Skip to main content

Part of the book series: Studies in Computational Intelligence ((SCI,volume 120))

  • 509 Accesses

Summary

In this chapter we study how we can secure multimedia content against copyrights infringements. The basic tools in this area, are steganography and digital watermarks. After introducing the basic notions of steganography and digital watermarking, we study the currently used techniques, focusing mainly on the protection of image contents, and discuss the security that they can offer to the protected content.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Z. Yuehua, C. Guixian, D. Yunhai, “An image watermark algorithm based on discrete cosine transform block classifying”, ACM International Conference Pro-ceeding Series, vol. 85 archive, Proceedings of the 3rd international conference on information security 2004.

    Google Scholar 

  2. M. Barni, F. Bartolini, A. Piva, “Improved wavelet-based watermarking through pixel-wise masking”, IEEE Transactions on Image Processing, 10(5), May 2001.

    Google Scholar 

  3. H. Daren, L. Jiufen, H. Jiwu, L. Hongmei, “A DWT-based image watermarking algorithm”, ICME 2001. IEEE International Conference on Multimedia and Expo, 2001, 22-25 Aug. 2001, pp. 313-316.

    Google Scholar 

  4. J. Fridrich, T. Pevny, “Determining the stego algorithm for JPEG images”, Special Issue of IEEE Proceedings - Information Security, 153(3), pp. 75-139, 2006.

    Google Scholar 

  5. J. Fridrich, M. Goljan, D. Hogea, “Steganalysis of JPEG images: breaking the F5 algorithm”, Fifth Information Hiding Workshop, Noordwijkerhout, The Netherlands, 79 October 2002, pp. 310-323.

    Google Scholar 

  6. D. Kirovski, F.A.P. Petitcolas, “Blind pattern matching attack on watermarking systems”, IEEE Transaction on Signal Processing, 51(4), pp. 1045-1053, April 2003.

    Article  MathSciNet  Google Scholar 

  7. F.A.P. Petitcolas, “Watermarking schemes evaluation”. IEEE Signal Processing, 17(5), pp. 58-64, September 2000.

    Article  Google Scholar 

  8. M. Kutter, F.A.P. Petitcolas, “Fair evaluation methods for image watermarking systems”, Journal of Electronic Imaging, 9(4), pp. 445-455, October 2000.

    Article  Google Scholar 

  9. F.A.P. Petitcolas, R.J. Anderson, M.G. Kuhn, “Information hiding a survey”. Proceedings of the IEEE, 87(7), 1062-1078, July 1999.

    Article  Google Scholar 

  10. R.J. Anderson, F.A.P. Petitcolas, “On the limits of steganography”, IEEE Jour-nal of Selected Areas in Communications, 16(4), 474-481 , May 1998. Special Issue on Copyright & Privacy Protection. ISSN 0733-8716.

    Article  Google Scholar 

  11. J. Fridrich, R. Du, “Secure steganographic methods for palette images”, Pro-ceedings of the Third Information Hiding Workshop, LNCS, vol. 1768. Springer-Verlag, Berlin Heidelberg New York, 2000, pp. 47-60. PostScript, MS Word 97.

    Google Scholar 

  12. J. Fridrich, R. Du, L. Meng, “Steganalysis of LSB encoding in color images”, ICME 2000, New York City, July 31-August 2, New York, USA. PostScript, MS Word 97.

    Google Scholar 

  13. J. Fridrich, M. Goljan, R. Du, “Steganalysis based on JPEG compatibility”, Special Session on Theoretical and Practical Issues in Digital Watermarking and Data Hiding, SPIE Multimedia Systems and Applications IV, Denver, CO, August 20-24, 2001, pp. 275-280. MS Word 2000.

    Google Scholar 

  14. J. Fridrich, M. Goljan, R. Du, “Reliable detection of LSB steganography in grayscale and color images,” Proceedings of the ACM Workshop on Multimedia and Security, Ottawa, Canada, October 5, 2001, pp. 27-30.

    Google Scholar 

  15. J. Fridrich, M. Goljan, R. Du, “Detecting LSB steganography in color and gray-scale images, Magazine of IEEE Multimedia Special Issue on Security, October-November 2001, pp. 22-28.

    Google Scholar 

  16. J. Fridrich, M. Goljan, “Practical steganalysis state of the art”, Proceedings of SPIE Photonics West, vol. 4675, Electronic Imaging 2002, Security and Water-marking of Multimedia Contents, San Jose, CA, January, 2002, pp. 1-13.

    Chapter  Google Scholar 

  17. J. Fridrich, M. Goljan, D. Hogea, “Attacking the OutGuess”, Proceedings of the ACM Workshop on Multimedia and Security 2002, Juan-les-Pins, France, December 6, 2002.

    Google Scholar 

  18. J. Fridrich, M. Goljan, D. Hogea, “Steganalysis of JPEG images: breaking the F5 algorithm”, Fifth Information Hiding Workshop, Noordwijkerhout, The Netherlands, 79 October 2002, pp. 310-323.

    Google Scholar 

  19. J. Fridrich, M. Goljan, “Digital image steganography using stochastic modula-tion”, Proceedings of SPIE Electronic Imaging Santa Clara, CA, Jan. 2003, pp. 191-202.

    Google Scholar 

  20. J. Fridrich, M. Goljan, D. Soukal,“Higher-order statistical steganalysis of palette images”, Proceedings of SPIE Electronic Imaging Santa Clara, CA, Jan. 2003, pp. 178-190.

    Google Scholar 

  21. J. Fridrich, M. Goljan, D. Hogea, “New methodology for breaking stegano-graphic techniques for JPEGs”, Proceeding of SPIE Electronic Imaging Santa Clara, CA, Jan. 2003, pp. 143-155.

    Google Scholar 

  22. J. Fridrich, M. Goljan, D. Hogea, D. Soukal, “Quantitative steganalysis of dig-ital images: estimating the secret message length”, ACM Multimedia Systems Journal, Special Issue on Multimedia Security, 9(3), pp. 288-302, 2003.

    Google Scholar 

  23. J. Fridrich, M. Goljan, D. Soukal, “Searching for the stego key”, Proceedings of SPIE Electronic Imaging San Jose, CA, Jan. 2004.

    Google Scholar 

  24. J. Fridrich, M. Goljan, “On estimation of secret message length in LSB stegano-graphy in spatial domain”, Proceedings of SPIE Electronic Imaging San Jose, CA, Jan. 2004.

    Google Scholar 

  25. J. Fridrich, M. Goljan, D. Soukal, T. Holotyak, “Forensic steganalysis: deter-mining the stego key in spatial domain steganography”, Proceedings of SPIE Electronic Imaging San Jose, CA, January 16-20, pp. 631-642, 2005.

    Google Scholar 

  26. J. Fridrich, T. Pevny, “Towards multi-class blind steganalyzer for JPEG im-ages”, International Workshop on Digital Watermarking, LNCS, vol. 3710. Springer-Verlag, Berlin, pp. 39-53, 2005.

    Google Scholar 

  27. J. Fridrich, T. Holotyak, S. Voloshynovskiy, “Blind statistical steganalysis of additive steganography using wavelet higher order statistics”, Proceedings of the Ninth IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Sep. 19-21, 2005, Salzburg, Austria.

    Google Scholar 

  28. J. Fridrich, T. Pevny, “Multiclass blind steganalysis for JPEG images”, Pro-ceedings of SPIE Electronic Imaging, Photonics West, January 2006.

    Google Scholar 

  29. J. Fridrich, T. Pevny, “Determining the stego algorithm for JPEG images”, Special Issue of IEEE Proceedings - Information Security, 153(3), pp. 75-139, 2006.

    Google Scholar 

  30. J. Fridrich, T. Pevny, “Merging Markov and DCT features for multi-class JPEG steganalysis”, Proceedings of SPIE Electronic Imaging, Photonics West, January 2007, pp. 3-4.

    Google Scholar 

  31. N. Provos, P. Honeyman, “Detecting steganographic content on the Internet”, ISOC NDSS’02, San Diego, CA, February 2002.

    Google Scholar 

  32. H. Farid, “Detecting steganographic messages in digital images”, Technical Re-port, TR2001-412, Dartmouth College, Computer Science, 2001.

    Google Scholar 

  33. N. Provos, “Defending against statistical steganalysis”, Tenth USENIX Security Symposium. Washington, DC, August 2001.

    Google Scholar 

  34. N. Provos, “Probabilistic methods for improving information hiding”, CITI Technical Report 01-1, January 2001.

    Google Scholar 

  35. A. Westfeld, A. Pfitzmann, “Attacks on steganographic systems,” Lecture Notes in Computer Science, vol. 1768. Springer-Verlag, Berlin, 2000, pp. 61-75.

    Google Scholar 

  36. F. Hartung, B. Girod, “Fast public-key watermarking of compressed video”, Proceedings of IEEE International Conference on Image Processing, 1997.

    Google Scholar 

  37. J. Smith, C. Dodge, “Developments in steganography”, Third International Workshop on Information Hiding, A. Pfitzmann, ed. Springer-Verlag, Berlin, Sept. 1999, pp. 77-87.

    Google Scholar 

  38. J. Eggers, J. Su, B. Girod, “Public key watermarking by eigenvectors of linear transforms”, EUSIPCO (Tampere, Finland), Sept. 2000.

    Google Scholar 

  39. J. Eggers, J. Su, B. Girod, “Asymmetric watermarking schemes”, Sicherheit in Mediendaten (Tampere, Finland), Sept. 2000.

    Google Scholar 

  40. T. Furonm, P. Duhamel, “An asymmetric public detection watermarking tech-nique”, Third International Workshop on Information Hiding, A. Pfitzmann, ed. Springer-Verlag, Berlin, Sept. 1999, pp. 88-100.

    Google Scholar 

  41. T. Furon, I. Venturini, P. Duhamel, “A unified approach of asymmetric water-marking schemes”, Proceedings of SPIE, vol. 4314, Security and Watermarking of Multimedia Contents III, 2001, pp. 269-279.

    Google Scholar 

  42. A. Adelsbach, S. Katzenbeisser, H. Veith, “Watermarking schemes provably se-cure against copy and ambiguity attacks”, Proceedings of ACM CCS-10 Work-shop on Digital Rights Management, October 2003.

    Google Scholar 

  43. T. Furon et al., Security analysis, European Project IST-1999-10987 CERTI - MARK, Deliverable D.5.5 (2002).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Patsakis, C., Alexandris, N. (2008). Multimedia Information Security. In: Tsihrintzis, G.A., Jain, L.C. (eds) Multimedia Services in Intelligent Environments. Studies in Computational Intelligence, vol 120. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-78502-6_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-78502-6_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-78491-3

  • Online ISBN: 978-3-540-78502-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics