期刊文献+

可扩展的社交多媒体安全分享方法研究

Secure and scalable social multimedia sharing for social network
下载PDF
导出
摘要 社交多媒体在社交网络中的分享面临安全与隐私威胁,多媒体加密可以解决保密性问题,数字指纹技术可以实现叛逆者追踪,但现有数字指纹技术还不能应用于大规模社交网络。现有指纹码不能容纳社交网络中数以亿计的海量用户,为每位用户单独生成指纹拷贝,对数亿计的用户而言,会造成巨额的空间和时间开销,此类问题的产生源于现有的安全分享算法缺乏可扩展性。面向社交多媒体安全分享在确保保密性、可追踪性的同时,更需要保证可扩展性,以适应社交网络的动态变化。基于混沌加密和社交网络指纹技术,提出一种面向社交多媒体安全分享的树结构Haar(tree structure Haar,TSH)变换域的联合多媒体指纹与加密技术,实验结果与理论分析证明了该方法不仅可以保证社交多媒体的安全分享,而且可以实现可扩展性。 Social multimedia sharing in social network faces threat of security and privacy. This paper explores the notion of the hierarchical community structure of social network and its intrinsic properties to assign fingerprints to users. The motivation is to assist tree structure Haar(TSH) transform for fingerprinting adaptively, in the end; any size of segment of fingerprint codeword can be embedded into the corresponding coefficients in the TSH domain. The use of fingerprinting along with encryption in the TSH transform domain can not only provide a double-layer of protection to multimedia sharing in social networks, but also provide a fingerprinting scheme with scalability for social multimedia sharing in social networks. Theory analysis and experimental results show the effectiveness of the proposed joint fingerprinting and enciyption scheme in the TSH domain.
作者 叶从欢 熊曾刚 张学敏 王光伟 徐方 刘振 YE Conghuan;XIONG Zenggang;ZHANG Xuemin;WANG Guangwei;XU Fang;LIU Zhen(Hubei Engineering University, School of Computer and Information Science, Xiaogan 432000 ,P . R. China)
出处 《重庆邮电大学学报(自然科学版)》 CSCD 北大核心 2016年第4期511-517,共7页 Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition)
基金 国家自然科学基金(61502154 61370092 61370223) 湖北省自然科学基金(2015CFB236 2014CFB188) 湖北省高校中青年团队项目(T201410)~~
关键词 多媒体社交网络 社交多媒体分享 安全分享 多媒体指纹 可扩展性 multimedia social network social multimedia sharing security sharing multimedia fingerprinting scalability
  • 相关文献

参考文献21

  • 1COX I J,K IL IA N J,LEIGHTON F T ,et al. Secure spreadspectrum watermarking for multimedia[J].IEEE Transactionson Image Processing, 1997,6(9) : 1673-1687.
  • 2BONEH D, SHAW J. Collusion-secure fingerprinting fordigital data[J].IEEE Transactions on InformationTheory, 1998,44(12):1897-1905.
  • 3LIAN S, CHEN X. Traceable content protection based onchaos and neural networks[J].Applied Soft Computing,2011, 11(11):4293-4301.
  • 4KUNDUR D, KARTHIK K. Video fingerprinting and encryptionprinciples for digital rights management[J].Proceedingsof the IEEE, 2004 ,9 2(8 ) :918-932.
  • 5BOUSLIMI D,COATRIEUX G,COZIC M ,et al. Joint encryption/watermarking system for verifying the reliabilityof medical images[J].IEEE Transactions on InformationTechnology in Biomedicine ,2012,16(10):891-899.
  • 6CANCELLARO M,BATTISTI F,C AR LI M ,et al. A commutativedigital image watermarking and encryption methodin the tree structured Haar transform domain [J]. SignalProcessing : Image Communication ,2011,26(1) : 1-12.
  • 7SUBRAMANYAM A , EMMANUEL S, KANKANHALLIM. S. Robust watermarking of compressed and encryptedJPEG2000 images[J].IEEE Transactions on Multimedia,2012, 14 (1) :703-716.
  • 8LI AN S. Quasi-commutative watermarking and encryptionfor secure media content distribution [J].MultimediaTools and Applications, 2009 ,43(1) :91-107.
  • 9C, LING H , ZOU F, et al. Secure content sharingfor social network using fingerprinting and encryption inthe TSH transform domain[C].ACM Proceedings of the 20th ACM international conference on Multimedia. New Y ork:ACM ,2012, 1117-1120.
  • 10CLAUSET A , MOORE C, NEWMAN M E. Hierarchicalstructure and the prediction of missing links in networks[J].Nature, 2008, 45 3 (1) :98-101.

二级参考文献44

  • 1张军,熊枫.网络隐私保护技术综述[J].计算机应用研究,2005,22(7):9-11. 被引量:22
  • 2郭丽峰,程相国.一个无可信中心的(t,n)门限签名方案的安全性分析[J].计算机学报,2006,29(11):2013-2017. 被引量:14
  • 3Cox I J, Kilian J, Leighton F T, et al. Secure spread spectrum watermarking for multimedia [ J ]. IEEE Transactions on Image Process-ing,1997,6(1) :1673-1687.
  • 4Zheng P,Huang J. Walsh-hadamard transform in the homomorphic encrypted domain and its application in image watermarking [ C ]. Information Hiding,2013 ;240-254.
  • 5Boneh D, Shaw J. Collusion-secure fingerprinting for digital data [ J]. IEEE Transactions on Information Theory ,1998,44( 1) : 1897-1905.
  • 6Kundur D, Karthik K. Video fingerprinting and encryption principles for digital rights management [ J ]. Proceedings of the IEEE, 2004,92(8) ;918-932.
  • 7Bouslimi D,Coatrieux G,Cozic M,et al. A joint encryption/watermarking system for verifying the reliability of medical images [ J ]. IEEE Transactions on Information Technology in Biomedicine, 2012,16(11) ;891-899.
  • 8Cancellaro M,Battisti F,Carli M,et al. A commutative digital image watermarking and encryption method in the tree structured Haar transform domain [ J ]. Signal Processing: Image Communication, 2011,26(5) : 1 -12.
  • 9Subramanyam A, Emmanuel S, Kankanhalli M S. Robust watermarking of compressed and encrypted JPEG2000 images [ J ]. IEEE Transactions on Multimedia,2012,14(3) ;703-716.
  • 10Ye C, Ling H, Zou F, et al. Secure content sharing for social network using fingerprinting and encryption in the TSH transform do-main[C]. In Proceedings of the 20th ACM International Conference on Multimedia,2012:1117-1120.

共引文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部