3
Editorial Multimedia Security: Novel Steganography and Privacy Preserving Zhenxing Qian , 1 Kim-Kwang Raymond Choo, 2 Rémi Cogranne, 3 and Xinpeng Zhang 4 1 Shanghai Institute for Advanced Communication and Data Science, School of Communication and Information Engineering, Shanghai University, Shanghai, China 2 Department of Information Systems and Cyber Security, University of Texas, San Antonio, San Antonio, TX 78249, USA 3 Laboratory of Systems Modeling and Dependability, Systems, Networks & Telecommunications, Troyes University of Technology, Troyes, France 4 Shanghai Institute of Intelligent Electronics & Systems, School of Computer Science, Fudan University, Shanghai, China Correspondence should be addressed to Zhenxing Qian; [email protected] Received 26 August 2018; Accepted 26 August 2018; Published 9 September 2018 Copyright © 2018 Zhenxing Qian et al. is is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Multimedia security is not a new research topic, as there have been a large body of work on various aspects of mul- timedia security. However, there remain a number of open research challenges, partly due to advances in multimedia and other related consumer technologies, for example, threats to conventional steganography due to emerging machine/deep learning-based steganalysis approaches. us, there is a need to design steganography approaches to mitigate such ste- ganalysis efforts. Another ongoing challenge is how to ensure the privacy of multimedia data and the processing of such data, given constant advances in computational capabilities and big data analytics. In this special issue, we aim to provide readers with a broad overview of multimedia security, such as novel steganography, privacy preserving on cloud computing, and multimedia tampering detection. To achieve covert transmission, one could implement steganography in a cover. G. Swain (in “High Capacity Image Steganography using Modified LSB Substitution and PVD against Pixel Difference Histogram Analysis”) demonstrated how we can expand the embedding capacity while mitigat- ing steganalysis efforts. Another article on steganography was presented by J. He et al. (“A Novel AMR-WB Speech Steganography Based on Diameter-Neighbor Codebook Par- tition”). e authors used speech signals as covers to realize covert transmissions. In addition to the use of covers, other approaches such as those based on images and audios can also be used to transmit secret data. For example, P. Cao et al. (in “A Wireless Covert Channel Based on Constellation Shaping Modula- tion”) developed a system to transmit secret data over wireless channels, based on constellation shaping modulation. With constant advances in steganography solutions, X. ShuangKui et al. (in “A Modification-Free Steganography Method Based on Image Information Entropy”) investigated the possibility of transmitting secret data in big data. Since secret data are directly mapped to the entropies of the covers, no modification is required when transmitting a single cover. For steganography, D. Hu et al. (in “Adaptive Steganalysis Based on Selection Region and Combined Convolutional Neural Networks”) explained how to mitigate adaptive steganogra- phy by analyzing the selected regions of the covers using deep learning. In terms of privacy preservation, a number of articles in this special issue focused on achieving privacy in the cloud computing environment. For example, during outsourcing of computations task from the user(s) to the cloud, Y. Ren et al. (in “Noninteractive Verifiable Outsourcing Algorithm for Bilinear Pairing with Improved Checkability”) and H. Zhu et al. (in “Outsourcing Set Intersection Computation Based on Bloom Filter for Privacy Preservation in Multimedia Processing”) presented two outsourcing protocols for bilinear Hindawi Security and Communication Networks Volume 2018, Article ID 6390945, 2 pages https://doi.org/10.1155/2018/6390945

Multimedia Security: Novel Steganography and Privacy ...downloads.hindawi.com/journals/scn/2018/6390945.pdf · 2 SecurityandCommunicationNetworks pairingandsetintersectioncomputations,respectively.e

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Multimedia Security: Novel Steganography and Privacy ...downloads.hindawi.com/journals/scn/2018/6390945.pdf · 2 SecurityandCommunicationNetworks pairingandsetintersectioncomputations,respectively.e

EditorialMultimedia Security: Novel Steganography andPrivacy Preserving

Zhenxing Qian ,1 Kim-Kwang Raymond Choo,2 Rémi Cogranne,3 and Xinpeng Zhang4

1 Shanghai Institute for Advanced Communication and Data Science, School of Communication and Information Engineering,Shanghai University, Shanghai, China

2Department of Information Systems and Cyber Security, University of Texas, San Antonio, San Antonio, TX 78249, USA3Laboratory of Systems Modeling and Dependability, Systems, Networks & Telecommunications, Troyes University of Technology,Troyes, France

4Shanghai Institute of Intelligent Electronics & Systems, School of Computer Science, Fudan University, Shanghai, China

Correspondence should be addressed to Zhenxing Qian; [email protected]

Received 26 August 2018; Accepted 26 August 2018; Published 9 September 2018

Copyright © 2018 Zhenxing Qian et al.This is an open access article distributed under the Creative Commons Attribution License,which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Multimedia security is not a new research topic, as therehave been a large body of work on various aspects of mul-timedia security. However, there remain a number of openresearch challenges, partly due to advances inmultimedia andother related consumer technologies, for example, threats toconventional steganography due to emerging machine/deeplearning-based steganalysis approaches. Thus, there is a needto design steganography approaches to mitigate such ste-ganalysis efforts. Another ongoing challenge is how to ensurethe privacy of multimedia data and the processing of suchdata, given constant advances in computational capabilitiesand big data analytics.

In this special issue, we aim to provide readers witha broad overview of multimedia security, such as novelsteganography, privacy preserving on cloud computing, andmultimedia tampering detection.

To achieve covert transmission, one could implementsteganography in a cover. G. Swain (in “High Capacity ImageSteganography using Modified LSB Substitution and PVDagainst Pixel Difference Histogram Analysis”) demonstratedhow we can expand the embedding capacity while mitigat-ing steganalysis efforts. Another article on steganographywas presented by J. He et al. (“A Novel AMR-WB SpeechSteganography Based on Diameter-Neighbor Codebook Par-tition”). The authors used speech signals as covers to realizecovert transmissions.

In addition to the use of covers, other approaches suchas those based on images and audios can also be used totransmit secret data. For example, P. Cao et al. (in “AWirelessCovert Channel Based on Constellation Shaping Modula-tion”) developed a system to transmit secret data overwirelesschannels, based on constellation shaping modulation. Withconstant advances in steganography solutions, X. ShuangKuiet al. (in “AModification-Free Steganography Method Basedon Image Information Entropy”) investigated the possibilityof transmitting secret data in big data. Since secret dataare directly mapped to the entropies of the covers, nomodification is requiredwhen transmitting a single cover. Forsteganography, D. Hu et al. (in “Adaptive Steganalysis Basedon Selection Region and Combined Convolutional NeuralNetworks”) explained how to mitigate adaptive steganogra-phy by analyzing the selected regions of the covers using deeplearning.

In terms of privacy preservation, a number of articles inthis special issue focused on achieving privacy in the cloudcomputing environment. For example, during outsourcing ofcomputations task from the user(s) to the cloud, Y. Ren etal. (in “Noninteractive Verifiable Outsourcing Algorithm forBilinear Pairing with Improved Checkability”) and H. Zhuet al. (in “Outsourcing Set Intersection Computation Basedon Bloom Filter for Privacy Preservation in MultimediaProcessing”) presented two outsourcing protocols for bilinear

HindawiSecurity and Communication NetworksVolume 2018, Article ID 6390945, 2 pageshttps://doi.org/10.1155/2018/6390945

Page 2: Multimedia Security: Novel Steganography and Privacy ...downloads.hindawi.com/journals/scn/2018/6390945.pdf · 2 SecurityandCommunicationNetworks pairingandsetintersectioncomputations,respectively.e

2 Security and Communication Networks

pairing and set intersection computations, respectively. Theauthors claimed that both protocols were more efficient andsecure than prior work.

Multimedia indexing in encrypted domain is also anotherpopular topic in privacy preservation. Hence, H. Liang etal. (in “Secure and Efficient Image Retrieval over EncryptedCloud Data”) proposed an efficient ciphertext retrieval algo-rithm, using balanced index tree and partial encryption. Onthe topic of labeling encrypted data in the cloud, D. Xuet al. (in “Separable Reversible Data Hiding in EncryptedImages Based on Two-Dimensional Histogram Modifica-tion”) and X. Chen et al. (in “Improved Encrypted-Signals-Based Reversible Data Hiding Using Code Division Mul-tiplexing and Value Expansion”) proposed two reversibledata hiding protocols for encrypted images, respectively.The use of watermarking to protect user privacy in thecloud environment was demonstrated by K. Liu et al. (in“A Cloud-User Protocol Based on Ciphertext WatermarkingTechnology”).

In this special issue, multimedia forensics and net-work security were also discussed. For example, Y. Sun etal. (in “Nonoverlapping Blocks Based Copy-Move ForgeryDetection”), H. Wang et al. (in “Perceptual Hashing-BasedImage Copy-Move Forgery Detection”), and D. Niu et al.(in “Reference Sharing Mechanism-based Self-embeddingWatermarking Scheme with Deterministic Content Recon-struction”), respectively, studied passive forensics, copy-move forgery detection, and watermarking. On the topicsof network attack, R. Zhang et al. in (“Constructing APTAttack Scenarios Based on Intrusion Kill Chain and FuzzyClustering”) presented an approach to simulate advancedpersistent threat (APT) attack scenarios, and J. Chen (in “ASurvey on Breaking Technique of Text-based CAPTCHA”)surveyed existing approaches to circumventing CAPTCHA.

In conclusion, while the breadth and depth of the articlesin this issue have contributed to the knowledge gap inmultimedia security, many other challenges remain. It ishoped that the advances reported in this special issue willinspire new areas of research in the near future.

Conflicts of Interest

The authors declare that there are no conflicts of interestregarding the publication of this article.

Zhenxing QianKim-Kwang Raymond Choo

Remi CogranneXinpeng Zhang

Page 3: Multimedia Security: Novel Steganography and Privacy ...downloads.hindawi.com/journals/scn/2018/6390945.pdf · 2 SecurityandCommunicationNetworks pairingandsetintersectioncomputations,respectively.e

International Journal of

AerospaceEngineeringHindawiwww.hindawi.com Volume 2018

RoboticsJournal of

Hindawiwww.hindawi.com Volume 2018

Hindawiwww.hindawi.com Volume 2018

Active and Passive Electronic Components

VLSI Design

Hindawiwww.hindawi.com Volume 2018

Hindawiwww.hindawi.com Volume 2018

Shock and Vibration

Hindawiwww.hindawi.com Volume 2018

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawiwww.hindawi.com Volume 2018

Hindawiwww.hindawi.com Volume 2018

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawiwww.hindawi.com

Volume 2018

Hindawi Publishing Corporation http://www.hindawi.com Volume 2013Hindawiwww.hindawi.com

The Scientific World Journal

Volume 2018

Control Scienceand Engineering

Journal of

Hindawiwww.hindawi.com Volume 2018

Hindawiwww.hindawi.com

Journal ofEngineeringVolume 2018

SensorsJournal of

Hindawiwww.hindawi.com Volume 2018

International Journal of

RotatingMachinery

Hindawiwww.hindawi.com Volume 2018

Modelling &Simulationin EngineeringHindawiwww.hindawi.com Volume 2018

Hindawiwww.hindawi.com Volume 2018

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawiwww.hindawi.com Volume 2018

Hindawiwww.hindawi.com Volume 2018

Navigation and Observation

International Journal of

Hindawi

www.hindawi.com Volume 2018

Advances in

Multimedia

Submit your manuscripts atwww.hindawi.com