing security for multimedia data.
This book consists of 21 chapters, including a brief discussion about the multimedia content security chapter followed by eight chapters that reported various aspects in the multimedia security domain. These chapters handled the intelligent security techniques for high-definition multimedia data as well as the morphing and steganography security techniques for information hiding, the digital watermarking as a solution for the multimedia authentication in addition to the representation of reversible watermarking with real-time implementation, and the comparison between singular value decomposition and randomized singular value decomposition– based watermarking. Furthermore, the concept and challenges of the biometric-based security systems were carried out followed by the evaluation of different cryptographic approaches in wireless communication network. In addition, this book contains another set of chapters that deal with the personal authentication and recognition systems in several applications, including personal authentication system based on hand images, surveillance system security using gait recognition, and face recognition under restricted constraints such as dry/wet face conditions, and the three-dimensional face identification using developed approach was also included. Thereafter, a proposed attendance recording system based on partial face recognition algorithm was conducted followed by the recognition of the human emotion that applied in surveillance video applications. Moreover, the concept of the security based on watermarking in the healthcare and medical applications and the pixel repetition-based high-capacity/reversible data hiding method for e-healthcare applications were included. Afterward, two chapters introduced several security issues for different types of multimedia contents, namely secured compressed data transmission over Global System for Mobile Communication (GSM) voice channel using wavelet transform and early tamper detection using joint stego-watermark approach. Finally, since biometrics has a great significant role in the security and authentication, the last chapter proposed a multifingerprint unimodel-based biometric authentication to support the cloud computing.
This book offered a precise concept and proposed approaches for the security in various applications combined with computational intelligence for multimedia security technologies. Based on the efforts done and the included contributions, it is expected very good endorsement from almost all readers of this book—from the graduated to postgraduate students’ levels and researchers, professionals, and engineering. We are the editors wishing this book will stimulate further research to develop several intelligent techniques in signal processing for multimedia security applications in the various domains based on algorithmic and computer-based approaches.
Part I Overview on Multimedia Data Security and Its EvaluationSecurity of Multimedia Contents: A Brief
A Survey on Intelligent Security Techniques for High-Definition Multimedia Data
Intelligent Morphing and Steganography Techniques for Multimedia Security
Information Hiding: Steganography
Digital Watermarking: A Potential Solution for Multimedia Authentication
Real-time Implementation of Reversible Watermarking
Comparative Approach Between Singular Value Decomposition and Randomized Singular Value Decomposition-based Watermarking
Biometric-Based Security System: Issues and Challenges
Parametric Evaluation of Different Cryptographic Techniques for Enhancement of Energy Efficiency in Wireless Communication Network
Part II Personal Authentication and Recognition SystemsHand Image Biometric Based Personal Authentication System
A Study on Security and Surveillance System Using Gait Recognition
Face Recognition Under Dry and Wet Face Conditions
Improved Approach for 3D Face Characterization
Attendance Recording System Using Partial Face Recognition Algorithm
Automatic Human Emotion Recognition in Surveillance Video
Part III Medical Security ApplicationsWatermarking in Biomedical Signal Processing
Pixel Repetition Technique: A High Capacity and Reversible Data Hiding Method for E-Healthcare Applications
Part IV Security for Various Multimedia Contents
A New Method of Haar and Db10 Based Secured Compressed Data Transmission Over GSM Voice Channel
StegNmark: A Joint Stego-Watermark Approach for Early Tamper Detection
Adaptive Color Image Watermarking Scheme Using Weibull Distribution
Multi-fingerprint Unimodel-based Biometric Authentication Supporting Cloud Computing