Abstract
With networking, big data and rapid development and wide application of 5G networks, traditional network architecture cannot handle massive amounts of media data generated by a large number of mobile or PC devices. In recent years, events on multimedia and data copyright violations of a substantial increase, data security and privacy protection of many original multimedia users is suffering an unprecedented challenge. On the other hand, due to the center and the invariance of the block chain, block chain has become a promising multimedia security technology. Blockchain technology provides a common, digitized and distributed books, P2P network composed of all peer nodes interconnected to each other, all participating nodes are equal, collaborative service, compared to traditional architecture under a single central point, can greatly reduce the risk of single point of failure. In this paper, based access scheme in combination with the secure multi-computing protocol blockchain system, the user needs to conduct the authentication system under the multi-computing in order to receive the data, greatly enhance the data safety of multimedia in complicated communication sceneries. In addition, the program mentioned in the text and related simulations and proof of security, usability and reliability can be guaranteed.
Similar content being viewed by others
References
Bianchi T, Piva A (2013) Secure watermarking for multimedia content protection: A review of its bene fits and open issues. IEEE Signal Process Mag 30(2):87–96
Butt AUAA, Bramwell SR, Fudge BT (2013) Multimedia distribution system, Jun. 25 2013, US Patent 8,472,792
Candes E, Romberg J (2005) l1-magic: Recovery of sparse signals via convex programming, URL: www. acm. caltech. edu/l1magic/downloads/l1magic. pdf, vol 4, p 14
Chan HT, Hwang WJ, Cheng CJ (2015) Digital hologram authentication using a hadamard-based reversible fragile watermarking algorithm. J Disp Technol 11(2):193–203
Cox IJ, Miller ML, Bloom JA (2000) Watermarking applications and their properties, in Information Technology: Coding and Computing. Proceedings. International conference on, 2000, pp 6–10
Dinh HT, Lee C, Niyato D et al (2013) a survey of mobile cloud computing: architecture, applications, and approaches[J]. Wireless Commun Mobile Comput 13(18):1587–1611
Li Z, Kang J, Yu R, Ye D, Deng Q, Zhang Y (2018) Consortium blockchain for secure energy trading in industrial internet of things. IEEE Trans Industr Inform 14(8):3690–3700
Liang KT, Man HA, Liu JK et al (2015) A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing[J]. Future Generation Comput Syst 52(C):95–108
Lim Y, Park K, Lee JY, Aoki S, Fernando G (2013) MMT: an emerging MPEG standard for multimedia delivery over the internet. IEEE MultiMed 20(1):80–85
Mougayar W (2016) The business blockchain: promise, practice, and application of the next internet technology. John Wiley & Sons, Hoboken
Orsini G, Bade D, Lamersdorf W (2016) Computing at the mobile edge: designing elastic android applications for computation offloading[C]//The 9th Conference on the Joint IFIP Wireless and Mobile Networking (WMNC’16):112–119
Pande A, Mohapatra P, Zambreno J (Oct 2013) Securing multimedia content using joint compression and encryption. IEEE MultiMed 20(4):50–61
Perera C, Talagala DS, Liu CH, Estrella JC (2015) Energy-efficient location and activity-aware on-demand mobile distributed sensing platform for sensing as a service in IoT clouds. IEEE Trans Comput Social Syst 2(4):171–181
Rudin LI, Osher S, Fatemi E (1992) Nonlinear total variation based noise removal algorithms. Physica D: Nonlinear Phenomena 60(1–4):259–268
Singh D, Singh SK (2016) Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability. J Vis Commun Image Represent 38:775–789
Valenzise G, Tagliasacchi M, Tubaro S, Cancelli G, Barni M (2009) A compressive-sensing based watermarking scheme for sparse image tampering identification,” in IEEE International Conference on Image Processing (ICIP), pp 1265–1268
Wang S, Zheng D, Zhao J, Tam WJ, Speranza F (2007) An image quality evaluation method based on digital watermarking. IEEE Trans Circuits Syst Video Technol 17(1):98–105
WANG Q, WANG C, REN K et al (2011) Enabling public auditability and data dynamics for storage security in cloud computing[J]. IEEE Trans Parallel Distribut Syst 22(5):847–859
Wu J et al (2017) FCSS: Fog computing based content aware filtering for security services in information centric social network. IEEE Trans Emerg Topics Comput (99):1–1. https://doi.org/10.1109/TETC.2017.2747158
Yamada T, Maeta M, Mizushima F (2016) Video watermark application for embedding recipient id in real-time-encoding vod server. J Real-Time Image Proc 11(1):211–222
Yang YJ, Zhu HY, Lu HB et al (2015) cloud based data sharing with fine-grained proxy re-encryption[J]. Pervasive Mobile Comput 28(C):122–134
YliHuumo J, Ko D, Choi S, Park S, Smolander K (2016) Where is current research on blockchain technology? A systematic review. PloS one 11(10):e0163477
Yu SC, Wang C, Ren K, et al. (2010) Achieving secure, scalable, and fine-grained data access control in cloud computing[C]//The 29th Annual IEEE International Conference on Computer Communications (INFOCOM’10): 1–9
Zhang H, Shu H, Coatrieux G, Zhu J, Wu QMJ, Zhang Y, Zhu H, Luo L (2011) Affine legendre moment invariants for image watermarking robust to geometric distortions. IEEE Trans Image Process 20(8):2189–2199
Zhang K, Liang X, Ni J, Yang K, Shen X (2018) Infection analysis without privacy leakage. IEEE Transactions on Dependable and Secure Computing, vol. 15, no. 4, pp. 607–620. "Exploiting social network to enhance human-to-human
Zhou L, Wu D, Zheng B, Guizani M (2014) Joint physical application layer security for wireless multimedia delivery. IEEE Commun Mag 52(3):66–72
Funding
This work is supported by the National Key RD Program of China (2017YFB0802300), the National Natural Science Foundation of China (No. 61772403, U1836203), the Natural Science Foundation of Shaanxi Province (No. 2019ZDLGY12-02), the Shaanxi Innovation Team Project (No. 2018TD-007), the Xian Science and technology innovation plan (No. 201809168CX9JC10) and National 111 Program of China B16037.
Author information
Authors and Affiliations
Corresponding authors
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Liu, J., Fan, K., Li, H. et al. A blockchain-based privacy preservation scheme in multimedia network. Multimed Tools Appl 80, 30691–30705 (2021). https://doi.org/10.1007/s11042-021-10513-y
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-021-10513-y