Details

Multimedia Security 2


Multimedia Security 2

Biometrics, Video Surveillance and Multimedia Encryption
1. Aufl.

von: William Puech

126,99 €

Verlag: Wiley
Format: PDF
Veröffentl.: 24.05.2022
ISBN/EAN: 9781394150380
Sprache: englisch
Anzahl Seiten: 320

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

Today, more than 80% of the data transmitted over networks and archived on our computers, tablets, cell phones or clouds is multimedia data – images, videos, audio, 3D data. The applications of this data range from video games to healthcare, and include computer-aided design, video surveillance and biometrics. It is becoming increasingly urgent to secure this data, not only during transmission and archiving, but also during its retrieval and use. Indeed, in today’s "all-digital" world, it is becoming ever-easier to copy data, view it unrightfully, steal it or falsify it. <br /><br /><i>Multimedia Security 2</i> analyzes issues relating to biometrics, protection, integrity and encryption of multimedia data. It also covers aspects such as crypto-compression of images and videos, homomorphic encryption, data hiding in the encrypted domain and secret sharing.
<p>Foreword by <i>Gildas Avoine</i> xi</p> <p>Foreword <i>by Cédric Richard</i> xiii</p> <p>Preface xv<br /><i>William PUECH</i></p> <p><b>Chapter 1 Biometrics and Applications </b><b>1<br /></b><i>Christophe CHARRIER, Christophe ROSENBERGER and Amine NAIT-ALI</i></p> <p>1.1 Introduction 1</p> <p>1.2 History of biometrics 3</p> <p>1.3 The foundations of biometrics 6</p> <p>1.3.1 Uses of biometrics 7</p> <p>1.3.2 Definitions 7</p> <p>1.3.3 Biometric modalities 8</p> <p>1.4 Scientific issues 10</p> <p>1.4.1 Presentation attacks 10</p> <p>1.4.2 Acquisition of new biometric data or hidden biometrics 12</p> <p>1.4.3 Quality of biometric data 14</p> <p>1.4.4 Efficient representation of biometric data 19</p> <p>1.4.5 Protecting biometric data 22</p> <p>1.4.6 Aging biometric data 24</p> <p>1.5 Conclusion 25</p> <p>1.6 References 26</p> <p><b>Chapter 2 Protecting Documents Using Printed Anticopy Elements </b><b>31<br /></b><i>Iuliia TKACHENKO, Alain TREMEAU and Thierry FOURNEL</i></p> <p>2.1 Introduction 31</p> <p>2.2 Document authentication approaches: an overview 33</p> <p>2.3 Print test shapes 35</p> <p>2.3.1 Print test signatures 36</p> <p>2.3.2 Glyphs 38</p> <p>2.3.3 Guilloches 39</p> <p>2.4 Copy-sensitive graphical codes 41</p> <p>2.4.1 Copy detection pattern 42</p> <p>2.4.2 Two-level barcodes 44</p> <p>2.4.3 Watermarked barcodes 47</p> <p>2.4.4 Performance of CSGC authentication 48</p> <p>2.5 Conclusion 52</p> <p>2.6 References 52</p> <p><b>Chapter 3 Verifying Document Integrity </b><b>59<br /></b><i>Petra GOMEZ-KRAMER</i></p> <p>3.1 Introduction 59</p> <p>3.2 Fraudulent manipulation of document images 62</p> <p>3.2.1 Imitation 62</p> <p>3.2.2 Copy-and-paste of a region from the same document 62</p> <p>3.2.3 Copy-and-paste of a region from another document 63</p> <p>3.2.4 Deleting information 63</p> <p>3.3 Degradation in printed and re-scanned documents 64</p> <p>3.3.1 Degradations linked to the print process 65</p> <p>3.3.2 Degradations linked to scanning 66</p> <p>3.3.3 Degradation models 67</p> <p>3.4 Active approaches: protection by extrinsic fingerprints 68</p> <p>3.4.1 Watermarking a document 68</p> <p>3.4.2 Digital signatures 73</p> <p>3.5 Passive approaches: detecting intrinsic characteristics 76</p> <p>3.5.1 Printer identification 77</p> <p>3.5.2 Detecting graphical clues 80</p> <p>3.5.3 Other approaches 81</p> <p>3.6 Conclusion 82</p> <p>3.7 References 82</p> <p><b>Chapter 4 Image Crypto-Compression </b><b>91<br /></b><i>Vincent ITIER, Pauline PUTEAUX and William PUECH</i></p> <p>4.1 Introduction 91</p> <p>4.2 Preliminary notions 93</p> <p>4.2.1 The JPEG image format 93</p> <p>4.2.2 Introduction to cryptography 96</p> <p>4.3 Image encryption 100</p> <p>4.3.1 Naive methods 102</p> <p>4.3.2 Chaos-based methods 104</p> <p>4.3.3 Encryption-then-compression 105</p> <p>4.4 Different classes of crypto-compression for images 106</p> <p>4.4.1 Substitution-based crypto-compression 108</p> <p>4.4.2 Shuffle-based crypto-compression 108</p> <p>4.4.3 Hybrid crypto-compression 110</p> <p>4.5 Recompressing crypto-compressed JPEG images 113</p> <p>4.5.1 A crypto-compression approach robust to recompression 114</p> <p>4.5.2 Recompression of a crypto-compressed image 117</p> <p>4.5.3 Decoding a recompressed version of a crypto-compressed JPEG image 119</p> <p>4.5.4 Illustration of the method 122</p> <p>4.6 Conclusion 124</p> <p>4.7 References 124</p> <p><b>Chapter 5 Crypto-Compression of Videos </b><b>129<br /></b><i>Cyril BERGERON, Wassim HAMIDOUCHE and Olivier DEFORGES</i></p> <p>5.1 Introduction 129</p> <p>5.1.1 Background 129</p> <p>5.1.2 Video compression 130</p> <p>5.1.3 Video security 131</p> <p>5.2 State of the art 131</p> <p>5.2.1 Naive encryption 132</p> <p>5.2.2 Partial encryption 133</p> <p>5.2.3 Perceptual encryption 134</p> <p>5.2.4 Crypto-compression methods 134</p> <p>5.2.5 Selective encryption methods 135</p> <p>5.3 Format-compliant selective encryption 136</p> <p>5.3.1 Properties 136</p> <p>5.3.2 Constant bitrate format compliant selective encryption 139</p> <p>5.3.3 Standardized selective encryption 140</p> <p>5.3.4 Locally applied selective encryption 143</p> <p>5.3.5 Decrypting selective encryption 149</p> <p>5.4 Image and video quality 150</p> <p>5.4.1 Experiments on encryption solutions 151</p> <p>5.4.2 Video quality: experimental results 154</p> <p>5.4.3 CSE: a complete real-time solution 162</p> <p>5.5 Perspectives and directions for future research 163</p> <p>5.5.1 Versatile Video Coding 163</p> <p>5.5.2 Immersive and omnidirectinal video 164</p> <p>5.6 Conclusion 165</p> <p>5.7 References 166</p> <p><b>Chapter 6 Processing Encrypted Multimedia Data Using Homomorphic Encryption </b><b>173<br /></b><i>Sebastien CANARD, Sergiu CARPOV, Caroline FONTAINE and Renaud SIRDEY</i></p> <p>6.1 Context 173</p> <p>6.2 Different classes of homomorphic encryption systems 176</p> <p>6.2.1 Partial solutions in classic cryptography 176</p> <p>6.2.2 Complete solutions in cryptography using Euclidean networks 178</p> <p>6.3 From theory to practice 181</p> <p>6.3.1 Algorithmics 183</p> <p>6.3.2 Implementation and optimization 183</p> <p>6.3.3 Managing and reducing the size of encrypted elements 189</p> <p>6.3.4 Security 191</p> <p>6.4 Proofs of concept and applications 193</p> <p>6.4.1 Facial recognition 193</p> <p>6.4.2 Classification 196</p> <p>6.4.3 RLE and image compression 201</p> <p>6.5 Conclusion 207</p> <p>6.6 Acknowledgments 207</p> <p>6.7 References 207</p> <p><b>Chapter 7 Data Hiding in the Encrypted Domain </b><b>215<br /></b><i>Pauline PUTEAUX and William PUECH</i></p> <p>7.1 Introduction: processing multimedia data in the encrypted domain 215</p> <p>7.1.1 Applications: visual secret sharing 216</p> <p>7.1.2 Applications: searching and indexing in encrypted image databases 217</p> <p>7.1.3 Applications: data hiding in the encrypted domain 218</p> <p>7.2 Main aims 219</p> <p>7.2.1 Digital rights management 220</p> <p>7.2.2 Cloud storage 220</p> <p>7.2.3 Preserving patient confidentiality 220</p> <p>7.2.4 Classified data 220</p> <p>7.2.5 Journalism 220</p> <p>7.2.6 Video surveillance 221</p> <p>7.2.7 Data analysis 221</p> <p>7.3 Classes and characteristics 221</p> <p>7.3.1 Properties 221</p> <p>7.3.2 Classic approaches to encryption 223</p> <p>7.3.3 Evaluation criteria 227</p> <p>7.4 Principal methods 231</p> <p>7.4.1 Image partitioning 231</p> <p>7.4.2 Histogram shifting 232</p> <p>7.4.3 Encoding 234</p> <p>7.4.4 Prediction 235</p> <p>7.4.5 Public key encryption 237</p> <p>7.5 Comparison and discussion 237</p> <p>7.6 A high-capacity data hiding approach based on MSB prediction 239</p> <p>7.6.1 General description of the method 239</p> <p>7.6.2 The CPE-HCRDH approach 243</p> <p>7.6.3 The EPE-HCRDH approach 245</p> <p>7.6.4 Experimental results for both approaches 249</p> <p>7.7 Conclusion 253</p> <p>7.8 References 253</p> <p><b>Chapter 8 Sharing Secret Images and 3D Objects </b><b>259<br /></b><i>Sebastien BEUGNON, Pauline PUTEAUX and William PUECH</i></p> <p>8.1 Introduction 259</p> <p>8.2 Secret sharing 261</p> <p>8.2.1 Classic methods 262</p> <p>8.2.2 Hierarchical aspects 264</p> <p>8.3 Secret image sharing 272</p> <p>8.3.1 Principle 272</p> <p>8.3.2 Visual cryptography 273</p> <p>8.3.3 Secret image sharing (polynomial-based) 274</p> <p>8.3.4 Properties 275</p> <p>8.4 3D object sharing 276</p> <p>8.4.1 Principle 276</p> <p>8.4.2 Methods without format preservation 276</p> <p>8.4.3 Methods with format preservation 277</p> <p>8.5 Applications for social media 280</p> <p>8.6 Conclusion 287</p> <p>8.7 References 288</p> <p>List of Authors 293</p> <p>Index 295</p>
William Puech is Professor of Computer Science at Université de Montpellier, France. His research focuses on image processing and multimedia security in particular, from its theories to its applications.

Diese Produkte könnten Sie auch interessieren:

OLED Display Fundamentals and Applications
OLED Display Fundamentals and Applications
von: Takatoshi Tsujimura
EPUB ebook
90,99 €
Classification, Parameter Estimation and State Estimation
Classification, Parameter Estimation and State Estimation
von: Bangjun Lei, Guangzhu Xu, Ming Feng, Yaobin Zou, Ferdinand van der Heijden, Dick de Ridder, David M. J. Tax
PDF ebook
101,99 €