A Novel JFE Scheme for Social Multimedia Distribution in Compressed Domain Using SVD and CA
详细信息    查看全文
  • 作者:Conghuan Ye (19) (20)
    Hefei Ling (19)
    Fuhao Zou (19)
    Zhengding Lu (19)
    Zenggang Xiong (20)
    Kaibing Zhang (20)
  • 关键词:fingerprinting ; encryption ; social media sharing ; SVD ; cellular automata ; social network
  • 刊名:Lecture Notes in Computer Science
  • 出版年:2013
  • 出版时间:2013
  • 年:2013
  • 卷:7809
  • 期:1
  • 页码:520-529
  • 全文大小:1620KB
  • 参考文献:1. Lian, S., Chen, X.: Secure and traceable multimedia distribution for convergent Mobile TV services. Computer Communications聽33, 1664鈥?673 (2010) CrossRef
    2. Cheng, H., Li, X.: Partial encryption of compressed images and videos. IEEE Transactions on Signal Processing聽48, 2439鈥?451 (2000) CrossRef
    3. Kundur, D., Karthik, K.: Video fingerprinting and encryption principles for digital rights management. Proceedings of the IEEE聽92, 918鈥?32 (2004) CrossRef
    4. Chen, J., Zhou, J., Wong, K.W.: A modified chaos-based joint compression and encryption scheme. IEEE Transactions on Circuits and Systems II: Express Briefs聽58, 110鈥?14 (2011) CrossRef
    5. Kanso, A., Smaoui, N.: Logistic chaotic maps for binary numbers generations. Chaos, Solitons & Fractals聽40, 2557鈥?568 (2009) CrossRef
    6. Cox, I.J., Kilian, J., Leighton, F.T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing聽6, 1673鈥?687 (1997) CrossRef
    7. Zhao, H.V., Liu, K.J.R.: Fingerprint multicast in secure video streaming. IEEE Transactions on Image Processing聽15, 12鈥?9 (2006) CrossRef
    8. Bouslimi, D., Coatrieux, G., Roux, C.: A joint encryption/watermarking algorithm for verifying the reliability of medical images: Application to echographic images. Computer Methods and Programs in Biomedicine聽106, 47鈥?4 (2012) CrossRef
    9. Memon, N., Wong, P.W.: A buyer-seller watermarking protocol. IEEE Transactions on Image Processing聽10, 643鈥?49 (2001) CrossRef
    10. Wagner, N.R.: Mathematical Sciences Department Philadelphia, Pennsylvania 19104 (1983)
    11. Dittmann, J., Schmitt, P., Saar, E., Ueberberg, J.: Combining digital watermarks and collusion secure fingerprints for digital images. J. Electron. Imaging聽9, 456鈥?67 (2000) CrossRef
    12. Trappe, W., Wu, M., Wang, Z.J., Liu, K.J.R.: Anti-collusion fingerprinting for multimedia. IEEE Transactions on Signal Processing聽51, 1069鈥?087 (2003) CrossRef
    13. Thomas, T., Emmanuel, S., Subramanyam, A., Kankanhalli, M.S.: Joint watermarking scheme for multiparty multilevel DRM architecture. IEEE Transactions on Information Forensics and Security聽4, 758鈥?67 (2009) CrossRef
    14. Lin, C.Y., Prangjarote, P., Kang, L.W., Huang, W.L., Chen, T.H.: Joint fingerprinting and decryption with noise-resistant for vector quantization images. Signal Processing (2012)
    15. Adelsbach, A., Huber, U., Sadeghi, A.R.: Fingercasting鈥揓oint Fingerprinting and Decryption of Broadcast Messages. Transactions on Data Hiding and Multimedia Security II, 1鈥?4 (2007)
    16. Hou, S., Uehara, T., Satoh, T., Morimura, Y., Minoh, M.: Integrating fingerprint with cryptosystem for internet-based live pay-TV system. Security and Communication Networks聽1, 461鈥?72 (2008) CrossRef
    17. Huang, H.C., Chen, Y.H.: Genetic fingerprinting for copyright protection of multicast media. Soft Computing-A Fusion of Foundations, Methodologies and Applications聽13, 383鈥?91 (2009)
    18. Lian, S., Wang, Z.: Collusion-traceable secure multimedia distribution based on controllable modulation. IEEE Transactions on Circuits and Systems for Video Technology聽18, 1462鈥?467 (2008) CrossRef
    19. Lian, S., Chen, X.: Traceable content protection based on chaos and neural networks. Applied Soft Computing聽11, 4293鈥?301 (2011) CrossRef
    20. Wolfram, S., Gad-el-Hak, M.: A new kind of science. Applied Mechanics Reviews 56, B18 (2003)
    21. Golub, G.H., Van Loan, C.F.: Matrix computations. Johns Hopkins Univ. Pr. (1996)
    22. Cheng, G., Ling, H., Zou, F., Li, P.: An improved QIM based anti-collusion fingerprinting scheme. In: 2010 IEEE 10th International Conference on Signal Processing (ICSP), pp. 1865鈥?868. IEEE Press (2010)
    23. Khan, M.K., Zhang, J., Alghathbar, K.: Challenge-response-based biometric image scrambling for secure personal identification. Future Generation Computer Systems聽27, 411鈥?18 (2011) CrossRef
  • 作者单位:Conghuan Ye (19) (20)
    Hefei Ling (19)
    Fuhao Zou (19)
    Zhengding Lu (19)
    Zenggang Xiong (20)
    Kaibing Zhang (20)

    19. College of Computer Science, Huazhong University of Science & Technology, Wuhan, China
    20. College of Computer and Information Science, Hubei Engineering University, Xiaogan, China
文摘
The advent of social networks has made social media sharing in social network easier. However, it can also cause serious security and privacy problems, secure media sharing and traitor tracing issues have become critical and urgent. In this paper, a joint fingerprinting and encryption (JFE) scheme based on Game of Life (GF) and singular value decomposition (SVD) with the purpose of protecting content distribution in social networks. Firstly, the fingerprint code is produced using social network analysis. Secondly, fingerprints are embedded into the LL, HL and LH subbands. At last, GF and SVD are used to for confusion and diffusion respectively. The proposed method, to the best of our knowledge, is the first JFE method using GF and SVD in the compressed domain for security and privacy. The use of fingerprinting along with encryption can provide a double-layer of protection to media sharing in social network environment. Theory analysis and experimental results show the effectiveness of the proposed JFE scheme.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700