Skip to main content
Log in

Secure multimedia distribution in cloud computing using re-encryption and fingerprinting

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Recently, cloud computing becomes a main platform for the distribution of multimedia content. The paradigm of multimedia distribution has been shifted from the models in traditional ways to the one in cloud computing. Security and privacy are two most important issues in multimedia distribution. The new model in cloud computing concerns the following issues. Firstly, outsourced content should be confidential except a data owner (DO). Secondly, the CSP is semi-trusted in the public cloud computing environment. A malicious data user (DU) may collude with the CSP to harm the DO’s rights and interests. Thirdly, the rights and interests of DU, including anonymity and unlinkability, should be protected. Based on the above problems, we propose and analyze a Multimedia Distribution based Re-encryption and Fingerprinting (MDRF) scheme in cloud computing. The proposed scheme 1) allows efficient distribution of the content while preserving security and privacy of copyright holders and end users, 2) resolve the problems of piracy tracing, collusion resistance, and dispute resolution, and 3) protect the rights and interests of DU, including anonymity and unlinkability. The analysis part demonstrates that the security of DO and DU are well provided in the proposed scheme. The experimental results evaluate the performance of our framework in terms of collusion resistance of the fingerprint and imperceptibility of fingerprint embedding.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Boneh D, Shaw J (1995) Collusion-secure fingerprinting for digital data. Advances in cryptology-CRYPTO’95. LNCS 963. Springer, pp 452–465

  2. Camenisch J (2000) Efficient anonymous fingerprinting with group signatures. Asiacrypt 2000. LNCS 1976. Springer, pp 415–428

  3. Cao Y, Zhou Z, Sun X, Gao C (2018) Coverless information hiding based on the molecular structure images of material. Computers, Material & Continua 54(2):197–207

    Google Scholar 

  4. Chang V, Ramachandran M (2016) Towards achieving data security with the cloud computing adoption framework. IEEE Trans Serv Comput 9(1):138–151

    Article  Google Scholar 

  5. Domingo-Ferrer J, Megías D (2013) Distributed multicast of fingerprinted content based on a rational peer-to-peer community. Comput Commun 36(5):542–550

    Article  Google Scholar 

  6. EIGamal T (1985) A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Inf Theory 31:469–472

    Article  MathSciNet  Google Scholar 

  7. He S, Wu M (2006) Joint coding and embedding techniques for multimedia fingerprinting. IEEE Trans Inf Forensics Secur 1(2):231–247

    Article  MathSciNet  Google Scholar 

  8. Katzenbeisser S, Lemma A, Celik M, van der Veen M, Maas M (2008) A buyer-seller watermarking protocol based on secure embedding. IEEE Trans Inf Forensic Secur 3:783–786

    Article  Google Scholar 

  9. Kuribayashi M (2010) On the implementation of spread spectrum fingerprinting in asymmetric cryptographic protocol. EURASIP J Inf Secur 2010:1:1–1:11

    Google Scholar 

  10. Lei CL, Yu PL, Tsai PL, Chan MH (2004) An efficient and anonymous buyer-seller watermarking protocol. IEEE Trans Image Process 13:1618–1626

    Article  Google Scholar 

  11. Megias D (2015) Improved privacy-preserving P2P multimedia distribution based on recombined fingerprints. IEEE Trans Dependable Secur C 12(2):179–189

    Article  Google Scholar 

  12. Megias D, Domingo-Ferrer J (2014) Privacy-aware peer-to-peer content distribution using automatically recombined fingerprints. Multimedia Systems 20(2):105–125

    Article  Google Scholar 

  13. Memon N, Wong PW (2001) A buyer-seller watermarking protocol. IEEE Trans Image Process 10:643–649

    Article  Google Scholar 

  14. Murillo-Escobar MA (2015) A robust embedded biometric authentication system based on fingerprint and chaotic encryption. Expert Syst Appl 42(21):8198–8211

    Article  Google Scholar 

  15. Pfitzmann B, Waidner M (1997) Anonymous fingerprinting. Advances in cryptology-EUROCRYPT’97. LNCS 1233. Springer, pp 88–102

  16. Prins JP, Erkin Z, Lagendijk RL (2007) Anonymous fingerprinting with robust QIM watermarking techniques. EURASIP J Inf Secur 2007:20:1–20:7

    Google Scholar 

  17. Xiong L, Shi YQ (2018) On the privacy-preserving outsourcing scheme of reversible data hiding over encrypted image data in cloud computing. Computers, Materials & Continua 55(3):523–539

    MathSciNet  Google Scholar 

  18. Xiong L, Xu Z, Shi YQ (2018) An integer wavelet transform based scheme for reversible data hiding in encrypted images. Multidim Syst Sign Process 29(3):1191–1202

    Article  MathSciNet  Google Scholar 

  19. Xu Y, Xiong L, Xu Z, Pan S (2014) A content security protection scheme in jpeg compressed domain. J Vis Commun Image Represent 25(5):805–813

    Article  Google Scholar 

  20. Ye C, Xiong Z, Ding Y, Li J, Wang G, Zhang X, Zhang K (2014) Secure multimedia big data sharing in social networks using fingerprinting and encryption in the JPEG2000 compressed domain. In: Trust, security and privacy in computing and communications (TrustCom), 2014 IEEE 13th international conference on, pp 616–621

  21. Zhang K, Liang X, Shen X (2014) Exploiting multimedia services in mobile social networks from security and privacy perspectives. IEEE Commun Mag 52(3):58–65

    Article  Google Scholar 

Download references

Acknowledgements

The authors are grateful for the anonymous reviewers who made constructive comments and improvements. This work was supported by the National Natural Science Foundation of China (No. 61702276, 61672294, 61502242), the Startup Foundation for Introducing Talent of Nanjing University of Information Science and Technology under Grant 2016r055, and the Priority Academic Program Development (PAPD) of Jiangsu Higher Education Institutions.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lizhi Xiong.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Xiong, L., Xia, Z., Chen, X. et al. Secure multimedia distribution in cloud computing using re-encryption and fingerprinting. Multimed Tools Appl 78, 30297–30313 (2019). https://doi.org/10.1007/s11042-018-6981-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-6981-6

Keywords

Navigation