Skip to main content
Log in

Secure communication and archiving of low altitude remote sensing data using high capacity fragile data hiding

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Fragile data hiding has been extensively used for secure transmission of the sensitive data using cover images, audios and videos. In the past decade, increasingly the remote sensing applications require transmission and archiving of large number of aerial images and videos. Storage and processing of remote sensing data in the public cloud computing and storage platforms, with servers outside the control of the data owners, requires sufficient attention to persevering the privacy of the data. Furthermore, in the past few years the applications of drones and unmanned aerial vehicles demand algorithms designed especially for low altitude remote sensing data. In this paper, a novel fragile data hiding algorithm for secure transmission and archiving of sensitive data in low altitude aerial videos is presented. The proposed method incorporates Integer-to-Integer discrete wavelet transform and lattice vector quantization to present a high capacity data hiding algorithm. The fragility of the proposed algorithm results in the loss of the embedded authentication credential by any tampering attempt. The experimental results show that the proposed fragile data hiding algorithm is capable of hiding significantly higher amount of data in the aerial videos compared to other existing algorithms while keeping the perceptual quality of the cover media in an acceptable range.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18

Similar content being viewed by others

References

  1. Ahuja R, Bedi S (2015) Copyright protection using blind video watermarking algorithm based on MPEG-2 structure. Comput Commun Auto (ICCCA), 2015 Int Conf: 1048–1053

  2. Akhtarkavan E, Salleh MFM (2010) Multiple description lattice vector quantization using multiple A4 quantizers. IEICE Electron Express 7:1233–1239

    Article  Google Scholar 

  3. Akhtarkavan E, Salleh MFM (2012) Multiple descriptions coinciding lattice vector Quantizer for wavelet image coding. IEEE Trans Image Process 21:653–661

    Article  MathSciNet  Google Scholar 

  4. Bao A, Huang Y, Ma Y, Guo H, Wang Y (2017) Assessing the effect of EWDP on vegetation restoration by remote sensing in the lower reaches of Tarim River. Ecol Indicators 74:261–275

    Article  Google Scholar 

  5. Bianchi T, Piva A (2013) Secure watermarking for multimedia content protection: a review of its benefits and open issues. IEEE Signal Process Mag 30:87–96

    Article  Google Scholar 

  6. Chi M, Plaza A, Benediktsson JA, Sun Z, Shen J, Zhu Y (2016) Big data for remote sensing: challenges and opportunities. Proc IEEE 104:2207–2219

    Article  Google Scholar 

  7. Cho K, Choi J, Jin YG, Kim NS (2012) Quality enhancement of audio watermarking for data transmission in aerial space based on segmental SNR adjustment. Intell Inform Hiding Multimed Sign Process (IIH-MSP), 2012 Eighth Int Conf: 122–125

  8. Coatrieux G, Pan W, Cuppens-Boulahia N, Cuppens F, Roux C (2013) Reversible watermarking based on invariant image classification and dynamic histogram shifting. IEEE Trans Inform Foren Sec 8:111–120

    Article  Google Scholar 

  9. Conway JH, Rains EM, Sloane NJA (1999) On the existence of similar sublattices. Can J Math 51:1300–1306

    Article  MathSciNet  Google Scholar 

  10. Goyal VK, Kelner JA, Kovacevic J (2002) Multiple description vector quantization with a coarse lattice. IEEE Trans Inf Theory 48:781–788

    Article  MathSciNet  Google Scholar 

  11. Hamilton WR (1866) Elements of quaternions. Longmans, Green, London

    Google Scholar 

  12. Hong W, Chen T-S, Shiu C-W (Nov. 2009) Reversible data hiding for high quality images using modification of prediction errors. J Syst Softw 82:1833–1842

    Article  Google Scholar 

  13. Hsu PH, Chen CC (2016) A robust digital watermarking algorithm for copyright protection of aerial photogrammetric images. Photogramm Rec

  14. Hwang HJ, Sachnev KHJV, Joo SH (2010) Reversible watermarking method using optimal histogram pair shifting based on prediction and sorting. KSII Trans Internet Inf Syst 4:12

    Google Scholar 

  15. Jiang L, Xu Z, Xu Y (2013) A new comprehensive security protection for remote sensing image based on the integration of encryption and watermarking. 2013 IEEE Int Geosci Remote Sens Symp - IGARSS: 2577–2580

  16. Jiang L, Niu T, Xu Z, Xu Y (2015) Integrating encryption and marking for remote sensing image based on orthogonal decomposition. IEEE J Select Top Appl Earth Observ Remote Sens 8:2232–2239

    Article  Google Scholar 

  17. L. L. Li and J. G. Sun, (2012) A watermarking algorithm for remote sensing image based on DFT and watermarking segmentation. Adv Mater Res: 2504–2508

  18. Li X, Li B, Yang B, Zeng T (2013) General framework to histogram-shifting-based reversible data hiding. IEEE Trans Image Process 22:2181–2191

    Article  MathSciNet  Google Scholar 

  19. Li X, Zhang W, Gui X, Yang B (2015) Efficient reversible data hiding based on multiple histograms modification. IEEE Trans Inform Foren Sec 10:2016–2027

    Article  Google Scholar 

  20. Li P, Guo S, Miyazaki T, Xie M, Hu J, Zhuang W (2016) Privacy-preserving access to big data in the cloud. IEEE Cloud Comput 3:34–42

    Article  Google Scholar 

  21. Liu S, Chen DB-W, Gong L, Ji W, Seo S (2015) A real-time video watermarking algorithm for authentication of small-business wireless surveillance networks. Int J Distrib Sensor Netw

  22. Majidi B, Bab-Hadiashar A (2005) Real time aerial natural image interpretation for autonomous ranger drone navigation. Digit Image Comput: Techn Appl 2005. DICTA'05. Proc 2005: 65–65

  23. Majidi B, Bab-Hadiashar A (2007) Land cover boundary extraction in rural aerial videos. MVA: 311–314

  24. Majidi B, Bab-Hadiashar A (2009) Aerial tracking of elongated objects in rural environments. Mach Vis Appl 20:23–34

    Article  Google Scholar 

  25. Majidi B, Patra JC, Zheng J (2014) Modular interpretation of low altitude aerial images of non-urban environment. Digit Sign Process 26:127–141

    Article  Google Scholar 

  26. Masoumi M, Amiri S (2013) A blind scene-based watermarking for video copyright protection. AEU-Int J Electron Commun 67:528–535

    Article  Google Scholar 

  27. Mehmood A, Natgunanathan I, Xiang Y, Hua G, Guo S (2016) Protection of big data privacy. IEEE Access 4:1821–1834

    Article  Google Scholar 

  28. Moguel E, Preciado JC, Sánchez-Figueroa F, Preciado MA, Hernández J (2015) Multilayer big data architecture for remote sensing in Eolic parks. IEEE J SelectTop Appl Earth Observ Remote Sens 8:4714–4719

    Article  Google Scholar 

  29. Mstafa RJ, Elleithy KM (2016) A video steganography algorithm based on Kanade-Lucas-Tomasi tracking algorithm and error correcting codes. Multimed Tools Appl 75:10311–10333

    Article  Google Scholar 

  30. Olaguer EP, Stutz J, Erickson MH, Hurlock SC, Cheung R, Tsai C et al (2017) Real time measurement of transient event emissions of air toxics by tomographic remote sensing in tandem with mobile monitoring. Atmosph Environ 150:220–228

    Article  Google Scholar 

  31. Ou B, Li X, Zhao Y, Ni R, Shi YQ (2013) Pairwise prediction-error expansion for efficient reversible data hiding. IEEE Trans Image Process 22:5010–5021

    Article  MathSciNet  Google Scholar 

  32. Poursanidis D, Chrysoulakis N (2017) Remote sensing, natural hazards and the contribution of ESA sentinels missions. Remote Sens Appl: Soc Environ 6:25–38

    Google Scholar 

  33. Quirita VAA, Pad. Costa GAO, Happ PN, Feitosa RQ, Ferreira RDS, Oliveira DAB et al (2017) A new cloud computing architecture for the classification of remote sensing data. IEEE J SelectTop Appl Earth Observ Remote Sens 10:409–416

    Article  Google Scholar 

  34. Rathje EM, Franke K (2016) Remote sensing for geotechnical earthquake reconnaissance. Soil Dynam Earthquake Eng 91:304–316

    Article  Google Scholar 

  35. Rathore MMU, Paul A, Ahmad A, Chen BW, Huang B, Ji W (2015) Real-time big data analytical architecture for remote sensing application. IEEE J SelectTop Appl Earth Observ Remote Sens 8:4610–4621

    Article  Google Scholar 

  36. Romero-Trigueros C, Nortes PA, Alarcón JJ, Hunink JE, Parra M, Contreras S et al (2017) Effects of saline reclaimed waters and deficit irrigation on Citrus physiology assessed by UAV remote sensing. Agric Water Manag 183:60–69

    Article  Google Scholar 

  37. Sabri AQM, Mansoor AM, Obaidellah UH, Faizal ERM (2016) Metadata hiding for UAV video based on digital watermarking in DWT transform Multimed Tools Appl: 1–23

  38. Sachnev V, Kim HJ, Nam J, Suresh S, Shi YQ (2009) Reversible watermarking algorithm using sorting and prediction. IEEE Trans Circ Syst Video Technol 19:989–999

    Article  Google Scholar 

  39. Shirafkan MH, Akhtarkavan E, Vahidi J (2015) A image steganography scheme based on discrete wavelet transform using lattice vector quantization and reed-Solomon encoding. Knowledge-based Eng Innov (KBEI), 2015 2nd Int Conf: 177–182

  40. Stek TD Drones over Mediterranean landscapes. The potential of small UAV's (drones) for site detection and heritage management in archaeological survey projects: a case study from Le Pianelle in the Tappino Valley, Molise (Italy). J Cult Heritage 22, 1066–1071, 2016

  41. Thanh TM, Hiep PT, Tam TM, Tanaka K (2014) Robust semi-blind video watermarking based on frame-patch matching. AEU-Int J Electron Commun 68:1007–1015

    Article  Google Scholar 

  42. Vaishampayan VA, Sloane N, Servetto S (2001) Multiple description vector quantization with lattice codebooks: design and analysis. IEEE Trans Inform Theor 47:1718–1734

    Article  MathSciNet  Google Scholar 

  43. Wang C, Li X, Yang B (2010) Efficient reversible image watermarking by using dynamical prediction-error expansion. 2010 IEEE Int Conf Image Process: 3673–3676

  44. Wang L, Zhong H, Ranjan R, Zomaya A, Liu P (2014) Estimating the statistical characteristics of remote sensing big data in the wavelet transform domain. IEEE Trans Emerg Top Comput 2:324–337

    Article  Google Scholar 

  45. Weber G (1993) USC-SIPI image database: Version 4. Dept Elect Eng-Syst, Univ Southern California, Los Angeles, CA, USA, Tech Rep 244

  46. Zhu C, Yang C, Ren N (2010) Application of digital watermarking to geospatial data security. Bull Surv Mapp 10:1–3

    Google Scholar 

  47. Zope-Chaudhari S, Venkatachalam P, Buddhiraju KM (2015) Secure dissemination and protection of multispectral images using crypto-watermarking. IEEE J Select Top Appl Earth Observ Remote Sens 8:5388–5394

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ehsan Akhtarkavan.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Akhtarkavan, E., Majidi, B. & Manzuri, M.T. Secure communication and archiving of low altitude remote sensing data using high capacity fragile data hiding. Multimed Tools Appl 78, 10325–10351 (2019). https://doi.org/10.1007/s11042-018-6607-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-6607-z

Keywords

Navigation