A Secure Fingerprinted Multimedia Distribution Using Social Network Analysis

نویسندگان

  • Cong-huan Ye
  • Zeng-gang Xiong
  • Yao-ming Ding
  • Xueming Zhang
  • Guangwei Wang
  • Fang Xu
چکیده

Collusion attack is a very effective attack for digital fingerprinting system. In order to remove or attenuate the fingerprint information hidden in fingerprinted content, a number of users produce a new colluded copy through their own fingerprinted copies. In this paper, we address a novel collusion-resisting desynchronization fingerprinting approach using social network analysis. The novelty of this paper is that collusion attack occurred in a multimedia social network community with high probability. Different from all existing works, with desynchronization model constructed upon social network, the original image is desynchronized to get many similar copies which are different from each other, and then they are assigned and distributed to subscribers according to social network analysis. Theory analysis shows that the presented desynchronization distribution method has significantly better performance than those existing distribution schemes. The experimental results also show that the average colluded images even with only two desynchronized copies have poor visual quality. And the visual quality of colluded images does not improve apparently with the increase of the number of copies.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Recent Advances in Multimedia Information System Security

A multimedia communication system enables multimedia data's generation, storage, management, distribution, receiving, consuming, editing, sharing, and so on. In such systems, there are various security issues, which must be considered such as eavesdropping, intrusion, forgery, piracy and privacy, etc. Until now, various security solutions for multimedia communication systems have been reported,...

متن کامل

ملزومات امنیتی پیاده‌سازی IMS SIP سرور امن

IMS (IP Multimedia Subsystem) network is considered as an NGN (Next Generation Network) core networks by ETSI. Decomposition of IMS core network has resulted in a rapid increase of control and signaling message that makes security a required capability for IMS commercialization. The control messages are transmitted using SIP (Session Initiation Protocol) which is an application layer protocol. ...

متن کامل

Joint Fingerprinting and Encryption for JPEG Images Sharing in Mobile Social Network

The advent of mobile social network and smartphone has made social multimedia sharing in social network easier and more efficient. However, it can also cause serious security and privacy problems, secure social multimedia sharing and traitor tracing issues have become critical and urgent. In this paper, we propose a joint fingerprinting and encryption (JFE) scheme based on Game of Life (GL) and...

متن کامل

Optimal Number Of Shares For Digital Water- marking Scheme Using Visual Cryptography

Distribution channels such as digital music downloads, video-on-demand, and multimedia social networks pose new challenges to the design of content protection measures aimed at preventing copyright violations. Digital watermarking has been proposed as a possible brick of such protection systems. However, application of watermarking for multimedia content protection in realistic scenarios poses ...

متن کامل

Recent Fingerprinting Techniques with Cryptographic Protocol

According to the development of the Internet, multi-media contents such as music, picture, movie, etc. are treated by digital format on the network. It enables us to purchase digital contents via a net easily. However, it causes several problems such as violation of ownership and illegal distribution of the copy. Digital fingerprinting is used to trace back the illegal users, where unique ID kn...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016