Security Issues and Challenges in Multimedia Systems

Sabarinathan E.*, E. Manoj**
* Research Scholar, Erode, Tamilnadu, India.
** UG Scholar, Department of Electrical and Electronics Engineering, Coimbatore Institute of Technology, Coimbatore, Tamilnadu, India.
Periodicity:March - May'2016
DOI : https://doi.org/10.26634/jit.5.2.6001

Abstract

Due to rapid development in the network and communication field, it has become necessary to protect the unauthorized duplication of a confidential image. In today’s internet era, fortification of digital gratified during communication is a penurious. The Development of multimedia applications makes digital media to bring about conveniences to the people by easy processing of data. At the same time, it enables the illegal attackers to attack the works. For the protection of data, there has been a growing interest in developing effective techniques to discourage the unauthorized duplication of digital data among Cryptography, Watermarking and Steganography. This paper is a comprehensive review of diverse image processing methods and enormous number of interrelated solicitations in various disciplines, including various cryptography, Steganography, watermarking techniques. In this paper, different existing techniques are discussed along with their drawbacks future scope.

Keywords

Watermarking, Information Hiding, Steganography, Cryptography.

How to Cite this Article?

Sabarinathan. E and Manoj. E (2016). Security Issues and Challenges in Multimedia Systems. i-manager’s Journal on Information Technology, 5(2), 27-33. https://doi.org/10.26634/jit.5.2.6001

References

[1]. Sabarinathan, E., Manoj, E., (2015). “FPGA Implementation of Shearlet Transform Based Invisible Image Watermarking Algorithm”. In: i-manager’s Journal on Pattern Recognition, Vol.2, No. 2, pp.19-28.
[2]. Zhang, J., Li, J., Zhang, L., (2001). “Video watermark technique in motion vector”. In: Proceedings of XIV Symposium on Computer Graphics and Image Processing, pp. 179-182.
[3]. Fotopoulos, V., Skodras, A. N., (2003). “Transform domain watermarking: Adaptive selection of the watermarks position and length”. In: Proceedings of Visual Communications and Image Processing, VCIP 2003.
[4]. Kapotas, S.K., Varsaki, E.E., Skodras, A.N., (2007). “Data hiding in H.264 encoded video sequences”. In: IEEE International Workshop on Multimedia Signal Processing (MMSP), Chania, Greece, October 13.
[5]. I. K. Kim, J. Min, T. Lee, W. J. Han, J. H. Park, (2012). "Block partitioning structure in the HEVC standard”. IEEE Trans. on Circuits and Syst. for Video Technol., Vol. 22, No. 12, pp. 1697-1706.
[6]. Anumol, T., J., Binson, V., A.,Soumya, R., (2013). “FPGA Implementation of Low Power, High Speed, Area Efficient Invisible Image Watermarking Algorithm for Images”. In: International Journal of Scientific and Engineering Research, Vol. 4, No. 8.
[7]. Arathi, C., Chandra, M., (2012). “Authentication of Images Through Lossless Watermarking Technique with the Aid of Elliptic Curve Cryptography (ECC)”. In: International Journal of computer applications, Vol. 57, No. 6, pp. 17- 25.
[8]. Baisa, G., (2011). “Wavelet based color image watermarking scheme giving high robustness and exact correlation”. In: International Journal of Emerging Trends in Engineering and Technology, Vol. 1, No. 1, pp. 23-30.
[9]. Devapriya, M., Ramar, K., (2010). “Statistical Image Watermarking In DWT with Capacity Improvement”. In: Global Journal of Computer Science and Technology, Vol. 10, No. 2, pp. 20-24.
[10]. Dinu, C., (2011). “Improved embedding for prediction-based reversible watermarking”. In: IEEE Transactions on Information Forensics and Security, Vol. 6, No. 3, pp. 873-882.
[11]. Jih, P., Che, W., Wei, J., and Hung, H., (2010). “Watermarking technique based on DWT associated with embedding rule”. In: International Journal of Circuits, Systems and Signal Processing, Vol. 4, No.2, pp. 72-82.
[12]. Chae, J.J., and Manjunath, B.S., (1999). “Data hiding in video”. In: IEEE Proceedings of International Conference on Image Processing (ICIP), pp. 243-246.
[13]. Sandeep, K., and Rajiv, B., (2013). “Enhanced Technique for Watermarking using MFHWT”. In: International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 3, No.5, pp. 1199-1202.
[14]. Umaamaheshvari, A., and Thanushkodi, K., (2012). “A novel watermarking technique based on visual cryptography”. In: International Journal of Advanced Research in Computer Engineering and Technology, Vol. 1, No. 7, pp. 70-74.
[15]. Yang, C., and Tsai, M., (2010). “Improving histogrambased reversible data hiding by interleaving predictions”. In: IET Image Process, Vol. 4, No. 4, pp. 223-234.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.