Rough Set and Trust Assessment-based Potential Paths Analysis and Mining for Multimedia Social Networks

The emerging multimedia social network is a convenient platform on which multimedia content, such as e-books, digital images, audios and videos can be distributed and shared. In the open network scenario, users can randomly share or spread digital contents protected by copyright; thus, Digital Rights Management (DRM) has become a growing problem. This paper’s objective is an exploration of potential contents propagations path between users. A novel qualitative and quantitative approach to analysis and mining potential paths is proposed for multimedia social networks. The qualitative analysis and formal description were primarily based on the theory of rough set. And also, the quantitative computing of trust measurement was performed in order to determine a trusted potential path, which is within the range of user-defined trust threshold values. The proposed method would effectively and accurately find the potential paths of the digital contents distributing and sharing as to further resolve the burning DRM.

[1]  Xi Chen,et al.  Content distribution and copyright authentication based on combined indexing and watermarking , 2010, Multimedia Tools and Applications.

[2]  Kanliang Wang,et al.  A trust model for multimedia social networks , 2012, Social Network Analysis and Mining.

[3]  Zhiyong Zhang,et al.  Digital Rights Management Ecosystem and its Usage Controls: A Survey , 2011 .

[4]  MyoungBeom Chung,et al.  Intelligent copyright protection system using a matching video retrieval algorithm , 2011, Multimedia Tools and Applications.

[5]  Zhiyong Zhang Security, trust and risk in Digital Rights Management ecosystem , 2010, 2010 International Conference on High Performance Computing & Simulation.

[6]  Bhavani M. Thuraisingham,et al.  Semantic web-based social network access control , 2011, Comput. Secur..

[7]  Hua Wang,et al.  Trust-Involved Access Control in Collaborative Open Social Networks , 2010, 2010 Fourth International Conference on Network and System Security.

[8]  Lili Zhang,et al.  A Novel DRM Security Scheme and its Prototype System Implementation , 2011 .

[9]  M E J Newman,et al.  Community structure in social and biological networks , 2001, Proceedings of the National Academy of Sciences of the United States of America.

[10]  Mark S. Granovetter The Strength of Weak Ties , 1973, American Journal of Sociology.

[11]  Mohan S. Kankanhalli,et al.  An efficient access control method for multimedia social networks , 2010, WSM@MM.