Abstract
Recently, cloud computing becomes a main platform for the distribution of multimedia content. The paradigm of multimedia distribution has been shifted from the models in traditional ways to the one in cloud computing. Security and privacy are two most important issues in multimedia distribution. The new model in cloud computing concerns the following issues. Firstly, outsourced content should be confidential except a data owner (DO). Secondly, the CSP is semi-trusted in the public cloud computing environment. A malicious data user (DU) may collude with the CSP to harm the DO’s rights and interests. Thirdly, the rights and interests of DU, including anonymity and unlinkability, should be protected. Based on the above problems, we propose and analyze a Multimedia Distribution based Re-encryption and Fingerprinting (MDRF) scheme in cloud computing. The proposed scheme 1) allows efficient distribution of the content while preserving security and privacy of copyright holders and end users, 2) resolve the problems of piracy tracing, collusion resistance, and dispute resolution, and 3) protect the rights and interests of DU, including anonymity and unlinkability. The analysis part demonstrates that the security of DO and DU are well provided in the proposed scheme. The experimental results evaluate the performance of our framework in terms of collusion resistance of the fingerprint and imperceptibility of fingerprint embedding.
Similar content being viewed by others
References
Boneh D, Shaw J (1995) Collusion-secure fingerprinting for digital data. Advances in cryptology-CRYPTO’95. LNCS 963. Springer, pp 452–465
Camenisch J (2000) Efficient anonymous fingerprinting with group signatures. Asiacrypt 2000. LNCS 1976. Springer, pp 415–428
Cao Y, Zhou Z, Sun X, Gao C (2018) Coverless information hiding based on the molecular structure images of material. Computers, Material & Continua 54(2):197–207
Chang V, Ramachandran M (2016) Towards achieving data security with the cloud computing adoption framework. IEEE Trans Serv Comput 9(1):138–151
Domingo-Ferrer J, Megías D (2013) Distributed multicast of fingerprinted content based on a rational peer-to-peer community. Comput Commun 36(5):542–550
EIGamal T (1985) A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Inf Theory 31:469–472
He S, Wu M (2006) Joint coding and embedding techniques for multimedia fingerprinting. IEEE Trans Inf Forensics Secur 1(2):231–247
Katzenbeisser S, Lemma A, Celik M, van der Veen M, Maas M (2008) A buyer-seller watermarking protocol based on secure embedding. IEEE Trans Inf Forensic Secur 3:783–786
Kuribayashi M (2010) On the implementation of spread spectrum fingerprinting in asymmetric cryptographic protocol. EURASIP J Inf Secur 2010:1:1–1:11
Lei CL, Yu PL, Tsai PL, Chan MH (2004) An efficient and anonymous buyer-seller watermarking protocol. IEEE Trans Image Process 13:1618–1626
Megias D (2015) Improved privacy-preserving P2P multimedia distribution based on recombined fingerprints. IEEE Trans Dependable Secur C 12(2):179–189
Megias D, Domingo-Ferrer J (2014) Privacy-aware peer-to-peer content distribution using automatically recombined fingerprints. Multimedia Systems 20(2):105–125
Memon N, Wong PW (2001) A buyer-seller watermarking protocol. IEEE Trans Image Process 10:643–649
Murillo-Escobar MA (2015) A robust embedded biometric authentication system based on fingerprint and chaotic encryption. Expert Syst Appl 42(21):8198–8211
Pfitzmann B, Waidner M (1997) Anonymous fingerprinting. Advances in cryptology-EUROCRYPT’97. LNCS 1233. Springer, pp 88–102
Prins JP, Erkin Z, Lagendijk RL (2007) Anonymous fingerprinting with robust QIM watermarking techniques. EURASIP J Inf Secur 2007:20:1–20:7
Xiong L, Shi YQ (2018) On the privacy-preserving outsourcing scheme of reversible data hiding over encrypted image data in cloud computing. Computers, Materials & Continua 55(3):523–539
Xiong L, Xu Z, Shi YQ (2018) An integer wavelet transform based scheme for reversible data hiding in encrypted images. Multidim Syst Sign Process 29(3):1191–1202
Xu Y, Xiong L, Xu Z, Pan S (2014) A content security protection scheme in jpeg compressed domain. J Vis Commun Image Represent 25(5):805–813
Ye C, Xiong Z, Ding Y, Li J, Wang G, Zhang X, Zhang K (2014) Secure multimedia big data sharing in social networks using fingerprinting and encryption in the JPEG2000 compressed domain. In: Trust, security and privacy in computing and communications (TrustCom), 2014 IEEE 13th international conference on, pp 616–621
Zhang K, Liang X, Shen X (2014) Exploiting multimedia services in mobile social networks from security and privacy perspectives. IEEE Commun Mag 52(3):58–65
Acknowledgements
The authors are grateful for the anonymous reviewers who made constructive comments and improvements. This work was supported by the National Natural Science Foundation of China (No. 61702276, 61672294, 61502242), the Startup Foundation for Introducing Talent of Nanjing University of Information Science and Technology under Grant 2016r055, and the Priority Academic Program Development (PAPD) of Jiangsu Higher Education Institutions.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Xiong, L., Xia, Z., Chen, X. et al. Secure multimedia distribution in cloud computing using re-encryption and fingerprinting. Multimed Tools Appl 78, 30297–30313 (2019). https://doi.org/10.1007/s11042-018-6981-6
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-018-6981-6