Summary
In this chapter we study how we can secure multimedia content against copyrights infringements. The basic tools in this area, are steganography and digital watermarks. After introducing the basic notions of steganography and digital watermarking, we study the currently used techniques, focusing mainly on the protection of image contents, and discuss the security that they can offer to the protected content.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Z. Yuehua, C. Guixian, D. Yunhai, “An image watermark algorithm based on discrete cosine transform block classifying”, ACM International Conference Pro-ceeding Series, vol. 85 archive, Proceedings of the 3rd international conference on information security 2004.
M. Barni, F. Bartolini, A. Piva, “Improved wavelet-based watermarking through pixel-wise masking”, IEEE Transactions on Image Processing, 10(5), May 2001.
H. Daren, L. Jiufen, H. Jiwu, L. Hongmei, “A DWT-based image watermarking algorithm”, ICME 2001. IEEE International Conference on Multimedia and Expo, 2001, 22-25 Aug. 2001, pp. 313-316.
J. Fridrich, T. Pevny, “Determining the stego algorithm for JPEG images”, Special Issue of IEEE Proceedings - Information Security, 153(3), pp. 75-139, 2006.
J. Fridrich, M. Goljan, D. Hogea, “Steganalysis of JPEG images: breaking the F5 algorithm”, Fifth Information Hiding Workshop, Noordwijkerhout, The Netherlands, 79 October 2002, pp. 310-323.
D. Kirovski, F.A.P. Petitcolas, “Blind pattern matching attack on watermarking systems”, IEEE Transaction on Signal Processing, 51(4), pp. 1045-1053, April 2003.
F.A.P. Petitcolas, “Watermarking schemes evaluation”. IEEE Signal Processing, 17(5), pp. 58-64, September 2000.
M. Kutter, F.A.P. Petitcolas, “Fair evaluation methods for image watermarking systems”, Journal of Electronic Imaging, 9(4), pp. 445-455, October 2000.
F.A.P. Petitcolas, R.J. Anderson, M.G. Kuhn, “Information hiding a survey”. Proceedings of the IEEE, 87(7), 1062-1078, July 1999.
R.J. Anderson, F.A.P. Petitcolas, “On the limits of steganography”, IEEE Jour-nal of Selected Areas in Communications, 16(4), 474-481 , May 1998. Special Issue on Copyright & Privacy Protection. ISSN 0733-8716.
J. Fridrich, R. Du, “Secure steganographic methods for palette images”, Pro-ceedings of the Third Information Hiding Workshop, LNCS, vol. 1768. Springer-Verlag, Berlin Heidelberg New York, 2000, pp. 47-60. PostScript, MS Word 97.
J. Fridrich, R. Du, L. Meng, “Steganalysis of LSB encoding in color images”, ICME 2000, New York City, July 31-August 2, New York, USA. PostScript, MS Word 97.
J. Fridrich, M. Goljan, R. Du, “Steganalysis based on JPEG compatibility”, Special Session on Theoretical and Practical Issues in Digital Watermarking and Data Hiding, SPIE Multimedia Systems and Applications IV, Denver, CO, August 20-24, 2001, pp. 275-280. MS Word 2000.
J. Fridrich, M. Goljan, R. Du, “Reliable detection of LSB steganography in grayscale and color images,” Proceedings of the ACM Workshop on Multimedia and Security, Ottawa, Canada, October 5, 2001, pp. 27-30.
J. Fridrich, M. Goljan, R. Du, “Detecting LSB steganography in color and gray-scale images, Magazine of IEEE Multimedia Special Issue on Security, October-November 2001, pp. 22-28.
J. Fridrich, M. Goljan, “Practical steganalysis state of the art”, Proceedings of SPIE Photonics West, vol. 4675, Electronic Imaging 2002, Security and Water-marking of Multimedia Contents, San Jose, CA, January, 2002, pp. 1-13.
J. Fridrich, M. Goljan, D. Hogea, “Attacking the OutGuess”, Proceedings of the ACM Workshop on Multimedia and Security 2002, Juan-les-Pins, France, December 6, 2002.
J. Fridrich, M. Goljan, D. Hogea, “Steganalysis of JPEG images: breaking the F5 algorithm”, Fifth Information Hiding Workshop, Noordwijkerhout, The Netherlands, 79 October 2002, pp. 310-323.
J. Fridrich, M. Goljan, “Digital image steganography using stochastic modula-tion”, Proceedings of SPIE Electronic Imaging Santa Clara, CA, Jan. 2003, pp. 191-202.
J. Fridrich, M. Goljan, D. Soukal,“Higher-order statistical steganalysis of palette images”, Proceedings of SPIE Electronic Imaging Santa Clara, CA, Jan. 2003, pp. 178-190.
J. Fridrich, M. Goljan, D. Hogea, “New methodology for breaking stegano-graphic techniques for JPEGs”, Proceeding of SPIE Electronic Imaging Santa Clara, CA, Jan. 2003, pp. 143-155.
J. Fridrich, M. Goljan, D. Hogea, D. Soukal, “Quantitative steganalysis of dig-ital images: estimating the secret message length”, ACM Multimedia Systems Journal, Special Issue on Multimedia Security, 9(3), pp. 288-302, 2003.
J. Fridrich, M. Goljan, D. Soukal, “Searching for the stego key”, Proceedings of SPIE Electronic Imaging San Jose, CA, Jan. 2004.
J. Fridrich, M. Goljan, “On estimation of secret message length in LSB stegano-graphy in spatial domain”, Proceedings of SPIE Electronic Imaging San Jose, CA, Jan. 2004.
J. Fridrich, M. Goljan, D. Soukal, T. Holotyak, “Forensic steganalysis: deter-mining the stego key in spatial domain steganography”, Proceedings of SPIE Electronic Imaging San Jose, CA, January 16-20, pp. 631-642, 2005.
J. Fridrich, T. Pevny, “Towards multi-class blind steganalyzer for JPEG im-ages”, International Workshop on Digital Watermarking, LNCS, vol. 3710. Springer-Verlag, Berlin, pp. 39-53, 2005.
J. Fridrich, T. Holotyak, S. Voloshynovskiy, “Blind statistical steganalysis of additive steganography using wavelet higher order statistics”, Proceedings of the Ninth IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Sep. 19-21, 2005, Salzburg, Austria.
J. Fridrich, T. Pevny, “Multiclass blind steganalysis for JPEG images”, Pro-ceedings of SPIE Electronic Imaging, Photonics West, January 2006.
J. Fridrich, T. Pevny, “Determining the stego algorithm for JPEG images”, Special Issue of IEEE Proceedings - Information Security, 153(3), pp. 75-139, 2006.
J. Fridrich, T. Pevny, “Merging Markov and DCT features for multi-class JPEG steganalysis”, Proceedings of SPIE Electronic Imaging, Photonics West, January 2007, pp. 3-4.
N. Provos, P. Honeyman, “Detecting steganographic content on the Internet”, ISOC NDSS’02, San Diego, CA, February 2002.
H. Farid, “Detecting steganographic messages in digital images”, Technical Re-port, TR2001-412, Dartmouth College, Computer Science, 2001.
N. Provos, “Defending against statistical steganalysis”, Tenth USENIX Security Symposium. Washington, DC, August 2001.
N. Provos, “Probabilistic methods for improving information hiding”, CITI Technical Report 01-1, January 2001.
A. Westfeld, A. Pfitzmann, “Attacks on steganographic systems,” Lecture Notes in Computer Science, vol. 1768. Springer-Verlag, Berlin, 2000, pp. 61-75.
F. Hartung, B. Girod, “Fast public-key watermarking of compressed video”, Proceedings of IEEE International Conference on Image Processing, 1997.
J. Smith, C. Dodge, “Developments in steganography”, Third International Workshop on Information Hiding, A. Pfitzmann, ed. Springer-Verlag, Berlin, Sept. 1999, pp. 77-87.
J. Eggers, J. Su, B. Girod, “Public key watermarking by eigenvectors of linear transforms”, EUSIPCO (Tampere, Finland), Sept. 2000.
J. Eggers, J. Su, B. Girod, “Asymmetric watermarking schemes”, Sicherheit in Mediendaten (Tampere, Finland), Sept. 2000.
T. Furonm, P. Duhamel, “An asymmetric public detection watermarking tech-nique”, Third International Workshop on Information Hiding, A. Pfitzmann, ed. Springer-Verlag, Berlin, Sept. 1999, pp. 88-100.
T. Furon, I. Venturini, P. Duhamel, “A unified approach of asymmetric water-marking schemes”, Proceedings of SPIE, vol. 4314, Security and Watermarking of Multimedia Contents III, 2001, pp. 269-279.
A. Adelsbach, S. Katzenbeisser, H. Veith, “Watermarking schemes provably se-cure against copy and ambiguity attacks”, Proceedings of ACM CCS-10 Work-shop on Digital Rights Management, October 2003.
T. Furon et al., Security analysis, European Project IST-1999-10987 CERTI - MARK, Deliverable D.5.5 (2002).
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Patsakis, C., Alexandris, N. (2008). Multimedia Information Security. In: Tsihrintzis, G.A., Jain, L.C. (eds) Multimedia Services in Intelligent Environments. Studies in Computational Intelligence, vol 120. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-78502-6_10
Download citation
DOI: https://doi.org/10.1007/978-3-540-78502-6_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-78491-3
Online ISBN: 978-3-540-78502-6
eBook Packages: EngineeringEngineering (R0)