Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Cryptographic and information security approaches for images and videos
Ramakrishnan S., CRC Press, Inc., Boca Raton, FL, 2019. 986 pp. Type: Book (978-1-138563-84-1)
Date Reviewed: Nov 26 2019

Cryptography is the art of securing communications transmitted through insecure channels. It consists of mechanisms to keep the data confidential by preventing access to unapproved individuals, maintaining the integrity of the data through an ability to recognize alterations, authenticating the messages and senders, and ensuring that obligations associated with creation or transmission of the data are not deniable (nonrepudiation).

Various authors have contributed to this volume of 31 chapters on image and video security that cover a broad range of topics organized into five sections: encryption, watermarking, steganography, forensics, and biometrics.

Encryption is the key element of cryptography, and its various aspects, such as scrambling, chaotic methods, elliptic curve cryptography (ECC), attribute-based methods, phase retrieval, compressive sensing, video encoding, medical image encryption, and so on, are described in detail.

Watermarking embeds additional hidden data in the communication and has applications in copyright insurance, confirmation, e-trade, e-voting, and so on. Techniques and challenges related to the watermarking of text documents and hiding data in compressed images and videos are described, along with methods to analyze texture using efficient multi-criteria decision making (MCDM) and the very large-scale integration (VLSI) implementation of video watermarking and medical imaging applications.

Steganography refers to concealed correspondence inside other information, such that the original message is practically unaltered. Only the intended recipient will be aware of its presence, unlike in watermarking where the goal is to prevent others from eliminating the hidden message. Steganography is relevant in copyright control, smart ID applications, printers, and so on. Topics covered include the utilization of small S-Boxes (multiple output Boolean functions) for hiding information, a fractional Fourier transform method for electrocardiogram (ECG) steganography, a visual secret sharing scheme that makes use of an error-correction mechanism of QR code (two-dimensional barcode), reversible data hiding methods using image interpolation and edge detection, and medical data security.

Digital visual media forensics deals with the recovery, repair, investigation, evaluation, and interpretation of photographic and video evidence. Various image tampering techniques and detection methods are described. Considerations related to blockchain technology (which is decentralized and transparent) applied to multimedia are presented. Forgery detection methods are introduced; copy-move forgery in particular is examined in detail. A review of anti-forensics techniques (designed to mislead forensics analysis) in the context of image and video tampering is also included.

Biometrics is a quantitative measurement of biological features that uniquely identify an individual. Vulnerable points in biometric systems are studied, and cryptosystem, fuzzy vault, and fragile watermarking are considered as security enhancing alternatives. Fingerprint watermarking, fingerprint mosaicking, and video-based face recognition are discussed. A secure biometric-based authentication scheme is proposed for a cloud environment.

Because research into all these subjects has been undergoing rapid development and such study is of much practical significance, the combined effort of these experts to compile such a comprehensive collection of relevant material is commendable.

Each chapter is written in a self-contained manner and provides a survey of the related literature along with suggestions for future research. Some chapters include an informal introduction to the basics and can be helpful for beginners. Many chapters contain rigorous mathematics and are best suited to students and practitioners of cryptography.

Reviewer:  Paparao Kavalipati Review #: CR146799 (2004-0064)
Bookmark and Share
  Featured Reviewer  
 
Cryptographic Controls (D.4.6 ... )
 
 
Computability Theory (F.4.1 ... )
 
 
Computational Logic (F.4.1 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Cryptographic Controls": Date
Cryptology: machines, history and methods
Deavours C., Kahn D., Kruh L., Mellen G. (ed), Winkel B. (ed) Artech House, Inc., Norwood, MA,1989. Type: Divisible Book
Jan 1 1992
Transaction security system
Abraham D., Dolan G., Double G., Stevens J. (ed) IBM Systems Journal 30(2): 206-229, 1991. Type: Article
Mar 1 1992
Cryptography for computer security: making the decision
Fisher W. Computers and Security 3(3): 229-233, 1984. Type: Article
Jun 1 1985
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy