Secure Social Multimedia Big Data Sharing Using Scalable JFE in the TSHWT Domain

With the advent of social networks and cloud computing, the amount of multimedia data produced and communicated within social networks is rapidly increasing. In the meantime, social networking platforms based on cloud computing have made multimedia big data sharing in social networks easier and more efficient. The growth of social multimedia, as demonstrated by social networking sites such as Facebook and YouTube, combined with advances in multimedia content analysis, underscores potential risks for malicious use, such as illegal copying, piracy, plagiarism, and misappropriation. Therefore, secure multimedia sharing and traitor tracing issues have become critical and urgent in social networks. In this article, a joint fingerprinting and encryption (JFE) scheme based on tree-structured Haar wavelet transform (TSHWT) is proposed with the purpose of protecting media distribution in social network environments. The motivation is to map hierarchical community structure of social networks into a tree structure of Haar wavelet transform for fingerprinting and encryption. First, fingerprint code is produced using social network analysis (SNA). Second, the content is decomposed based on the structure of fingerprint code by the TSHWT. Then, the content is fingerprinted and encrypted in the TSHWT domain. Finally, the encrypted contents are delivered to users via hybrid multicast-unicast. The proposed method, to the best of our knowledge, is the first scalable JFE method for fingerprinting and encryption in the TSHWT domain using SNA. The use of fingerprinting along with encryption using SNA not only provides a double layer of protection for social multimedia sharing in social network environment but also avoids big data superposition effect. Theory analysis and experimental results show the effectiveness of the proposed JFE scheme.

[1]  Md Anwar Hussain,et al.  Coded Fingerprinting Based Watermarking to Resist Collusion Attacks and Trace Colluders , 2010, 2010 International Conference on Advances in Computer Engineering.

[2]  Peijia Zheng,et al.  Implementation of the discrete wavelet transform and multiresolution analysis in the encrypted domain , 2011, ACM Multimedia.

[3]  Zenggang Xiong,et al.  A Novel JFE Scheme for Social Multimedia Distribution in Compressed Domain Using SVD and CA , 2012, IWDW.

[4]  K. J. Ray Liu,et al.  Bandwidth efficient fingerprint multicast for video streaming , 2004, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[5]  Stefan Katzenbeisser,et al.  Tardos fingerprinting codes in the combined digit model , 2009, 2009 First IEEE International Workshop on Information Forensics and Security (WIFS).

[6]  Nasir D. Memon,et al.  A buyer-seller watermarking protocol , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).

[7]  Hefei Ling,et al.  A collusion attack optimization framework toward spread-spectrum fingerprinting , 2013, Appl. Soft Comput..

[8]  Hsiang-Cheh Huang,et al.  Genetic fingerprinting for copyright protection of multicast media , 2009, Soft Comput..

[9]  Jaakko Astola,et al.  Tree-Structured Haar Transforms , 2004, Journal of Mathematical Imaging and Vision.

[10]  Peijia Zheng,et al.  An efficient image homomorphic encryption scheme with small ciphertext expansion , 2013, ACM Multimedia.

[11]  Xiaohui Liang,et al.  Exploiting multimedia services in mobile social networks from security and privacy perspectives , 2014, IEEE Communications Magazine.

[12]  Zenggang Xiong,et al.  Secure Multimedia Big Data Sharing in Social Networks Using Fingerprinting and Encryption in the JPEG2000 Compressed Domain , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.

[13]  Alessandro Neri,et al.  A commutative digital image watermarking and encryption method in the tree structured Haar transform domain , 2011, Signal Process. Image Commun..

[14]  Zenggang Xiong,et al.  Joint fingerprinting and encryption in hybrid domains for multimedia sharing in social networks , 2014, J. Vis. Lang. Comput..

[15]  Mauro Barni,et al.  On the Implementation of the Discrete Fourier Transform in the Encrypted Domain , 2009, IEEE Transactions on Information Forensics and Security.

[16]  Hefei Ling,et al.  Secure content sharing for social network using fingerprinting and encryption in the TSH transform domain , 2012, ACM Multimedia.

[17]  Hefei Ling,et al.  A new fingerprinting scheme using social network analysis for majority attack , 2013, Telecommunication Systems.

[18]  Zenggang Xiong,et al.  Joint Fingerprinting and Encryption for JPEG Images Sharing in Mobile Social Network , 2015, DMS.

[19]  Hefei Ling,et al.  A collusion attack optimization strategy for digital fingerprinting , 2012, TOMCCAP.

[20]  Tarek Elgamal,et al.  Cloud-Based Multimedia Content Protection System , 2015, IEEE Transactions on Multimedia.

[21]  Gouenou Coatrieux,et al.  A joint encryption/watermarking algorithm for verifying the reliability of medical images: Application to echographic images , 2012, Comput. Methods Programs Biomed..

[22]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[23]  Shiguo Lian,et al.  Collusion-Traceable Secure Multimedia Distribution Based on Controllable Modulation , 2008, IEEE Transactions on Circuits and Systems for Video Technology.

[24]  Dasara Shullani,et al.  Anticollusion solutions for asymmetric fingerprinting protocols based on client side embedding , 2015, EURASIP J. Inf. Secur..

[25]  Zenggang Xiong,et al.  Traceable Content Distribution Using Wavelet Decomposition and Social Network Analysis , 2012, 2012 International Symposium on Computer, Consumer and Control.

[26]  Samrat L. Sabat,et al.  A fast chaotic block cipher for image encryption , 2014, Commun. Nonlinear Sci. Numer. Simul..

[27]  Kwok-Wo Wong,et al.  A chaos-based joint image compression and encryption scheme using DCT and SHA-1 , 2011, Appl. Soft Comput..

[28]  Gennian Ge,et al.  New Bounds on Separable Codes for Multimedia Fingerprinting , 2014, IEEE Transactions on Information Theory.

[29]  Xiaobo Li,et al.  Partial encryption of compressed images and videos , 2000, IEEE Trans. Signal Process..

[30]  H. Mori,et al.  Analytic study of chaos of the tent map: Band structures, power spectra, and critical behaviors , 1983 .

[31]  Hongjun Liu,et al.  Color image encryption based on one-time keys and robust chaotic maps , 2010, Comput. Math. Appl..

[32]  Z. Guan,et al.  Chaos-based image encryption algorithm ✩ , 2005 .

[33]  Dan Boneh,et al.  Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.

[34]  Xiangjun Wu,et al.  A new color image encryption scheme based on DNA sequences and multiple improved 1D chaotic maps , 2015, Appl. Soft Comput..

[35]  Hefei Ling,et al.  Kernelized Neighborhood Preserving Hashing for Social-Network-Oriented Digital Fingerprints , 2014, IEEE Transactions on Information Forensics and Security.

[36]  Deepa Kundur,et al.  Video fingerprinting and encryption principles for digital rights management , 2004, Proceedings of the IEEE.