Security in Digital Images

Author(s):  
Mohammed A. Otair

Due to the swift growth of the using of the digital multimedia in the internet these days, the security in digital images has become a very important issue. Lately, significant attentions are given by many researchers in the field of the security for digital images, and several image encryption techniques have been developed to improve the security levels of these images. Different techniques can be applied to protect intellectual property rights for digital images and prohibit illegal copying. The aim of this chapter is to introduce the most important techniques that have been developed to implement the security in digital images such as digital watermarking and image steganography.

2015 ◽  
pp. 2035-2048
Author(s):  
Mohammed A. Otair

Due to the swift growth of the using of the digital multimedia in the internet these days, the security in digital images has become a very important issue. Lately, significant attentions are given by many researchers in the field of the security for digital images, and several image encryption techniques have been developed to improve the security levels of these images. Different techniques can be applied to protect intellectual property rights for digital images and prohibit illegal copying. The aim of this chapter is to introduce the most important techniques that have been developed to implement the security in digital images such as digital watermarking and image steganography.


2018 ◽  
pp. 81-95
Author(s):  
Mohammed A. Otair

Due to the swift growth of the using of the digital multimedia in the internet these days, the security in digital images has become a very important issue. Lately, significant attentions are given by many researchers in the field of the security for digital images, and several image encryption techniques have been developed to improve the security levels of these images. Different techniques can be applied to protect intellectual property rights for digital images and prohibit illegal copying. The aim of this chapter is to introduce the most important techniques that have been developed to implement the security in digital images such as digital watermarking and image steganography.


Author(s):  
Nisha Manral

Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet. For hiding secret information in images, there exists a large variety of steganographic techniques some are more complex than others and all of them have respective strong and weak points. Different applications have different requirements of the steganography technique used. For example, some applications may require absolute invisibility of the secret information, while others require a larger secret message to be hidden. This paper intends to give an overview of image steganography, its uses and techniques. It also attempts to identify the requirements of a good steganographic algorithm and briefly reflects on which steganographic techniques are more suitable for which applications.


2013 ◽  
pp. 691-712
Author(s):  
Dumitru Dan Burdescu ◽  
Liana Stanescu ◽  
Marian Cristian Mihaescu

The rapid growth of digital multimedia technologies brings tremendous attention to the field of digital authentication. Digital watermarking has become widely recognized as an effective measure for copyright protection of multimedia data. The owner or the distributor of the digital images can insert a unique watermark into copies for different customers or receivers, which will be helpful to identify the source of illegal copies. In this chapter the authors present two original spatial authentication techniques for digital images. These new algorithms yield an invisible watermark that is robust to various kinds of attacks. The main principle is the utilization of a virtual (2D or 3D) graph embedded into the digital images. Then, the colors of some vertices of the virtual graph are slightly modified for obtaining the watermark. The proposed techniques modify pixels or voxels of the object by a spatial watermark insertion scheme. These techniques can be used for all kinds of digital images, color or black and white, and the new algorithms produce an invisible robust watermark. The techniques lower the computational complexity that normally rises with the traditional watermarking algorithms. This approach reduces computation and implementation complexity of the algorithms. These techniques seem to replace advantages of the transform domain techniques with those of the spatial domain techniques.


Author(s):  
Farook Sattar ◽  
Dan Yu

Today, the Internet is a worldwide broadcasting capability, a mechanism for information dissemination and a medium for collaboration and interaction between individuals and their computers without regard for geographic location. With the rapid evolution of digital networks, digital libraries and World Wide Web (WWW) services, the convenient broadcasting or exposition of digital products on the global network leads easily to illegal copying, modifying and retransmission. The Internet has spawned many copyright issues involving multimedia content distribution. Let’s say an owner would like to sell or distribute a work to legal/registered users only. If the work were subsequently copied/redistributed illegally, how could the owner find who was responsible? Cryptographic techniques provide an effective solution for securing the delivery process and controlling the use of the contents that an user has obtained. However, with flawless transmission through the network, the contents after decryption are exactly the same as the original data. The contents can be copied perfectly infinite times. A user can also manipulate the contents. Digital watermarking (Arnold, Schmucker, & Wolthusen, 2003; Katzenbeisser & Petitcolas, 2000) offers a way to counter copyright piracy on global networks that are not solvable by cryptography. It provides proof and tracking capabilities to illegal copying and distribution of multimedia information. Most existing digital watermarking schemes are based on some assumptions for watermark detection and extraction. Some schemes require the previous knowledge of watermark locations, strengths or some thresholds. In some algorithms, the watermark is estimated with the help of the original watermark information. To ensure the robustness and invisibility of the watermark, the optimum embedding locations are usually different for different images. For a large image database, it could be a disadvantage to require watermark location and strength information for watermark detection and extraction. A large amount of information then needs to be stored. On the Internet, an owner would like to distribute multimedia data by signing different watermarks to different users in order to prevent illegal redistribution of the data by a legal user. In this scenario, watermark detection and extraction algorithms requiring information of either watermark embedding locations and strengths or the original watermark should fail, since one does not know exactly which watermark is embedded in a particular copy of the watermarked image. To this end, we present a new blind watermarking scheme (Yu, Sattar, & Ma, 2002; Yu & Sattar, 2003, 2005) based on Independent Component Analysis (ICA) (Hyvarinen, 1999; Hyvärinen & Oja, 1999; Lee, 1998) for color images, which can overcome existing problems of watermark detection and extraction as described above. The new ICA-based scheme is found to be efficient in the application of data tracking/tracing for multimedia distribution through the Internet against other digital watermarking schemes. By adopting this ICA-based watermarking scheme, an efficient multimedia distribution framework/protocol for copyright protection can be accomplished. This article is organized as follows: The watermark embedding and extraction algorithms for color image watermarking using the new ICA-based scheme are presented next, followed by a discussion and comments on the results, security issues, summary and future works.


Author(s):  
Aleksandra Guss

The fashion industry is characterized by a fast pace of changes and very dynamic development. Designers annually introduce several collections, each of them containing a few dozen silhouettes, which makes it extremely difficult to provide effective legal protection for their projects. In effect designs reminiscent of those presented on the catwalk appear, which currently, in the era of the Internet and social media, is happening quickly, often even before designer collections go on sale. Due to the lack of legal regulations created specifically for the fashion industry, this industry derives protection primarily from intellectual property rights. The article aims to present the significance of this branch of law for the fashion industry, as well as possible protection measures.


Author(s):  
O.V. Boychenko ◽  
O.Yu. Smirnova

The article considers the legal aspects of the existence of intellectual property on the Internet. The main regulatory documents governing the relationship between the use of intellectual property on the Internet are analyzed, such as: the WIPO international convention, the Civil Code of the Russian Federation, part 4; Decree of the Government of the Russian Federation of 09.02.2012; The latest edition of the Constitution of the Russian Federation. In the form of a structural and didactic scheme are presented: objects of intellectual property, means of individualization; an algorithm for the interaction of participants in the legislative process to seize illegal content. Features of the problems of protecting intellectual property rights on the Internet, the main causes of violation of intellectual property rights and ways of protecting intellectual property are presented. The losses of various sectors of society from Internet piracy are given. The basic tools of copyright infringement on the Internet are described, as well as existing methods of confirming copyright in content.


Author(s):  
Hanna Urazova ◽  
◽  
Yulia Gudzenko ◽  

The article presents a study of the problem of protection and enforcement of intellectual property rights, namely copyright and related rights. It is noted that the issue of protection and preservation of copyright and related rights in the modern world is very relevant and currently not fully resolved. The analysis of normative-legal documents in this sphere is carried out. In particular, the domestic legislation was studied, namely, the norms of the Civil and Criminal Codes of Ukraine, the Law of Ukraine "On Copyright and Related Rights", the Law of Ukraine "On State Support of Cinematography in Ukraine". International normative legal acts are analyzed. Namely: the World Intellectual Property Organization Copyright Treaty (BOIB Agreement) and the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS Agreement). The definition of "protection" is given, as well as the objects and subjects of copyright and related rights. The article also pays attention to the types of copyright and related rights protection: jurisdictional and non-jurisdictional. Two modern ways of copyright protection have been studied - copyright and copyleft. Civil law protection is analyzed: the grounds for a person to go to court to protect their intellectual property rights, the procedure for protection of infringed rights and ways to protect these rights are determined. It has been established that filing a claim against the infringer of copyright and related rights is not always an effective way of protection. Thus, the subjects of copyright and related rights often choose to protect their infringed rights. Problems related to the regulation, protection and proof of copyright infringement on the Internet have been identified. An analysis of case law on the protection of copyright and related rights. It has been found that courts do not always adequately protect related rights that have been violated on the Internet. The conclusions and prospects of development of protection and protection of copyright and related rights are given.


Sign in / Sign up

Export Citation Format

Share Document