Abstract
Multimedia cybersecurity is a prevalent research topic in the digital world due to the rapid progress of digital multimedia and Internet applications. Watermarking, encryption, and steganography schemes are employed to attain multimedia data confidentiality and robustness. However, these schemes are externally applied on trusted computers, and there has been a lack of similar schemes that can be effectively and efficiently enabled through an untrusted transmission medium. In this work, a self-embedding-based High-Efficiency Video Coding (HEVC) transmission and integrity verification framework is presented. This framework is robust and reliable for verifying the integrity of HEVC frames transmitted through insecure communication channels. Firstly, the transmitted HEVC frames are divided into a number of blocks with a certain block size. After that, a discrete transform is used for self-embedding of watermarks from each block into another one depending on a predefined mechanism. The Discrete Wavelet Transform (DWT), Discrete Cosine Transform (DCT), and Discrete Fourier Transform (DFT) are tested for this task. The watermarked HEVC frames are transmitted through a wireless communication channel, and hence they become subject to different attacks and corruptions. At the receiver side, the secret watermarks in each block are sensed with a correlation-based method to discover dubious counterfeit operations. To verify the reliability of the suggested transmission framework and its ability to achieve high protection and robust content verification of the transmitted HEVC frames over insecure communication channels, different HEVC analyses and comparisons are performed. Simulation results demonstrate the suitability of the suggested transmission framework for different multimedia cybersecurity applications. Furthermore, the comparative analysis shows that the DFT is an efficient discrete transform that can be employed with the proposed transmission framework to guarantee a higher HEVC frame integrity. It allows higher sensitivity to simple modifications in the transmitted watermarked HEVC frames. This makes the suggested cybersecurity framework applicable, secure, and appropriate for multimedia integrity verification purposes.
Highlights
With the fast progress in multimedia cybersecurity schemes, unlawful disclosing and alteration of distributed confidential secret data have become common issues
The Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT), and Discrete Fourier Transform (DFT) embedding techniques have been examined in the proposed framework
Simulation results proved the possibility of watermark protection and integrity verification, in addition to achieving high robustness against multimedia attacks and channel noise
Summary
With the fast progress in multimedia cybersecurity schemes, unlawful disclosing and alteration of distributed confidential secret data have become common issues. The data related to some applications such as cybersecurity and Internet applications can be categorized as highly-sensitive data. Authorization, this will result in severe adverse effects [1]. There is a high necessity to enhance the security of data during the transmission by guaranteeing availability, confidentiality and data integrity [2]. Confidentiality is the guarantee of data secrecy to allow authorized and intended receivers only to understand the sensitive data. Data integrity guarantees that the information has not been modified by an unlicensed parity or any other transmission effect. Availability means that information resources are available in an efficient manner, when required for authorized users.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.