International Journal of Multimedia Intelligence and Security (5 papers in press)
A Novel Approach for Enhancing the Security of Information Content of an Image
by Jalesh Kumar, Nirmala Shivananda
Abstract: In this paper, a novel approach is proposed for securing the contents of an image. This approach is a combination of edge detection and encryption process. The proposed approach comprises four stages. In first stage, the input image is divided into blocks of equal size and shuffled. In second stage, the input image is divided into two sub images, image with edges and image without edge information. Canny edge detection algorithm is used for detecting edges in the input image. In third stage, image without edge information obtained from previous stage are encrypted using crossover and mutation operations. The encrypted image and image with edge information are fused in the final stage. The performance of the proposed method is measured in terms of correlation coefficient, histogram and entropy. Different types of attacks are carried out to prove the robustness of the approach. The results obtained are compared with method [Jalesh and Nirmala, 2013]. The comparative study reveals that the proposed approach is more efficient to enhance the security of information content of an image.
Keywords: Edge detection; Selection; Crossover; Mutation; Pseudorandom; Linear congruential generator.
Region based Color Image Spatial Fusion Steganographic System
by Viswanathan P, VenkataKrishna P
Abstract: The Steganographic schemes embed secret data in the location of cover
image generated by pseudo random number generator. These kinds of algorithms
do not evaluate the content and size of the secret message during embedding. It
creates distortion in smooth region of cover image and results in secret data loss.In order to solve the above issues, high-capacity novel region based spatial fusion steganographic scheme is proposed in this paper. This spatial fusion decomposes the image into various regions based on the level of intensity. It is extensively used to evaluate the capacity of region for high payload. Size and type of secret data is initialized as a key for the extraction to improve the confidentiality and privacy. Then the secret message with key is embedded by differentiating the pixel by 1 with constraints not equal to 0 and even or odd option which leads to less rate of modification. The proposed scheme is applied in the region of blue channel which is less sensitive to human visual system gives high imperceptibility to secret data. It is experimented with standard IST natural images by steganalysis algorithms results in better enhancement of security and quality in terms of imperceptibility and embedding capacity when compare to other LSB approaches.
Keywords: composition; decomposition; extraction; hiding; spatial fusion.
A Reversible High Capacity Data Hiding Scheme using Combinatorial Strategy
by Rajeev Kumar, Satish Chand, Samayveer Singh
Abstract: In this paper, we propose a new reversible high capacity data hiding scheme using combinatorial strategy which has very less distortion while hiding the secret data. It first builds a location map for the pixels of the cover image and then identifies the embeddable pixels. It divides the image into pairs of embeddable pixels and hides the secret data bits in each pair. The values of the embeddable pixels are updated according to prespecified rules. The pixel values get changed at most by one and some of them may remain unchanged. Thus, there are minor changes in pixel values, which helps our scheme to achieve very good quality and with good hiding capacity. Furthermore, it is very simple as it just increases or decreases the pixel values rather than performing complex computations. The experimental results show that our scheme is superior to the state of the art schemes.
Keywords: Reversible data hiding; distortion; embeddable pixels; combinatorial strategy; PSNR; capacity; location map; pixel mapping table; extraction.
QoE in Multimedia Domain: A User-centric Quality Assessment
by Yun Gao, Xin Wei, Liang Zhou, Mohsen Guizani
Abstract: The rapid development of multimedia service has attracted increasing
attention on the interests in the study of quality of experience (QoE) in multimedia
domain. QoE, as a promising user-centric quality evaluation metric, has gradually
been the hot research topic in recent years. Compared with conventional
multimedia service quality metrics (e.g. quality of service (QoS), peak-signalnoise-
ratio (PSNR)), QoE is more concerned about users subjective experience.
Accordingly, a user-centric quality strategy brings the increasing popularity of
QoE-driven applications in multimedia domain. Therefore, in this paper, we
present readers the latest development of QoE in multimedia domain. Specifically,
we firstly introduce the background of QoE, including the definitions of QoE and
relationship between QoS and QoE. Then, we explain the influence factors of
QoE in detail, which are the basis of QoE modelling and prediction. Subsequently,
we mainly present typical latest works about QoE measurement and modelling
in recent years. Moreover, we also exhibit our research works about QoE-driven applications. Finally, open challenges and research directions are concluded for
Keywords: Quality of experience (QoE); Quality of service (QoS); user-centric
experience; multimedia domain.
Improvement on OTP Authentication and a Possession-based Authentication Framework
by SHUSHAN ZHAO, Wenhui Hu
Abstract: Authentication plays a paramount role in online services. Today many online services are still using password as single authentication method, but this is not considered secure any more. There have been many attempts to introduce multifactor authentication mechanism, for example, counter-based one-time password, and time-based one- time password. In this paper, we first list some limitations and weaknesses of the existing multifactor authentication methods, then propose an improvement to one-time password algorithms, and finally apply it in a general-purpose possession-based authentication framework. The framework can be implemented in popularly used smartphones but does not rely on cellular network or wifi network. The purpose of the framework is for current password-authenticated online services to adopt multifactor authentication easily.
Keywords: authentication; OTP.