Table of contents : Cover......Page 1 Half Title......Page 2 Title Page......Page 4 Copyright Page......Page 5 Table of Contents......Page 6 Preface......Page 10 Acknowledgements......Page 14 Editor......Page 16 Contributors......Page 18 Reviewer Details......Page 22 SECTION I: ENCRYPTION......Page 26 1: Introduction to Information Security Systems Primitives......Page 28 2: Cryptographic Image Scrambling Techniques......Page 62 3: Chaos-Based Image Cryptography......Page 92 4: Fundamental Cryptographic Characteristics of Boolean Functions: A Review......Page 122 5: Phase Retrieval in Optical Cryptography......Page 148 6: Security and Cryptography in Images and Video Using Elliptic Curve Cryptography (ECC)......Page 166 7: Security of Scalable Video Coding: Encryption and Authentication......Page 196 8: Compressive Sensing in Color Image Security......Page 236 9: Secure Threshold Attribute-Based Signcryption with Constant Number of Pairings......Page 270 10: Multimedia Contents Encryption Using the Chaotic MACM System on a Smart-display......Page 288 11: Medical Image Encryption......Page 322 SECTION II: WATERMARKING......Page 346 12: Watermarking Techniques for Copyright Protection of Texts in Document Files......Page 348 13: VLSI Implementation of Video Watermarking for Secure HEVC Coding Standard......Page 378 14: Data Hiding in Compressed Images and Videos......Page 404 15: Robust Image Watermarking Based on Multiple-Criteria Decision-Making......Page 432 16: The Role of Image Fusion and Watermarking Techniques in Medical Imaging......Page 466 17: Watermarking Techniques and Its Applications in Tele-Health: A Technical Survey......Page 492 SECTION III: STEGANOGRAPHY......Page 534 18: Utilization of Small S-Boxes for Information Hiding......Page 536 19: Secure and Robust ECG Steganography Using Fractional Fourier Transform......Page 566 20: Visual Secret Sharing Scheme for (k,n) Threshold-Based on QR Code with Multiple Decryptions......Page 596 21: Steganography Based on Interpolation and Edge Detection Techniques......Page 622 22: Steganography and Medical Data Security......Page 652 SECTION IV: FORENSICS......Page 686 23: Digital Visual Media Forensics......Page 688 24: Review of Image Tampering Detection Techniques......Page 748 25: Blockchain Security for Wireless Multimedia Networks......Page 770 26: Copy-Move Image Forgery Detection Using Redundant Keypoint Elimination Method......Page 798 27: Anti-Forensics for Image and Video Tampering: A Review......Page 824 SECTION V: BIOMETRICS......Page 854 28: Securing Biometrics Using Data Hiding Techniques......Page 856 29: Secure Biometric Modalities for Effective Communication......Page 880 30: Application of Video-Based Face Recognition for Mobile Security Using Machine Learning Techniques......Page 912 31: Biometrics-Based Authentication Scheme for Cloud Environment......Page 942 Index......Page 970