A Review of Recent Advances on Multimedia Watermarking Security and Design Implications for Digital Quran Computing

被引:0
作者
Tayan, Omar [1 ,2 ]
Alginahi, Yasser M. [3 ]
机构
[1] Taibah Univ, Coll Comp Sci & Engn, IT Res Ctr Holy Quran & Its Sci NOOR, Al Madinah, Saudi Arabia
[2] Taibah Univ, Coll Comp Sci & Engn, Dept Comp Engn, Al Madinah, Saudi Arabia
[3] IT Res Ctr Holy Quran & Its Sci NOOR, Acad Serv, Dept Comp Sci, Al Madinah, Saudi Arabia
来源
2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST) | 2014年
关键词
watermarking; Quran computing; sensitve data; multimedia;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The explosion in the online propagation of digital multimedia suggests that such data is vulnerable to threats, data-manipulation and attack. This problem is further exacerbated when dealing with highly sensitive digital multimedia content such as the Holy Quran, in which the modification/corruption of a single character, diacritic or symbol would regard the entire content as invalid. Hence, the protection of sensitive data and Quran multimedia data in particular is essential to ensure that only the original non-tampered data is propagated with no distortion. Protection schemes include verifying integrity, proof-of-authenticity, tamper-detection and copyright protection. A technique in the literature used to provide the necessary security for such digital content is known as digital watermarking. This paper reviews the state-of-the-art in digital text, image and audio watermarking applicable to sensitive digital content and discusses how those approaches can achieve the required protection, measured against relevant performance metrics and set according to their respective environments and digital formats being used. The main goal of this paper is to provide an effective study by which to develop new techniques and approaches for the protection of sensitive multimedia content.
引用
收藏
页码:304 / 309
页数:6
相关论文
共 29 条
[1]  
Aabed M.A., 2007, IEEE INT C SIGN PROC
[2]  
Aabed MA, 2007, ICSPC: 2007 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATIONS, VOLS 1-3, PROCEEDINGS, P756
[3]  
Al-Haidari F., 2009, IEEE ACS INT C COMP
[4]   Improving Security and Capacity for Arabic Text Steganography Using 'Kashida' Extensions [J].
Al-Haidari, Fahd ;
Gutub, Adnan ;
Al-Kahsah, Khalid ;
Hamodi, Jameel .
2009 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1 AND 2, 2009, :396-399
[5]  
Alginahi Yasser M., 2013, EL COMP COMP ICECCO
[6]  
Baranwal N., 2011, IEEE INT C REC TREND
[7]  
Chen N., 2010, INT C AUD LANG IM PR
[8]  
Citak Er F., 2011, COMP DIGITAL AUDIO W
[9]  
DAVARZANI R, 2009, INT C SIGN PROC SYST, P152, DOI DOI 10.1109/ICSPS.2009.28
[10]  
Dutta M. K., 2009, P INT C MULT INF NET