In recent years, the growth of the Internet along with multimedia data delivery, have caused the misuse and even alteration of the original digital content. As a security mechanism, digital watermarking has been used to protect digital content, traditionally in copyright protection applications, and more recently digital watermarking has been used in content enhancement applications. Regardless of the application, digital watermarking schemes always cause some level of signal degradation. There are however, certain applications as in the military or medical fields, where loss of information cannot be tolerated during the reconstruction of host signals, therefore conventional watermarking schemes do not satisfy the quality requirements. In order to reconstruct signals without loss of data, reversible watermarking is employed. Recent research in reversible watermarking has focused on either, the improvement of embedding capacity or the reduction of perceptual impact of the schemes, but scarcely exploring the robustness of reversible schemes. In this survey, we provide a deep review of reversible watermarking schemes and propose a new classification outline based on the robustness point of view. Finally, some future directions for reversible watermarking research are presented and open problems in robust reversible watermarking are outlined. INDEX TERMS Digital watermarking, multimedia content, reversible watermarking, robustness.
This work describes SenseCityVity, an approach to engage and support youth of a city in Mexico to investigate, document, and reflect upon urban problems though mobile crowdsourcing. SenseCityVity focused on the development of a mobile crowdsourcing platform; the deployment of an Urban Data Challenge, co--designed by our research team and actors to collect geo--localized images, audio and video; and the analysis, appropriation, and creative use of the collected data for community reflection and artistic creation. Our approach integrates mobile technology and community practices involving a large population of young people for urban engagement. The collective action generated a new multimedia data set that is rich in terms of content and is enabling a number of studies towards the understanding of the urban landscape of cities in the Global South.
Current chaotic encryption systems in the literature do not fulfill security and performance demands for real-time multimedia communications. To satisfy these demands, we propose a generalized symmetric cryptosystem based on N independently iterated chaotic maps (N-map array) periodically perturbed with a three-level perturbation scheme and a double feedback (global and local) to increase the system's robustness to attacks. The first- and second-level perturbations make cryptosystem extremely sensitive to changes in the plaintext data since the system's output itself (ciphertext global feedback) is used in the perturbation process. Third-level perturbation is a system reset, in which the system-key and chaotic maps are replaced for totally new values. An analysis of the proposed scheme regarding its vulnerability to attacks, statistical properties, and implementation performance is presented. To the best of our knowledge we provide a secure cryptosystem with one of the highest levels of performance for real-time multimedia communications.
Due to pervasive communication infrastructures, a plethora of enabling technologies is being developed over mobile and wired networks. Among these, video streaming services over IP are the most challenging in terms of quality, real-time requirements and security. In this paper, we propose a novel scheme to efficiently secure variable length coded (VLC) multimedia bit streams, such as H.264. It is based on code word error diffusion and variable size segment shuffling. The codeword diffusion and the shuffling mechanisms are based on random operations from a secure and computationally efficient chaos-based pseudo-random number generator. The proposed scheme is ubiquitous to the end users and can be deployed at any node in the network. It provides different levels of security, with encrypted data volume fluctuating between 5.5-17%. It works on the compressed bit stream without requiring any decoding. It provides excellent encryption speeds on different platforms, including mobile devices. It is 200% faster and 150% more power efficient when compared with AES software-based full encryption schemes. Regarding security, the scheme is robust to well-known attacks in the literature, such as brute force and known/chosen plain text attacks.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.