Logout succeed
Logout succeed. See you again!

Transactions on Data Hiding and Multimedia Security VI PDF
Preview Transactions on Data Hiding and Multimedia Security VI
Lecture Notes in Computer Science 6730 CommencedPublicationin1973 FoundingandFormerSeriesEditors: GerhardGoos,JurisHartmanis,andJanvanLeeuwen EditorialBoard DavidHutchison LancasterUniversity,UK TakeoKanade CarnegieMellonUniversity,Pittsburgh,PA,USA JosefKittler UniversityofSurrey,Guildford,UK JonM.Kleinberg CornellUniversity,Ithaca,NY,USA FriedemannMattern ETHZurich,Switzerland JohnC.Mitchell StanfordUniversity,CA,USA MoniNaor WeizmannInstituteofScience,Rehovot,Israel OscarNierstrasz UniversityofBern,Switzerland C.PanduRangan IndianInstituteofTechnology,Madras,India BernhardSteffen TUDortmundUniversity,Germany MadhuSudan MicrosoftResearch,Cambridge,MA,USA DemetriTerzopoulos UniversityofCalifornia,LosAngeles,CA,USA DougTygar UniversityofCalifornia,Berkeley,CA,USA MosheY.Vardi RiceUniversity,Houston,TX,USA GerhardWeikum MaxPlanckInstituteforInformatics,Saarbruecken,Germany Yun Q. Shi Sabu Emmanuel Mohan S. Kankanhalli Shih-Fu Chang Regunathan Radhakrishnan Fulong Ma Li Zhao (Eds.) Transactions on Data Hiding and Multimedia Security VI 1 3 VolumeEditor YunQ.Shi NewJerseyInstituteofTechnology UniversityHeights,Newark,NJ07102-1982,USA E-mail:[email protected] GuestEditors SabuEmmanuel,NanyangTechnologicalUniversity,Singapore E-mail:[email protected] MohanS.Kankanhalli,NationalUniversityofSingapore,Singapore E-mail:[email protected] Shih-FuChang,ColumbiaUniversity,NewYork,NY,USA E-mail:[email protected] RegunathanRadhakrishnan,DolbyLaboratories,SanFrancisco,CA,USA E-mail:[email protected] FulongMa,PhilipsResearch,Shanghai,China E-mail:[email protected] LiZhao,TsinghuaUniversityy,Beijing,China E-mail:[email protected] ISSN0302-9743(LNCS) e-ISSN1611-3349(LNCS) ISSN1864-3043(TDHMS) e-ISSN1864-3051(TDHMS) ISBN978-3-642-24555-8 e-ISBN978-3-642-24556-5 DOI10.1007/978-3-642-24556-5 SpringerHeidelbergDordrechtLondonNewYork LibraryofCongressControlNumber:Appliedfor CRSubjectClassification(1998):K.6.5,E.3,C.2,D.4.6,I.4,I.5 ©Springer-VerlagBerlinHeidelberg2011 Thisworkissubjecttocopyright.Allrightsarereserved,whetherthewholeorpartofthematerialis concerned,specificallytherightsoftranslation,reprinting,re-useofillustrations,recitation,broadcasting, reproductiononmicrofilmsorinanyotherway,andstorageindatabanks.Duplicationofthispublication orpartsthereofispermittedonlyundertheprovisionsoftheGermanCopyrightLawofSeptember9,1965, inistcurrentversion,andpermissionforusemustalwaysbeobtainedfromSpringer.Violationsareliable toprosecutionundertheGermanCopyrightLaw. Theuseofgeneraldescriptivenames,registerednames,trademarks,etc.inthispublicationdoesnotimply, evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfromtherelevantprotectivelaws andregulationsandthereforefreeforgeneraluse. Typesetting:Camera-readybyauthor,dataconversionbyScientificPublishingServices,Chennai,India Printedonacid-freepaper SpringerispartofSpringerScience+BusinessMedia(www.springer.com) Preface This issue consists mainly of a Special Section on “Content Protection and Forensics” with four papers edited by Sabu Emmanuel, Mohan S. Kankanhalli, Shih-Fu Chang,RegunathanRadhakrishnan,Fulong Ma and LiZhao.For a de- tailed introduction of these four papers, please refer to the Preface written by the organizers following this text. In addition, there is a regular paper by Xi- ang and Kim entitled “Histogram-BasedImage Hashing for Searching Content- Preserving Copies.” We hope that this issue is of interest to the research community and will triggernewresearchinthefieldofdatahidingandmultimediasecurity.Wewant tothankalltheauthors,reviewers,editorsand,inparticular,thespecialsection organizers, who have devoted their valuable time to the success of this sixth issue. Special thank goes to Springer and Alfred Hofmann for their continuous support. Finally, it is our sad duty to report that our Associate Editor, Professor AndreasPfitzmann,passedawayonSeptember23,2010afterashortbutserious illness. Andreas’ groundbreaking research laid the foundations for the concepts of “Privacy by Technology” and “Multilateral Security”: in his opinion, privacy cannot be achieved by law, but must be supported, controlled and finally en- forced by technology. Then revolutionary and utopian, these thoughts are now commonly referred to in computer science as “privacy-enhancing technologies”. Andreas Pfitzmann was a visionary and a pioneer. His contributions to science and his insistence on articulating even inconvenient truths changed the way we conceive privacy. We will miss him sorely. July 2011 Yun Q. Shi (Editor-in-Chief) Hyoung-Joong Kim (Vice Editor-in-Chief) Stefan Katzenbeisser (Vice Editor-in-Chief) (cid:3) ProfessorAndreas Pfitzmann Technische Universita¨t Dresden, Germany (1958 – 2010) Guest Editorial Preface Special Issue on Content Protection and Forensics Owing to the advances in digital technology, media are often created/recorded, storedanddistributed indigitaldomains.Sometimes the created/recordeddigi- talmedia need to be protectedfrom unauthorizeddistributions and other times the recorded digital media are used as evidence in courts of law. But being digital, the media are neither safe from unauthorized distributions nor can be considered authentic. Digital media can easily be perfectly replicated and dis- tributed through digital networks or through stored media. They can easily be edited using today’s digital media-editing tools and thus forge evidence. Thus protecting content againstunauthorized copyingand distribution and detecting forgery using forensics techniques are of great importance and a challenge in multimedia-relatedresearch.This special issue on contentprotection and foren- sics is intended to bring forth the current advancements in media content pro- tection and media forensics areas. After several rounds of review, four papers were selected for publication in this special issue. Thefirstpaperpresentsaneffectiveschemeforpassive-blindimagetampering detection under a machine learning framework to distinguish tampered images fromauthentic images.The proposedimagetamperingdetectionusesstatistical features generated by applying Markovian rake transform to image luminance component. The efficacy of this proposed method has been established using a large-scaleimagedatasetdesignedfortamperingdetection.Inadditionthepaper also highlights the enormous challenge encountered in the tamper detection of real-life images. The second paper presents an algorithm to embed a robust binary water- mark in digital images in the dual-tree complex wavelet transform (DT-CWT) domain.ItinvestigatesthechallengesinembeddingwatermarksintheDT-CWT domain and proposes two embedding schemes, which caters for different appli- cation needs. The use of coefficients swapping in the scheme based on low-pass frequency coefficients and the group of coefficient quantization techniques used in the high-pass frequency coefficient-basedscheme achievesgoodvisualquality and detection rates. Experimental results establish the robustness of the water- marks againstcommon signalprocessing attacks such as additive noise, median filtering and JPEG lossy compression. The third paper presents a robust watermarking technique, which embeds watermarks in JPEG partially compressed and encrypted images. While the proposed technique embeds watermarks in the partially compressed-encrypted domain, the extraction of watermarkscan be made in the encrypted, decrypted or decompressed domains. Experiments conducted establish the robustness of X Guest Editorial Preface the watermarks against attacks like filtering, additive noise, JPEG compres- sion and amplitude scaling. In addition the paper also discusses the necessity of compressed-encrypted domain watermarking. The fourth paper presents a steganography scheme based on equivalence re- lation,whichpartitionsthehidingunitsintoequivalenceclassesaccordingtothe capacity of the hiding units. This steganography scheme not only provides the progressive quality characteristic but also enhances the quality of stego images without sacrificing security and capacity. All of the papers in this issue were selected after stringent peer review. This special issue represents the front line of research in this very vital area of mul- timedia security. Sabu Emmanuel Mohan S. Kankanhalli Shih-Fu Chang Regunathan Radhakrishnan Fulong Ma Li Zhao LNCS Transactions on Data Hiding and Multimedia Security Editorial Board Editor-in-Chief Yun Q. Shi New Jersey Institute of Technology, Newark, NJ, USA ([email protected]) Vice Editor-in-Chief Hyoung Joong Kim Korea University, Seoul, Korea ([email protected]) Stefan Katzenbeisser Darmstadt University of Technology and CASED, Germany (katzenbeisser@ seceng.informatik.tu-darmstadt.de) Associate Editors Mauro Barni University of Siena, Siena, Italy ([email protected]) Jeffrey Bloom Dialogic Media Labs, Eatontown, NJ, USA (jeff[email protected]) Jana Dittmann Otto-von-Guericke-UniversityMagdeburg, Magdeburg, Germany ([email protected]) Jean-Luc Dugelay EURECOM, Sophia, Antipolis, France ([email protected]) Jiwu Huang Sun Yat-sen University, Guangzhou, China ([email protected]) C.-C. Jay Kuo University of Southern California, Los Angeles, USA ([email protected]) Mohan S. Kankanhalli National University of Singapore, Singapore ([email protected]) Darko Kirovski Microsoft, Redmond, WA, USA ([email protected]) Heung-Kyu Lee Korea Advanced Institute of Science and Technology, Daejeon, Korea ([email protected]) XII Editorial Board Benoit Macq Catholic University of Louvain, Belgium ([email protected]) Yong Man Ro Korea Advanced Institute of Science and Technology, Daejeon, Korea ([email protected]) Kivanc Mihcak Bogazici University, Istanbul, Turkey ([email protected]) Hideki Noda KyushuInstituteofTechnology,Iizuka,Japan [email protected] Jeng-Shyang Pan National Kaohsiung University of Applied Science, Kaohsiung, Taiwan ([email protected]) Fernando P´erez-Gonz´alez University of Vigo, Vigo, Spain ([email protected]) Alessandro Piva University of Florence, Florence, Italy ([email protected]fi.it) Ahmad-Reza Sadeghi Darmstadt University of Technology and CASED, Germany ([email protected]) Kouichi Sakurai Kyushu University, Fukuoka, Japan ([email protected]) Andreas Westfeld University of Applied Sciences Dresden, Germany ([email protected]) Edward K. Wong Polytechnic Institute of New York University, Brooklyn, NY, USA ([email protected]) Advisory Board Members Pil Joong Lee PohangUniversityofScience andTechnology, Pohang, Korea [email protected] Bede Liu Princeton University, Princeton, NJ, USA [email protected]