Abstract
The advent of social networks has made social media sharing in social network easier. However, it can also cause serious security and privacy problems, secure media sharing and traitor tracing issues have become critical and urgent. In this paper, a joint fingerprinting and encryption (JFE) scheme based on Game of Life (GF) and singular value decomposition (SVD) with the purpose of protecting content distribution in social networks. Firstly, the fingerprint code is produced using social network analysis. Secondly, fingerprints are embedded into the LL, HL and LH subbands. At last, GF and SVD are used to for confusion and diffusion respectively. The proposed method, to the best of our knowledge, is the first JFE method using GF and SVD in the compressed domain for security and privacy. The use of fingerprinting along with encryption can provide a double-layer of protection to media sharing in social network environment. Theory analysis and experimental results show the effectiveness of the proposed JFE scheme.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Lian, S., Chen, X.: Secure and traceable multimedia distribution for convergent Mobile TV services. Computer Communications 33, 1664–1673 (2010)
Cheng, H., Li, X.: Partial encryption of compressed images and videos. IEEE Transactions on Signal Processing 48, 2439–2451 (2000)
Kundur, D., Karthik, K.: Video fingerprinting and encryption principles for digital rights management. Proceedings of the IEEE 92, 918–932 (2004)
Chen, J., Zhou, J., Wong, K.W.: A modified chaos-based joint compression and encryption scheme. IEEE Transactions on Circuits and Systems II: Express Briefs 58, 110–114 (2011)
Kanso, A., Smaoui, N.: Logistic chaotic maps for binary numbers generations. Chaos, Solitons & Fractals 40, 2557–2568 (2009)
Cox, I.J., Kilian, J., Leighton, F.T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing 6, 1673–1687 (1997)
Zhao, H.V., Liu, K.J.R.: Fingerprint multicast in secure video streaming. IEEE Transactions on Image Processing 15, 12–29 (2006)
Bouslimi, D., Coatrieux, G., Roux, C.: A joint encryption/watermarking algorithm for verifying the reliability of medical images: Application to echographic images. Computer Methods and Programs in Biomedicine 106, 47–54 (2012)
Memon, N., Wong, P.W.: A buyer-seller watermarking protocol. IEEE Transactions on Image Processing 10, 643–649 (2001)
Wagner, N.R.: Mathematical Sciences Department Philadelphia, Pennsylvania 19104 (1983)
Dittmann, J., Schmitt, P., Saar, E., Ueberberg, J.: Combining digital watermarks and collusion secure fingerprints for digital images. J. Electron. Imaging 9, 456–467 (2000)
Trappe, W., Wu, M., Wang, Z.J., Liu, K.J.R.: Anti-collusion fingerprinting for multimedia. IEEE Transactions on Signal Processing 51, 1069–1087 (2003)
Thomas, T., Emmanuel, S., Subramanyam, A., Kankanhalli, M.S.: Joint watermarking scheme for multiparty multilevel DRM architecture. IEEE Transactions on Information Forensics and Security 4, 758–767 (2009)
Lin, C.Y., Prangjarote, P., Kang, L.W., Huang, W.L., Chen, T.H.: Joint fingerprinting and decryption with noise-resistant for vector quantization images. Signal Processing (2012)
Adelsbach, A., Huber, U., Sadeghi, A.R.: Fingercasting–Joint Fingerprinting and Decryption of Broadcast Messages. Transactions on Data Hiding and Multimedia Security II, 1–34 (2007)
Hou, S., Uehara, T., Satoh, T., Morimura, Y., Minoh, M.: Integrating fingerprint with cryptosystem for internet-based live pay-TV system. Security and Communication Networks 1, 461–472 (2008)
Huang, H.C., Chen, Y.H.: Genetic fingerprinting for copyright protection of multicast media. Soft Computing-A Fusion of Foundations, Methodologies and Applications 13, 383–391 (2009)
Lian, S., Wang, Z.: Collusion-traceable secure multimedia distribution based on controllable modulation. IEEE Transactions on Circuits and Systems for Video Technology 18, 1462–1467 (2008)
Lian, S., Chen, X.: Traceable content protection based on chaos and neural networks. Applied Soft Computing 11, 4293–4301 (2011)
Wolfram, S., Gad-el-Hak, M.: A new kind of science. Applied Mechanics Reviews 56, B18 (2003)
Golub, G.H., Van Loan, C.F.: Matrix computations. Johns Hopkins Univ. Pr. (1996)
Cheng, G., Ling, H., Zou, F., Li, P.: An improved QIM based anti-collusion fingerprinting scheme. In: 2010 IEEE 10th International Conference on Signal Processing (ICSP), pp. 1865–1868. IEEE Press (2010)
Khan, M.K., Zhang, J., Alghathbar, K.: Challenge-response-based biometric image scrambling for secure personal identification. Future Generation Computer Systems 27, 411–418 (2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ye, C., Ling, H., Zou, F., Lu, Z., Xiong, Z., Zhang, K. (2013). A Novel JFE Scheme for Social Multimedia Distribution in Compressed Domain Using SVD and CA. In: Shi, Y.Q., Kim, HJ., Pérez-González, F. (eds) The International Workshop on Digital Forensics and Watermarking 2012. IWDW 2012. Lecture Notes in Computer Science, vol 7809. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40099-5_41
Download citation
DOI: https://doi.org/10.1007/978-3-642-40099-5_41
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-40098-8
Online ISBN: 978-3-642-40099-5
eBook Packages: Computer ScienceComputer Science (R0)