Joint Fingerpriting and Encryption in Hybrid domains for Multimedia Sharing in Social Networks

نویسندگان

  • Conghuan Ye
  • Zenggang Xiong
  • Yaoming Ding
  • Jiping Li
  • Guangwei Wang
  • Kaibing Zhang
چکیده

The advent of social networks and cloud computing has made social multimedia sharing in social networks easier and more efficient. The lowered cost of redistribution, however, also invites much motivation for large-scale copyright infringement. It is necessary to safeguard multimedia sharing for security and privacy. In this paper, we propose a novel framework for joint fingerprinting and encryption (JFE) based on Cellular Automata (CA) and social network analysis (SNA) with the purpose of protecting media distribution in social networks. The motivation is to map the hierarchical community structure of social networks into the tree structure of Discrete Wavelet Transform (DWT) for fingerprinting and encryption. Firstly, the fingerprint code is produced using SNA. Secondly, fingerprints are embedded in the DWT domain. Thirdly, CA is used for permutation in the DWT domain. Finally, the image is diffused with XOR operation in the spatial domain. The proposed method, to the best of our knowledge, is the first JFE method using CA and SNA in hybrid domains for security and privacy in social networks. The use of fingerprinting along with encryption can provide a double-layer of protection for media sharing in social networks. Theory analysis and experimental results show the effectiveness of the proposed JFE scheme.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The patterns and behaviors of researchers’ knowledge sharing in scientific social networks:A Case Study of Research Gate’ Question And Answer System

Aim: Scientific social networks were shaped as part of a set of social software and a platform for international interactions sharing the tangible and intangible knowledge of researchers. The purpose is to investigate the patterns and behaviors of knowledge sharing of researchers in Research Gate. Based on this, the question and answer system of this scientific social network was analyzed and r...

متن کامل

Joint Fingerprinting and Encryption for JPEG Images Sharing in Mobile Social Network

The advent of mobile social network and smartphone has made social multimedia sharing in social network easier and more efficient. However, it can also cause serious security and privacy problems, secure social multimedia sharing and traitor tracing issues have become critical and urgent. In this paper, we propose a joint fingerprinting and encryption (JFE) scheme based on Game of Life (GL) and...

متن کامل

Parallel Joint Fingerprinting and Encryption for Social Multimedia Sharing Based on Game of Life

The advent of online social network and mobile multimedia communication has made content sharing in social network easier and more efficient. It is very important to combine fingerprinting and encryption for social multimedia content protection. In this paper, a parallel JFE (joint fingerprinting and encryption) framework is proposed. Firstly, the multi-level social fingerprint code is produced...

متن کامل

Importance of Ethical Education in Clinical Photography Sharing and Using Social Media

In developing countries, similar to other parts of the world, smartphones and social networks are highly popular. there are many challenges in use of social networks by the health system staff. Clinical photography plays an important role in the medical practice to determine the state, treatment and progression of a patient’s condition. ethical education is needed on how to take and share clini...

متن کامل

An improved hybrid image watermarking scheme in shearlet and wavelet domain

Watermarking is one of the best solutions for copyright protection and authentication of multimedia contents. In this paper a hybrid scheme is proposed using wavelet and shearlet transforms with singular value decomposition. For better security, Arnold map is used for encryption. Examining the results and comparing with other methods show that this hybrid proposed scheme with simultaneous utili...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014