๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Multimedia Security, Volume 2: Biometrics, Video Surveillance and Multimedia Encryption

โœ Scribed by William Puech


Publisher
Wiley-ISTE
Year
2022
Tongue
English
Leaves
320
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


Today, more than 80% of the data transmitted over networks and archived on our computers, tablets, cell phones or clouds is multimedia data โ€“ images, videos, audio, 3D data. The applications of this data range from video games to healthcare, and include computer-aided design, video surveillance and biometrics. It is becoming increasingly urgent to secure this data, not only during transmission and archiving, but also during its retrieval and use. Indeed, in todayโ€™s "all-digital" world, it is becoming ever-easier to copy data, view it unrightfully, steal it or falsify it.

Multimedia Security 2 analyzes issues relating to biometrics, protection, integrity and encryption of multimedia data. It also covers aspects such as crypto-compression of images and videos, homomorphic encryption, data hiding in the encrypted domain and secret sharing.

โœฆ Table of Contents


Cover
Half-Title Page
Title Page
Copyright Page
Contents
Foreword by Gildas Avoine
Foreword by Cรฉdric Richard
Preface
Chapter 1. Biometrics and Applications
1.1. Introduction
1.2. History of biometrics
1.3. The foundations of biometrics
1.3.1. Uses of biometrics
1.3.2. Definitions
1.3.3. Biometric modalities
1.4. Scientific issues
1.4.1. Presentation attacks
1.4.2. Acquisition of new biometric data or hidden biometrics
1.4.3. Quality of biometric data
1.4.4. Efficient representation of biometric data
1.4.5. Protecting biometric data
1.4.6. Aging biometric data
1.5. Conclusion
1.6. References
Chapter 2. Protecting Documents Using Printed Anticopy Elements
2.1. Introduction
2.2. Document authentication approaches: an overview
2.3. Print test shapes
2.3.1. Print test signatures
2.3.2. Glyphs
2.3.3. Guilloches
2.4. Copy-sensitive graphical codes
2.4.1. Copy detection pattern
2.4.2. Two-level barcodes
2.4.3. Watermarked barcodes
2.4.4. Performance of CSGC authentication
2.5. Conclusion
2.6. References
Chapter 3. Verifying Document Integrity
3.1. Introduction
3.2. Fraudulent manipulation of document images
3.2.1. Imitation
3.2.2. Copy-and-paste of a region from the same document
3.2.3. Copy-and-paste of a region from another document
3.2.4. Deleting information
3.3. Degradation in printed and re-scanned documents
3.3.1. Degradations linked to the print process
3.3.2. Degradations linked to scanning
3.3.3. Degradation models
3.4. Active approaches: protection by extrinsic fingerprints
3.4.1. Watermarking a document
3.4.2. Digital signatures
3.5. Passive approaches: detecting intrinsic characteristics
3.5.1. Printer identification
3.5.2. Detecting graphical clues
3.5.3. Other approaches
3.6. Conclusion
3.7. References
Chapter 4. Image Crypto-Compression
4.1. Introduction
4.2. Preliminary notions
4.2.1. The JPEG image format
4.2.2. Introduction to cryptography
4.3. Image encryption
4.3.1. Naive methods
4.3.2. Chaos-based methods
4.3.3. Encryption-then-compression
4.4. Different classes of crypto-compression for images
4.4.1. Substitution-based crypto-compression
4.4.2. Shuffle-based crypto-compression
4.4.3. Hybrid crypto-compression
4.5. Recompressing crypto-compressed JPEG images
4.5.1. A crypto-compression approach robust to recompression
4.5.2. Recompression of a crypto-compressed image
4.5.3. Decoding a recompressed version of a crypto-compressed JPEG image
4.5.4. Illustration of the method
4.6. Conclusion
4.7. References
Chapter 5. Crypto-Compression of Videos
5.1. Introduction
5.1.1. Background
5.1.2. Video compression
5.1.3. Video security
5.2. State of the art
5.2.1. Naive encryption
5.2.2. Partial encryption
5.2.3. Perceptual encryption
5.2.4. Crypto-compression methods
5.2.5. Selective encryption methods
5.3. Format-compliant selective encryption
5.3.1. Properties
5.3.2. Constant bitrate format compliant selective encryption
5.3.3. Standardized selective encryption
5.3.4. Locally applied selective encryption
5.3.5. Decrypting selective encryption
5.4. Image and video quality
5.4.1. Experiments on encryption solutions
5.4.2. Video quality: experimental results
5.4.3. CSE: a complete real-time solution
5.5. Perspectives and directions for future research
5.5.1. Versatile Video Coding
5.5.2. Immersive and omnidirectinal video
5.6. Conclusion
5.7. References
Chapter 6. Processing Encrypted Multimedia Data Using Homomorphic Encryption
6.1. Context
6.2. Different classes of homomorphic encryption systems
6.2.1. Partial solutions in classic cryptography
6.2.2. Complete solutions in cryptography using Euclidean networks
6.3. From theory to practice
6.3.1. Algorithmics
6.3.2. Implementation and optimization
6.3.3. Managing and reducing the size of encrypted elements
6.3.4. Security
6.4. Proofs of concept and applications
6.4.1. Facial recognition
6.4.2. Classification
6.4.3. RLE and image compression
6.5. Conclusion
6.6. Acknowledgments
6.7. References
Chapter 7. Data Hiding in the Encrypted Domain
7.1. Introduction: processing multimedia data in the encrypted domain
7.1.1. Applications: visual secret sharing
7.1.2. Applications: searching and indexing in encrypted image databases
7.1.3. Applications: data hiding in the encrypted domain
7.2. Main aims
7.2.1. Digital rights management
7.2.2. Cloud storage
7.2.3. Preserving patient confidentiality
7.2.4. Classified data
7.2.5. Journalism
7.2.6. Video surveillance
7.2.7. Data analysis
7.3. Classes and characteristics
7.3.1. Properties
7.3.2. Classic approaches to encryption
7.3.3. Evaluation criteria
7.4. Principal methods
7.4.1. Image partitioning
7.4.2. Histogram shifting
7.4.3. Encoding
7.4.4. Prediction
7.4.5. Public key encryption
7.5. Comparison and discussion
7.6. A high-capacity data hiding approach based on MSB prediction
7.6.1. General description of the method
7.6.2. The CPE-HCRDH approach
7.6.3. The EPE-HCRDH approach
7.6.4. Experimental results for both approaches
7.7. Conclusion
7.8. References
Chapter 8. Sharing Secret Images and 3D Objects
8.1. Introduction
8.2. Secret sharing
8.2.1. Classic methods
8.2.2. Hierarchical aspects
8.3. Secret image sharing
8.3.1. Principle
8.3.2. Visual cryptography
8.3.3. Secret image sharing (polynomial-based)
8.3.4. Properties
8.4. 3D object sharing
8.4.1. Principle
8.4.2. Methods without format preservation
8.4.3. Methods with format preservation
8.5. Applications for social media
8.6. Conclusion
8.7. References
List of Authors
Index
EULA


๐Ÿ“œ SIMILAR VOLUMES


Multimedia Encryption and Watermarking
โœ Borko Furht, Edin Muharemagic, Daniel Socek (auth.) ๐Ÿ“‚ Library ๐Ÿ“… 2005 ๐Ÿ› Springer US ๐ŸŒ English

<p><P><STRONG>Multimedia Encryption and Watermarking </STRONG>presents a comprehensive survey of contemporary multimedia encryption and watermarking techniques, which enable a secure exchange of multimedia intellectual property. </P><P></P><P>Part I, Digital Rights Management (DRM) for Multimedia, i

Multimedia Encryption and Watermarking
โœ Borko Furht, Edin Muharemagic, Daniel Socek (auth.) ๐Ÿ“‚ Library ๐Ÿ“… 2005 ๐Ÿ› Springer US ๐ŸŒ English

<p><P><STRONG>Multimedia Encryption and Watermarking </STRONG>presents a comprehensive survey of contemporary multimedia encryption and watermarking techniques, which enable a secure exchange of multimedia intellectual property. </P><P></P><P>Part I, Digital Rights Management (DRM) for Multimedia, i

Deutscher Multimedia KongreรŸ โ€™96: Perspe
โœ Jรผrgen Rรผttgers (auth.), Prof. Dr. Ulrich Glowalla, Prof. Dr. Eric Schoop (eds.) ๐Ÿ“‚ Library ๐Ÿ“… 1996 ๐Ÿ› Springer-Verlag Berlin Heidelberg ๐ŸŒ German

<p>Schwerpunktthemen des 4. Deutschen Multimedia Kongresses und damit dieses Bandes sind das Internet, Interaktives TV, Telelearning, Electronic Banking, Electronic Publishing, Multimediales Standortmarketing, Multimedia und Recht, Advertising multimedial, Medizin und Telemedizin. Darรผber hinaus bie

Multimedia Video-Based Surveillance Syst
โœ Zeno Geradts, Jurrien Bijhold (auth.), Gian Luca Foresti, Petri Mรคhรถnen, Carlo S ๐Ÿ“‚ Library ๐Ÿ“… 2000 ๐Ÿ› Springer US ๐ŸŒ English

<p>Multimedia surveillance systems is an emerging field that includes signal and image processing, communications, and computer vision. <em>Multimedia Video-Based Surveillance Systems: Requirements, Issues and</em><em>Solutions</em>, combines the most recent research results from these areas for use