Professional Documents
Culture Documents
Textbook Handbook of Image Based Security Techniques First Edition Agarwal Ebook All Chapter PDF
Textbook Handbook of Image Based Security Techniques First Edition Agarwal Ebook All Chapter PDF
https://textbookfull.com/product/the-handbook-of-medical-image-
perception-and-techniques-2nd-edition-ehsan-samei-editor/
https://textbookfull.com/product/the-handbook-of-medical-image-
perception-and-techniques-second-edition-cambridge-university-
press/
https://textbookfull.com/product/learning-based-vanet-
communication-and-security-techniques-liang-xiao/
https://textbookfull.com/product/handbook-of-multimedia-
information-security-techniques-and-applications-amit-kumar-
singh/
Handbook of Image Engineering Zhang
https://textbookfull.com/product/handbook-of-image-engineering-
zhang/
https://textbookfull.com/product/image-processing-and-pattern-
recognition-based-on-parallel-shift-technology-first-edition-
bilan/
https://textbookfull.com/product/an-introduction-to-real-
analysis-first-edition-agarwal/
https://textbookfull.com/product/deep-learning-techniques-for-
biomedical-and-health-informatics-1st-edition-basant-agarwal/
https://textbookfull.com/product/image-operators-image-
processing-in-python-first-edition-kinser/
Handbook of
Image-Based Security
Techniques
Handbook of
Image-Based Security
Techniques
Shivendra Shivani
Suneeta Agarwal
Jasjit S. Suri
MATLAB® is a trademark of The MathWorks, Inc. and is used with permission. The MathWorks
does not warrant the accuracy of the text or exercises in this book. This book’s use or discussion
of MATLAB® software or related products does not constitute endorsement or sponsorship by The
MathWorks of a particular pedagogical approach or particular use of the MATLAB® software.
CRC Press
Taylor & Francis Group
6000 Broken Sound Parkway NW, Suite 300
Boca Raton, FL 33487-2742
© 2018 by Taylor & Francis Group, LLC
CRC Press is an imprint of Taylor & Francis Group, an Informa business
No claim to original U.S. Government works
Printed on acid-free paper
Version Date: 20180427
International Standard Book Number-13: 978-1-1-38-05421-9 (Hardback)
This book contains information obtained from authentic and highly regarded sources. Reasonable
efforts have been made to publish reliable data and information, but the author and publisher cannot
assume responsibility for the validity of all materials or the consequences of their use. The authors and
publishers have attempted to trace the copyright holders of all material reproduced in this publication
and apologize to copyright holders if permission to publish in this form has not been obtained. If any
copyright material has not been acknowledged please write and let us know so we may rectify in any
future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced,
transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or
hereafter invented, including photocopying, microfilming, and recording, or in any information
storage or retrieval system, without written permission from the publishers.
For permission to photocopy or use material electronically from this work, please access
www.copyright.com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc.
(CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization
that provides licenses and registration for a variety of users. For organizations that have been granted
a photocopy license by the CCC, a separate system of payment has been arranged.
Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and
are used only for identification and explanation without intent to infringe.
Visit the Taylor & Francis Web site at
http://www.taylorandfrancis.com
and the CRC Press Web site at
http://www.crcpress.com
To my beloved family members for encouraging and
admiring me to believe that I am capable of authoring
a book.
Shivendra Shivani
Foreword xxiii
Preface xxv
Authors xxix
Section I Visual Cryptography
1.1 INTRODUCTION 4
1.2 VISUAL CRYPTOGRAPHY 5
1.3 APPLICATIONS OF VISUAL CRYPTOGRAPHY 7
1.3.1 Trojan-Free Secure Transaction 7
1.3.2 Authentication 10
1.3.3 Access Control 11
1.3.4 Transaction Tracking 11
1.3.5 Watermarking 11
1.4 PRELIMINARIES 11
1.5 FUNDAMENTAL PRINCIPLES OF VISUAL SECRET
SHARING 13
1.5.1 Pixels Expansion m 13
1.5.2 Contrast α 14
1.5.3 Basis Matrices 15
1.5.4 Concept of Black and White Pixels in Visual
Cryptography 16
1.6 FORMATION OF A BASIS MATRIX 16
1.6.1 Observations Related to The Basis Matrix
Creation Approach of Naor and Shamir 17
1.6.2 Essential Conditions for a Basis Matrix 18
vii
viii Contents
Index 407
Foreword
With the rapid advancements in technology and the popularity of the Inter-
net, illegal modifications in digital media have become easy and difficult to
prevent. Therefore the protection of digital media and its property rights have
become vital issues of concern. Protecting digital data is extremely important
and an emerging area of research. Many efforts have been made in this area
by the cryptographic community. Images are treated as very powerful digital
media which must be protected on the web. There are three image-based se-
curity mechanisms which reported till now are Visual cryptography, Digital
Image Watermarking and Steganography. Specifically, visual cryptography al-
lows effective and efficient secret sharing of images among a number of trusted
parties. Visual cryptography provides a very powerful technique by which one
secret image can be distributed into two or more shares. When the shares,
printed onto transparencies are superimposed together, the original secret im-
age can be recovered without any computation. While digital watermarking
and steganography seem very closely related terms, they are actually very dif-
ferent in nature and practice. Watermarking is used to protect the ownership
information or content of the original cover image with or without tamper re-
covery capabilities whereas steganography is used to protect any secret image
or text behind the image.
xxiii
Preface
This book is especially written for young researchers who want to take their
research direction toward image-based security techniques. This book is writ-
ten from the beginner’s perspective with the commitment to make them fully
capable of understanding all latest research gaps in this field. Our goal with
this book is to provide a framework in which one can conduct research and
development of image based security technology. This book is not intended
as a comprehensive survey of the field of visual cryptography, watermarking
and steganography. Rather, it represents our own point of view and our own
technical contribution on the subject. Although we analyze specific examples
from the literature, we do so only to the extent that they highlight particular
concepts being discussed.
PURPOSE
Our purpose with this book is to provide guidelines to readers which are used
to enhance the research-oriented concepts of visual cryptography, watermark-
ing and steganography. This book represents ground truth as well as our own
perspectives on this subject. Some well-known examples are taken from the
literature to highlight the particular concepts. We are no exception, our own
backgrounds being predominantly in images and security. The fundamental
principles behind all the security dimensions of images are same, so we have
made an effort to keep our discussion of these principles generic. This book is
easily accessible to those who do not know much about images and security
fundamentals. In one sentence, we can say that this book offers encouragement
and empowers readers to rejuvenate their innovative imaginations in the field
of image-based security.
This book is divided into four sections. The first section includes Chapters
1,2,3 and 4 which deals with the concept of visual cryptography from the
basic to advanced level. The objective of this section is to make researchers
aware of this latest technology of secret sharing. Each chapter in this section
provides the fundamentals for the visual cryptography under consideration
and a detailed description of the relevant methods, presenting examples and
practical applications to demonstrate the functioning of visual cryptography.
xxv
xxvi Preface
tion in the original content. This facility is provided in the frequency domain
of the image.
Chapter 9 deals with one of the most important classes of watermarking
which is generally used in copyright protection. Here we deal with various
state-of-art approaches for robust watermarking and their behaviour in the
presence of noisy environments.
Chapter 10 provides an efficient approach toward the making of a special
kind of watermark having the qualities of being both a fragile as well as robust
watermark.
The third section includes Chapter 11 and Chapter 12 which deal with the
concept of steganography and steganalysis. Here we deal with the notion, ter-
minology and building blocks of steganographic communication. In Chapter
11 we deal with the basic terminologies and understanding of steganography
whereas Chapter 12 provides some practical approach towards steganogra-
phy and steganalysis. The fourth section contains somewhat advanced research
topics in this field. This section contains two chapters: Chapters 13 and 14.
Here Chapter 13 deals with all types of hybrid approaches made by two or
more image-based security techniques and Chapter 14 deals with protection
of other multimedia objects like video, audio, etc.
AUDIENCE
UNIQUE ANGLES
READER BENEFITS
1. Novice readers will enhance their basic understanding of security and
images.
2. Readers will learn how to start thinking in research directions on image-
based security.
3. Researchers will see new domains for research.
4. Readers will be able to implement the concept of security on images
using MATLABr .
5. Readers will also be able to develop novel real-life applications where
images are used for authentication in various ways.
6. All chapters of a section are well connected. A reader can start any
section because the sections are not dependent on each other.
ACKNOWLEDGEMENTS
The genus Zygophylax, from 500 fathoms off the Cape Verde, is of
considerable interest in having a nematophore on each side of the
hydrotheca. According to Quelch it should be placed in a distinct
family.
Order V. Graptolitoidea.
A large number of fossils, usually called Graptolites, occurring in
Palaeozoic strata, are generally regarded as the skeletal remains of
an ancient group of Hydrozoa.
The principal genera are Monograptus, with the axis straight, curved,
or helicoid, from many horizons in the Silurian strata; Rastrites, with
a spirally coiled axis, Silurian; Didymograptus, Ordovician; and
Coenograptus, Ordovician.
Fig. 136.—A portion of a branch of Cryptohelia ramosa, showing the lids l 1 and l
2 covering the cyclosystems, the swellings produced by the ampullae in the
lids amp1, amp2, and the dactylozooids, dac. × 22. (After Hickson and
England.)
Spinipora is a rare genus from off the Rio de la Plata in 600 fathoms.
The branches are covered with blunt spines. These spines have a
short gutter-like groove at the apex, which leads into a dactylopore.
The gastropores are provided with a style and are situated between
the spines.
CHAPTER XI
HYDROZOA (CONTINUED): TRACHOMEDUSAE—NARCOMEDUSAE—
SIPHONOPHORA
During the growth of the Medusa from the younger to the adult
stages several changes probably occur of a not unimportant
character, and it may prove that several genera now placed in the
same or even different families are stages in the development, of the
same species. In the development of Liriantha appendiculata,[325] for
example, four interradial tentacles appear in the first stage which
disappear and are replaced by four radial tentacles in the second
stage.
The character of the manubrium and the position of the sexual cells
suggest that Limnocnida has affinities with the Narcomedusae or
Anthomedusae, but the marginal sense-organs and the number and
position of the tentacles, showing considerable similarity with those
of Limnocodium, justify the more convenient plan of placing the two
genera in the same family.
Fam. Geryoniidae.—In this family there are four or six radial canals,
the statorhabs are sunk in the mesogloea, and a tongue is present in
the manubrium. Liriope (Fig. 137) is sometimes as much as three
inches in diameter. It has a very long manubrium, and the tongue
sometimes projects beyond the mouth. There are four very long
radial tentacles. It is found in the Atlantic Ocean, the Mediterranean
Sea, and the Pacific and Indian Oceans. Geryonia has a wider
geographical distribution than Liriope, and is sometimes four inches
in diameter. It differs from Liriope in having six, or a multiple of six,