Multimedia Security, Volume 1. William PuechЧитать онлайн книгу.
etc.) and have supported their successive developments because of the common backbone they build, from information support to the application and user.
In this context, by protecting confidentiality and copyright, verifying integrity, analyzing and authenticating content, tracing copies and controlling access, particularly critical questions about multimedia data security are being asked. For example, the protection strategies implemented must take into account the specific needs of multimedia while meeting the requirements of the means of communication, thus establishing a compromise. A wrong approach can indeed lead to excessive coding of the data, or the alteration of their perceptual quality, and thus failure in the targeted security objectives.
As an interface discipline, the art of multimedia security is difficult!
However, with this two-part book, William Puech and his co-authors take up the challenge brilliantly by painting an exhaustive and current panorama of multimedia security. They offer an in-depth analysis of authentication and hidden data embedding methods, biometric technologies and multimedia protection and encryption processes. Without giving in to an outdated formalism that could hinder the fluidity of their presentations, the authors captivate the reader by presenting the state of the art of each subject directly and in an illustrative way.
William Puech and the contributors to this book have provided considerable work to their French-speaking scientific communities of information, signal, image, vision and computer security, represented by the two appropriate French GdR groups of the CNRS. I would like to express all of my gratitude to them.
Preface
William PUECH
LIRMM, Université de Montpellier, CNRS, France
Nowadays, more than 80% of transmitted data on social media and archived in our computers, tablets, mobile phones or in the cloud is multimedia data. This multimedia data mainly includes images (photographs, computer-generated images), videos (films, animations) or sound (music, podcasts), but equally more and more three-dimensional (3D) data and scenes, for applications ranging from video games to medical data, passing through computer-aided design, video surveillance and biometrics. It is becoming necessary, urgent, not to say vital, to secure this multimedia data during its transmission or archiving, but also during its visualization. In fact, with everything digital, it is becoming increasingly easy to copy this multimedia data, to view it without rights, to appropriate it, but also to counterfeit it.
Over the last 30 years, we have observed an expansive development around multimedia security, both internationally and in France. In fact, at the French level, there are dozens of research teams in laboratories, but also a large number of industrials, who are focusing their activities on these aspects. This activity can also be found in several GdR (research groups) of the CNRS, but in particular the GdR ISIS (information, signal, image and vision) and the GdR computer security.
Multimedia security is a relatively new theme, as evidenced by the publication dates of the articles referenced in the various chapters of these two volumes. In fact, out of about 900 references, nearly 50% of them are less than 10 years old, and more than 35% are between 10 and 20 years old. Of course, let us not forget certain authors, such as Auguste Kerckhoffs (1835–1903) and Claude Shannon (1916–2001), without whom our community would not have advanced in the same way. The history of multimedia security really begins at the end of the 1990s, with the beginning of watermarking, steganography, but in a very timid manner, this being motivated by the digitization of content and the protection of rights holders. In 2001, motivated by the attack of September 11, research in steganalysis hidden signal detection and statistical detection became the top priority. Between 2000 and 2010, there was an international explosion in watermarking security. There were also major contributions in steganography and steganalysis. During this same decade, research into securing multimedia data by specific encryption was born with the aspects of selective or partial encryption and crypto-compression, while guaranteeing the preservation of international formats and standards. From 2010, new facets of multimedia data security have emerged with forensics aspects, as well as statistical approaches. There has also been a strong development in signal processing in the encrypted domain, as well as the tracing of traitors. In 2020, research in forensics and steganalysis has been gaining momentum, in particular with the emergence of machine learning, and especially with the exploitation and development of deep convolutional neural networks. The recent advances in this field have varied greatly, from steganography (GAN), adversarial methods, methods by content generation, to the processing of encrypted content, including the links between learning and information leakage, applications in biometrics and “real-life” content analysis.
This project of works began more than two years ago and has really meant a lot to me. In fact, at the French level, we have a certain strength in this field, and numerous gems that we have brought to light. Nothing could have been achieved without the support of the GdR ISIS and GdR computer security. It is largely because of these GdR that we have succeeded in tracking research activities in the field of multimedia security from a French point of view. The towns represented in these two works illustrate the richness and national diversity (Caen, Grenoble, La Rochelle, Lille, Limoges, Lyon, Montpellier, Paris, Poitiers, Rennes, Saint-Étienne and Troyes), because some of these cities, as we will see during our reading, are represented by several laboratories and/or universities.
As we will be able to see throughout these two volumes, even if they are grouped around multimedia security, the research themes are very broad and the applications varied. In addition, the fields cover a broad spectrum, from signal processing to cryptography, including image processing, information theory, encoding and compression. Many of the topics in multimedia security are a game of cat and mouse, where the defender of rights must regularly transform into a counter-attacker in order to resist the attacker.
The first volume primarily focuses around the authentication of multimedia data, codes and the embedding of hidden data, from the side of the defender as well as the attacker. Concerning the embedding of hidden data, it also addresses the aspects of invisibility, color, tracing and 3D data, as well as the detection of hidden messages in images by steganalysis. The second volume mainly focuses on the biometrics, protection, integrity and encryption of multimedia data. It covers aspects such as image and video crypto-compression, homomorphic encryption, the embedding of hidden data in the encrypted domain, as well as the sharing of secrets. I invite the reader, whether they are a student, teacher, researcher or industrial to immerse themselves in these works, not necessarily by following the intended order, but going from one chapter to another, as well as from one volume to another.
These two volumes, even though they cover a broad spectrum in multimedia security, are not meant to be exhaustive. I think, and hope, that a third volume will complete these first two. In fact, I am thinking of sound (music and speech), video surveillance/video protection, camera authentication, privacy protection, as well as the attacks and counter-attacks that we see every day.
I would like to thank all of the authors, chapter managers, their co-authors, their collaborators and their teams for all of their hard work. I am very sorry that I have had to ask them many times to find the best compromises between timing, content and length of the chapters. Thank you to Jean-Michel, Laurent, Philippe (×2), Patrick (×2), Teddy, Sébastien (×2), Christophe, Iuliia, Petra, Vincent, Wassim, Caroline and Pauline! Thank you all for your openness and good humor! I would also thank the GdR ISIS and computer Security through Gildas and Cédric, but also Christine and Laure for their proofreading, as well as for establishing a connection with ISTE Ltd. I would also like to thank all of the close collaborators with whom I have worked for more than 25 years on the various themes that I have had the chance to address. PhD students, engineers, interns and colleagues, all of them will recognize themselves, whether they are in my research team (ICAR team) or in my research laboratory (LIRMM, Université de Montpellier, CNRS).
In particular, I would like to thank Vincent, Iuliia, Sébastien and Pauline for having accepted to embark on this adventure. Pauline, in addition