The protection of digitalmultimediadata (such as image, audio, video) from unauthorizedaccess,manipulation, or disclosure during the storage, transmission and processing. Aims to ensure the confidentiality, integrity, and authenticity.
Purposes of multimedia security
Confidentiality
Copyrightprotection
Integrity
Authentication
Temper detection
Access control
Non repudiation
Data hiding
Cryptography techniques used to protect multimedia content, including watermarking and steganography
Watermarking
A method to hidesecretinformation in multimediacontent by embedding a digital code or image, which might be visible or covert, to assert ownership, verify authenticity, or convey metadata.
Steganography
The practice of concealinginformation within anothermessage or physical object to avoid detection, enabling secure communication.
Multimedia content needs to be protected to ensure the security of sensitive information, protect intellectual property rights, and maintain trust
Digital Rights Management (DRM)
Technology and systems used to controlaccess to digitalcontent and protect it from piracy and unauthorizeduse
DRM techniques
Encryption
Access control
Copy protection
Digital watermarking
Licensing system
Authentication mechanism
Database
An organized collection of structured information or data
Databases need to be protected to prevent unauthorized disclosure of sensitive information, manipulation of records, disruption of services, and financial losses
Threats to databases
Unauthorized access
Data breaches
SQL injection attacks
Malware infections
Insider threats
Online payment security
Techniques to reduce the risk of data leakage and financial loss, including encryption and tokenization, to protect the communication between the customer and the payment gateway
Online payment security threats
Eavesdropping
Data manipulation
Encryption
1. Transforming data into a secret code that only authorized parties can access and decipher
2. Converting plain text into scrambled ciphertext using encryption keys
Tokenization
Replacing sensitive payment information with unique tokens to keep the data safe during transactions, as the tokens are useless to hackers without the associated decryption key
Steganography
The practice of concealing information within another message or physical object, such as an image, to avoid detection and enable secure communication
Steganalysis
Analyzing media files to detect the presence of hidden information by understanding normal file properties, extracting features, and comparing them to identify anomalies
Least Significant Bit (LSB)
A method of embedding secret data in the least significant bits of the cover media, often resulting in visually identical files