Multimedia Security Through 1D Chaotic Systems: Review and Analysis

Multimedia Security Through 1D Chaotic Systems: Review and Analysis

Achraf Daoui, Ahmed A. Abd El-Latif
DOI: 10.4018/978-1-6684-7216-3.ch001
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The use of 1D chaotic maps in multimedia security applications is becoming increasingly attractive due to their advantages, including the high sensitivity to both initial and control parameters, rich dynamical behavior and ease of implementation for both software and hardware. This chapter presents a survey and analysis of recent multimedia encryption, watermarking, zero-watermarking and data hiding schemes involving the use of 1D chaotic maps. The present work also attempts to identify some drawbacks of existing 1D chaotic maps and multimedia security schemes involved the use of such maps, with suggestions for overcoming the identified limitations.
Chapter Preview
Top

1. Introduction

Multimedia data such as text, images, audio and video, or their combination, are widely used in real-life situations. Indeed, Multimedia is used in a variety of real-life situations, including: education (Abdulrahaman et al., 2020), business (Koko & Ogechi, 2019), communication (Sodhro et al., 2019), healthcare (Mahajan & Junnarkar, 2023), internet of things (IoT) (Nauman et al., 2020), manufacturing (Ko et al., 2021), etc. However, sharing multimedia content over unsecured communication channels is generally associated with several major problems, including: (i) Copyright issues: multimedia content is often protected by copyright law, and any unauthorized use of this content may constitute copyright infringement (Agilandeeswari et al., 2023). Examples of such issues include the unauthorized downloading, sharing or the use of copyrighted multimedia content without permission (Qureshi & Megías Jiménez, 2021). (ii) Data security concerns, as multimedia data can be voluminous and challenging to protect against manipulation by unauthorized parties (Taloba et al., 2023). This problem can cause serious damage to companies and organizations that use multimedia data (Sood, 2020). (iii) Privacy problems (Ma et al., 2019) as the multimedia data can be used to track people's movements, activities and so on. This can be challenging for the privacy-conscious of individuals (Liu et al., 2019). It is therefore extremely important to protect multimedia data from unauthorized access, modification or distribution (Dhar et al., 2022). To this end, multimedia security applications can be successfully incorporated. These applications include watermarking (Yamni, Daoui, Karmouni et al, 2020), zero-watermarking (Yamni, Karmouni, Daoui et al, 2020), encryption (Daoui, 2022)–(Abd EL-Latif et al., 2019), data hiding (Abd-El-Atty et al., 2020), (El-Latif et al., 2018) and multi-purpose (hybrid) applications (Daoui, Karmouni, El ogri et al, 2022)–(Wang, Song, & El-Latif, 2022). Figure 1 illustrates the main applications involved for multimedia security purposes.

Figure 1.

Overview on multimedia security applications

978-1-6684-7216-3.ch001.f01

Watermarking is generally a technology that incorporates invisible data, called the watermark, into a multimedia file (image, video, audio, etc.) for the purposes of copyright protection and authentication (Amrit & Singh, 2022). In the literature, various types of watermarking schemes can be found, such as robust (Amrit & Singh, 2022), fragile (Molina-Garcia et al., 2020) and semi-fragile watermarking (Lefèvre et al., 2022). Robust watermarking schemes are generally designed to resist various attacks (geometric, noise, filtering, compression, etc.) (Li & Zhang, 2020). This type of watermark is often used for copyright protection. Fragile watermarking schemes are generally designed to be sensitive to minor modifications to the media file (Benrhouma et al., 2016). This watermarking kind is often used for authentication (Gul & Ozturk, 2021). Semi-fragile watermarking can be seen as a compromise between robust and fragile watermarking. This watermarking type is designed to resist some distortions caused by noise, compression, etc. However, is also sensitive to intentional attack (Agilandeeswari et al., 2023). Semi-fragile watermarking is often used for tracking and fingerprinting applications. In this application, it is essential that the watermark should be protected against unauthorized access or modification, in order to guarantee the security features of the designed watermarking scheme.

Complete Chapter List

Search this Book:
Reset