Secure content sharing for social network using fingerprinting and encryption in the TSH transform domain

In this paper, a JFE (joint fingerprinting and encryption) scheme based on the Tree-Structured Harr (TSH) transform is proposed with the purpose of protecting media distribution in social network environment. The motivation is to map hierarchical community structure of social network into tree structure of TSH transform for fingerprinting and encryption. Firstly, the fingerprint code is produced using social network analysis. Secondly, the content is decomposed by the TSH transform. Thirdly, the content is fingerprinted and encrypted in the TSH transform domain. At last, the encrypted contents are delivered to users via hybrid multicast-unicast. The proposed method, to the best of our knowledge, is the first JFE method in the TSH transform domain using social network analysis. The use of fingerprinting along with encryption can provide a double-layer of protection to media sharing in social network environment. Theory analysis and experimental results show the effectiveness of the proposed JFE scheme.

[1]  Deepa Kundur,et al.  Video fingerprinting and encryption principles for digital rights management , 2004, Proceedings of the IEEE.

[2]  Alessandro Neri,et al.  A commutative digital image watermarking and encryption method in the tree structured Haar transform domain , 2011, Signal Process. Image Commun..

[3]  Nasir D. Memon,et al.  A buyer-seller watermarking protocol , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).

[4]  Jaakko Astola,et al.  Tree-Structured Haar Transforms , 2004, Journal of Mathematical Imaging and Vision.

[5]  Xiaobo Li,et al.  Partial encryption of compressed images and videos , 2000, IEEE Trans. Signal Process..

[6]  Kwok-Wo Wong,et al.  A chaos-based joint image compression and encryption scheme using DCT and SHA-1 , 2011, Appl. Soft Comput..

[7]  Shiguo Lian,et al.  Collusion-Traceable Secure Multimedia Distribution Based on Controllable Modulation , 2008, IEEE Transactions on Circuits and Systems for Video Technology.

[8]  Peijia Zheng,et al.  Implementation of the discrete wavelet transform and multiresolution analysis in the encrypted domain , 2011, ACM Multimedia.