Advertisement

Multimedia Tools and Applications

, Volume 78, Issue 21, pp 30297–30313 | Cite as

Secure multimedia distribution in cloud computing using re-encryption and fingerprinting

  • Lizhi XiongEmail author
  • Zhihua Xia
  • Xianyi Chen
  • Hiuk Jae Shim
Article
  • 90 Downloads

Abstract

Recently, cloud computing becomes a main platform for the distribution of multimedia content. The paradigm of multimedia distribution has been shifted from the models in traditional ways to the one in cloud computing. Security and privacy are two most important issues in multimedia distribution. The new model in cloud computing concerns the following issues. Firstly, outsourced content should be confidential except a data owner (DO). Secondly, the CSP is semi-trusted in the public cloud computing environment. A malicious data user (DU) may collude with the CSP to harm the DO’s rights and interests. Thirdly, the rights and interests of DU, including anonymity and unlinkability, should be protected. Based on the above problems, we propose and analyze a Multimedia Distribution based Re-encryption and Fingerprinting (MDRF) scheme in cloud computing. The proposed scheme 1) allows efficient distribution of the content while preserving security and privacy of copyright holders and end users, 2) resolve the problems of piracy tracing, collusion resistance, and dispute resolution, and 3) protect the rights and interests of DU, including anonymity and unlinkability. The analysis part demonstrates that the security of DO and DU are well provided in the proposed scheme. The experimental results evaluate the performance of our framework in terms of collusion resistance of the fingerprint and imperceptibility of fingerprint embedding.

Keywords

Re-encryption Fingerprint Cloud computing Multimedia distribution 

Notes

Acknowledgements

The authors are grateful for the anonymous reviewers who made constructive comments and improvements. This work was supported by the National Natural Science Foundation of China (No. 61702276, 61672294, 61502242), the Startup Foundation for Introducing Talent of Nanjing University of Information Science and Technology under Grant 2016r055, and the Priority Academic Program Development (PAPD) of Jiangsu Higher Education Institutions.

References

  1. 1.
    Boneh D, Shaw J (1995) Collusion-secure fingerprinting for digital data. Advances in cryptology-CRYPTO’95. LNCS 963. Springer, pp 452–465Google Scholar
  2. 2.
    Camenisch J (2000) Efficient anonymous fingerprinting with group signatures. Asiacrypt 2000. LNCS 1976. Springer, pp 415–428Google Scholar
  3. 3.
    Cao Y, Zhou Z, Sun X, Gao C (2018) Coverless information hiding based on the molecular structure images of material. Computers, Material & Continua 54(2):197–207Google Scholar
  4. 4.
    Chang V, Ramachandran M (2016) Towards achieving data security with the cloud computing adoption framework. IEEE Trans Serv Comput 9(1):138–151CrossRefGoogle Scholar
  5. 5.
    Domingo-Ferrer J, Megías D (2013) Distributed multicast of fingerprinted content based on a rational peer-to-peer community. Comput Commun 36(5):542–550CrossRefGoogle Scholar
  6. 6.
    EIGamal T (1985) A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Inf Theory 31:469–472MathSciNetCrossRefGoogle Scholar
  7. 7.
    He S, Wu M (2006) Joint coding and embedding techniques for multimedia fingerprinting. IEEE Trans Inf Forensics Secur 1(2):231–247MathSciNetCrossRefGoogle Scholar
  8. 8.
    Katzenbeisser S, Lemma A, Celik M, van der Veen M, Maas M (2008) A buyer-seller watermarking protocol based on secure embedding. IEEE Trans Inf Forensic Secur 3:783–786CrossRefGoogle Scholar
  9. 9.
    Kuribayashi M (2010) On the implementation of spread spectrum fingerprinting in asymmetric cryptographic protocol. EURASIP J Inf Secur 2010:1:1–1:11Google Scholar
  10. 10.
    Lei CL, Yu PL, Tsai PL, Chan MH (2004) An efficient and anonymous buyer-seller watermarking protocol. IEEE Trans Image Process 13:1618–1626CrossRefGoogle Scholar
  11. 11.
    Megias D (2015) Improved privacy-preserving P2P multimedia distribution based on recombined fingerprints. IEEE Trans Dependable Secur C 12(2):179–189CrossRefGoogle Scholar
  12. 12.
    Megias D, Domingo-Ferrer J (2014) Privacy-aware peer-to-peer content distribution using automatically recombined fingerprints. Multimedia Systems 20(2):105–125CrossRefGoogle Scholar
  13. 13.
    Memon N, Wong PW (2001) A buyer-seller watermarking protocol. IEEE Trans Image Process 10:643–649CrossRefGoogle Scholar
  14. 14.
    Murillo-Escobar MA (2015) A robust embedded biometric authentication system based on fingerprint and chaotic encryption. Expert Syst Appl 42(21):8198–8211CrossRefGoogle Scholar
  15. 15.
    Pfitzmann B, Waidner M (1997) Anonymous fingerprinting. Advances in cryptology-EUROCRYPT’97. LNCS 1233. Springer, pp 88–102Google Scholar
  16. 16.
    Prins JP, Erkin Z, Lagendijk RL (2007) Anonymous fingerprinting with robust QIM watermarking techniques. EURASIP J Inf Secur 2007:20:1–20:7Google Scholar
  17. 17.
    Xiong L, Shi YQ (2018) On the privacy-preserving outsourcing scheme of reversible data hiding over encrypted image data in cloud computing. Computers, Materials & Continua 55(3):523–539MathSciNetGoogle Scholar
  18. 18.
    Xiong L, Xu Z, Shi YQ (2018) An integer wavelet transform based scheme for reversible data hiding in encrypted images. Multidim Syst Sign Process 29(3):1191–1202MathSciNetCrossRefGoogle Scholar
  19. 19.
    Xu Y, Xiong L, Xu Z, Pan S (2014) A content security protection scheme in jpeg compressed domain. J Vis Commun Image Represent 25(5):805–813CrossRefGoogle Scholar
  20. 20.
    Ye C, Xiong Z, Ding Y, Li J, Wang G, Zhang X, Zhang K (2014) Secure multimedia big data sharing in social networks using fingerprinting and encryption in the JPEG2000 compressed domain. In: Trust, security and privacy in computing and communications (TrustCom), 2014 IEEE 13th international conference on, pp 616–621Google Scholar
  21. 21.
    Zhang K, Liang X, Shen X (2014) Exploiting multimedia services in mobile social networks from security and privacy perspectives. IEEE Commun Mag 52(3):58–65CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.School of Computer and SoftwareNanjing University of Information Science and TechnologyNanjingChina
  2. 2.Jiangsu Engineering Center of Network MonitoringNanjing University of Information Science and TechnologyNanjingChina
  3. 3.Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology (CICAEET)Nanjing University of Information Science and TechnologyNanjingChina

Personalised recommendations