Skip to main content

A Novel JFE Scheme for Social Multimedia Distribution in Compressed Domain Using SVD and CA

  • Conference paper
The International Workshop on Digital Forensics and Watermarking 2012 (IWDW 2012)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7809))

Included in the following conference series:

Abstract

The advent of social networks has made social media sharing in social network easier. However, it can also cause serious security and privacy problems, secure media sharing and traitor tracing issues have become critical and urgent. In this paper, a joint fingerprinting and encryption (JFE) scheme based on Game of Life (GF) and singular value decomposition (SVD) with the purpose of protecting content distribution in social networks. Firstly, the fingerprint code is produced using social network analysis. Secondly, fingerprints are embedded into the LL, HL and LH subbands. At last, GF and SVD are used to for confusion and diffusion respectively. The proposed method, to the best of our knowledge, is the first JFE method using GF and SVD in the compressed domain for security and privacy. The use of fingerprinting along with encryption can provide a double-layer of protection to media sharing in social network environment. Theory analysis and experimental results show the effectiveness of the proposed JFE scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Lian, S., Chen, X.: Secure and traceable multimedia distribution for convergent Mobile TV services. Computer Communications 33, 1664–1673 (2010)

    Article  Google Scholar 

  2. Cheng, H., Li, X.: Partial encryption of compressed images and videos. IEEE Transactions on Signal Processing 48, 2439–2451 (2000)

    Article  Google Scholar 

  3. Kundur, D., Karthik, K.: Video fingerprinting and encryption principles for digital rights management. Proceedings of the IEEE 92, 918–932 (2004)

    Article  Google Scholar 

  4. Chen, J., Zhou, J., Wong, K.W.: A modified chaos-based joint compression and encryption scheme. IEEE Transactions on Circuits and Systems II: Express Briefs 58, 110–114 (2011)

    Article  Google Scholar 

  5. Kanso, A., Smaoui, N.: Logistic chaotic maps for binary numbers generations. Chaos, Solitons & Fractals 40, 2557–2568 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  6. Cox, I.J., Kilian, J., Leighton, F.T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing 6, 1673–1687 (1997)

    Article  Google Scholar 

  7. Zhao, H.V., Liu, K.J.R.: Fingerprint multicast in secure video streaming. IEEE Transactions on Image Processing 15, 12–29 (2006)

    Article  Google Scholar 

  8. Bouslimi, D., Coatrieux, G., Roux, C.: A joint encryption/watermarking algorithm for verifying the reliability of medical images: Application to echographic images. Computer Methods and Programs in Biomedicine 106, 47–54 (2012)

    Article  Google Scholar 

  9. Memon, N., Wong, P.W.: A buyer-seller watermarking protocol. IEEE Transactions on Image Processing 10, 643–649 (2001)

    Article  MATH  Google Scholar 

  10. Wagner, N.R.: Mathematical Sciences Department Philadelphia, Pennsylvania 19104 (1983)

    Google Scholar 

  11. Dittmann, J., Schmitt, P., Saar, E., Ueberberg, J.: Combining digital watermarks and collusion secure fingerprints for digital images. J. Electron. Imaging 9, 456–467 (2000)

    Article  Google Scholar 

  12. Trappe, W., Wu, M., Wang, Z.J., Liu, K.J.R.: Anti-collusion fingerprinting for multimedia. IEEE Transactions on Signal Processing 51, 1069–1087 (2003)

    Article  MathSciNet  Google Scholar 

  13. Thomas, T., Emmanuel, S., Subramanyam, A., Kankanhalli, M.S.: Joint watermarking scheme for multiparty multilevel DRM architecture. IEEE Transactions on Information Forensics and Security 4, 758–767 (2009)

    Article  Google Scholar 

  14. Lin, C.Y., Prangjarote, P., Kang, L.W., Huang, W.L., Chen, T.H.: Joint fingerprinting and decryption with noise-resistant for vector quantization images. Signal Processing (2012)

    Google Scholar 

  15. Adelsbach, A., Huber, U., Sadeghi, A.R.: Fingercasting–Joint Fingerprinting and Decryption of Broadcast Messages. Transactions on Data Hiding and Multimedia Security II, 1–34 (2007)

    Google Scholar 

  16. Hou, S., Uehara, T., Satoh, T., Morimura, Y., Minoh, M.: Integrating fingerprint with cryptosystem for internet-based live pay-TV system. Security and Communication Networks 1, 461–472 (2008)

    Article  Google Scholar 

  17. Huang, H.C., Chen, Y.H.: Genetic fingerprinting for copyright protection of multicast media. Soft Computing-A Fusion of Foundations, Methodologies and Applications 13, 383–391 (2009)

    Google Scholar 

  18. Lian, S., Wang, Z.: Collusion-traceable secure multimedia distribution based on controllable modulation. IEEE Transactions on Circuits and Systems for Video Technology 18, 1462–1467 (2008)

    Article  Google Scholar 

  19. Lian, S., Chen, X.: Traceable content protection based on chaos and neural networks. Applied Soft Computing 11, 4293–4301 (2011)

    Article  Google Scholar 

  20. Wolfram, S., Gad-el-Hak, M.: A new kind of science. Applied Mechanics Reviews 56, B18 (2003)

    Google Scholar 

  21. Golub, G.H., Van Loan, C.F.: Matrix computations. Johns Hopkins Univ. Pr. (1996)

    Google Scholar 

  22. Cheng, G., Ling, H., Zou, F., Li, P.: An improved QIM based anti-collusion fingerprinting scheme. In: 2010 IEEE 10th International Conference on Signal Processing (ICSP), pp. 1865–1868. IEEE Press (2010)

    Google Scholar 

  23. Khan, M.K., Zhang, J., Alghathbar, K.: Challenge-response-based biometric image scrambling for secure personal identification. Future Generation Computer Systems 27, 411–418 (2011)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ye, C., Ling, H., Zou, F., Lu, Z., Xiong, Z., Zhang, K. (2013). A Novel JFE Scheme for Social Multimedia Distribution in Compressed Domain Using SVD and CA. In: Shi, Y.Q., Kim, HJ., Pérez-González, F. (eds) The International Workshop on Digital Forensics and Watermarking 2012. IWDW 2012. Lecture Notes in Computer Science, vol 7809. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40099-5_41

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-40099-5_41

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-40098-8

  • Online ISBN: 978-3-642-40099-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics