Issues and Challenges in Security Based Computer Vision Systems

Sabarinathan E.*, E. Manoj**
* Research Scholar, Erode, Tamil Nadu, India.
** UG Scholar, Department of Electrical and Electronics Engineering, Coimbatore Institute of Technology, Tamilnadu, India.
Periodicity:August - October'2015
DOI : https://doi.org/10.26634/jes.4.3.4897

Abstract

High speed computer networks, the Internet and the World Wide Web have developed the way in which digital data is dispersed. The extensive and informal entrees to hypermedia fillings and prospect to make limitless reproduction, deprived of loss of substantial loyalty, have interested the vital for a numerical privileges organization. The extensive use of the Internet and World Wide Web has altered the way digital data is felt. The tranquil entree of images, musical leaflets and movies has adapted the growth of data hiding, by insertion with importance on copyright protection, contentbased authentication, tamper proofing, annotation and covert communication. Data hiding deals with the capability of embedding data into a digital cover with a least amount of perceivable dilapidation, i.e., the entrenched data is invisible or inaudible to a mortal spectator. This paper is a full review of miscellaneous image processing approaches and huge number of interconnected solicitations. In this paper, the dissimilar present methods are deliberated with the problems of the current system and also has elucidated their forthcoming scope.

Keywords

Watermarking, Information Hiding, Steganography, Cryptography.

How to Cite this Article?

SabariNathan.E., and Manoj.E., (2015). Issues and Challenges in Security Based Computer Vision Systems. i-manager’s Journal on Embedded Systems, 4(3), 31-37. https://doi.org/10.26634/jes.4.3.4897

References

[1]. Sabarinathan, E, and Manoj, E., (2015). “FPGA Implementation of Shearlet Transform Based Invisible Image Watermarking Algorithm”. i-manager’s Journal on Pattern Recognition, Vol. 2, No. 2, pp. 19-28.
[2]. Z. Shahid, M. Chaumont, and W. Puech, (2011). "Fast protection of H.264/AVC by selective encryption of CAVLC and CABAC for I and P frames". IEEE Trans. Circuits Syst. Video Technol, Vol. 21, No. 5, pp. 565–576.
[3]. Tomaz, Andrej, (2012). “Block–wise authentication method for digital images”. Journal of Electrical Engineering, Vol. 63, pp. 289–295, ISSN (Online), ISSN (Print) 1335-3632, DOI: 10.2478/v10187-012-0042-6.
[4]. Giannoula, A, and Hatzinakos, (2003). “Compressive data hiding for video signals”. ICIP 2003, International Conference, ISSN: 1522-4880, PRINT ISBN: 0-7803-7750-8.
[5]. Hongmei Liu, and Jiwu Huang, (2005). “DWT based video data hiding robust to MPEG”. Int. J. Image Grap, Vo. 05,No. 111, DOI:10.1142/S0219467825001689.
[6]. Dima Profrock, and Henryk Richter, (2005). “H.264/AVC video authentication using skipped macroblocks for an erasable watermark”. Proc. SPIE 5960,Visual Communication and Image Processing 2005, DOI:10.1117/12.632709
[7]. Changyong Xu, and Xijian Ping, (2006). “Stegography in compressed video stream”. ICICI, Vol.1, pp. 269-272
[8]. Lian, Liu,Ren, (2007). “Commutative encryption and watermarking in video compression”. IEEE. Trans. Circuits and Systems for Video Technology, Vol. 17, No. 6, pp.774- 778.
[9]. Shiguo Lian, and Zhongxuan Liu, (2007). “On the performance of joint fingerprint embedding and decryption scheme”. Computer Science Multimedia.
[10]. Arup Kumar Bhaumik, and Minkyu Choi, (2009). “Data hiding in video”. SERSC, Vol. 2,No. 2.
[11]. Melih Pazarci, and Vadi Dipcin, (2012).“Data embedding in technique for 8 bit color images”. DOI: 10.5120/13614-1384.
[12]. Paulpandi, and Meyyappan, (2012). “Hiding messages using motion vector technique. In IJETT, Vol. 3,No. 3.
[13]. Manisha Yadav, and Mauli Joshi, (2013). “Improved secure data transfer. IJARCSSE, Vol. 3.
[14]. Mahsa T. Pourazad, and Colin Doutre, (2012). “HEVC: The new gold for video compression”. IEEE Consumer Electronics Magazine.
[15]. Chae,J.J., and Manjunath, B.S. (1999). “Data Hiding th in Video”. In Proc of 6 International Conference on Image Processing ,Vol.1 pp.311-315.
[16].Zhang,J.,Li.J and Zhang. L. (2001). “ Video Watermark technique in motion vector”. Proc of XIV Brazilian Symposium, IEEE, pp.179-182.
[17]. Fotopoulos, V and Skodras, A.N. (2003). “Digital Image Watermarking. An overview”. EURASIP Newsletter, Vol.14, No.4.
[18].Kapotas.S.K and Skodras, A.N. (2008). “A new data hiding scheme for scene change detection in H.264 encoded video sequences”. IEEE International Conference on Multimedia.
[19].Taehyun Kim,Kyungoh Park and Youpyo Hong, (2012). “Video Watermarking Technique for H. 264 AVC”. Optical Engineering, Vol. 51 No. 4.
[20].Arathi Chitla and Chandra M Mohan, (2012). “Authentication of images through lossless Watermarking (LWM) Technique with the aid of Elliptic curve Cryptography (ECC)”. International Journal of computer science Applications. Vol. 57, No. 6, pp. 17-25.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.