Joint Fingerprinting and Encryption for JPEG Images Sharing in Mobile Social Network

The advent of mobile social network and smartphone has made social multimedia sharing in social network easier and more efficient. However, it can also cause serious security and privacy problems, secure social multimedia sharing and traitor tracing issues have become critical and urgent. In this paper, we propose a joint fingerprinting and encryption (JFE) scheme based on Game of Life (GL) and singular value decomposition (SVD) with the purpose of protecting JPEG images sharing in mobile social networks. Firstly, the fingerprint code is produced using social network analysis. After that, a fast inter- transformation from block DCTs to DWT is employed. Then, fingerprints are embedded into the LL, HL and LH subbands. At last, GL and SVD are used to for confusion and diffusion respectively. The proposed method, to the best of our knowledge, is the first JFE method using GL and SVD in the JPEG compressed domain for security and privacy in JPEG images sharing. The use of fingerprinting along with encryption can provide a double-layer of protection to JPEG images sharing in social network. Theory analysis and experimental results show the effectiveness of the proposed JFE scheme. Most importantly, the performance of inter-transformation between block DCT and one-level DWT has a profound effect on lowering computational cost in our proposed JFE scheme. In the end, our JFE method can secure JPEG images sharing in social networks and meet the real-time requirement.

[1]  Gouenou Coatrieux,et al.  A joint encryption/watermarking algorithm for verifying the reliability of medical images: Application to echographic images , 2012, Comput. Methods Programs Biomed..

[2]  Zenggang Xiong,et al.  Joint fingerprinting and encryption in hybrid domains for multimedia sharing in social networks , 2014, J. Vis. Lang. Comput..

[3]  Deepa Kundur,et al.  Video fingerprinting and encryption principles for digital rights management , 2004, Proceedings of the IEEE.

[4]  Sabu Emmanuel,et al.  Robust Watermarking of Compressed JPEG Images in Encrypted Domain , 2011, Trans. Data Hiding Multim. Secur..

[5]  Bartosz Czaplewski,et al.  Matrix-based robust joint fingerprinting and decryption method for multicast distribution of multimedia , 2015, Signal Process..

[6]  C. Chui,et al.  A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .

[7]  Andrew Adamatzky,et al.  Game of Life Cellular Automata , 2010 .

[8]  Sarika Jain,et al.  A review on watermarking techniques for compressed encrypted images , 2014, 2014 International Conference on Medical Imaging, m-Health and Emerging Communication Systems (MedCom).

[9]  Helena Rifà-Pous,et al.  Framework for preserving security and privacy in peer-to-peer content distribution systems , 2015, Expert Syst. Appl..

[10]  Hefei Ling,et al.  A new fingerprinting scheme using social network analysis for majority attack , 2013, Telecommunication Systems.

[11]  Chih-Yang Lin,et al.  Joint fingerprinting and decryption with noise-resistant for vector quantization images , 2012, Signal Process..

[12]  Roshan K. Thomas,et al.  Visual Authorization Modeling in E-commerce Applications , 2003, IEEE Multim..

[13]  Hong Liu,et al.  Attack and improvement of the joint fingerprinting and decryption method for vector quantization images , 2014, Signal Process..

[14]  Gonzalo Álvarez,et al.  Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.

[15]  Mao-Bin Hu,et al.  Detect overlapping and hierarchical community structure in networks , 2008, ArXiv.

[16]  Hefei Ling,et al.  Secure content sharing for social network using fingerprinting and encryption in the TSH transform domain , 2012, ACM Multimedia.

[17]  Hefei Ling,et al.  Real-Time Compressed- Domain Video Watermarking Resistance to Geometric Distortions , 2012, IEEE MultiMedia.

[18]  S. Lian,et al.  Efficient image or video encryption based on spatiotemporal chaos system , 2009 .

[19]  Xi Chen,et al.  Traceable content protection based on chaos and neural networks , 2011, Appl. Soft Comput..

[20]  Mohan S. Kankanhalli,et al.  Robust Watermarking of Compressed and Encrypted JPEG2000 Images , 2012, IEEE Transactions on Multimedia.

[21]  Jianting Guo,et al.  Secure watermarking scheme against watermark attacks in the encrypted domain , 2015, J. Vis. Commun. Image Represent..

[22]  Hongjun Liu,et al.  Color image encryption based on one-time keys and robust chaotic maps , 2010, Comput. Math. Appl..

[23]  Alessandro Piva,et al.  Secure Watermarking for Multimedia Content Protection: A Review of its Benefits and Open Issues , 2013, IEEE Signal Processing Magazine.

[24]  C.-C. Jay Kuo,et al.  Design of integrated multimedia compression and encryption systems , 2005, IEEE Transactions on Multimedia.

[25]  Jiwu Huang,et al.  JPEG Error Analysis and Its Applications to Digital Image Forensics , 2010, IEEE Transactions on Information Forensics and Security.

[26]  Stephen Wolfram,et al.  Theory and Applications of Cellular Automata , 1986 .

[27]  Dan Boneh,et al.  Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.

[28]  Petros Belimpasakis,et al.  Sharing with people: a system for user-centric content sharing , 2010, Multimedia Systems.

[29]  Stephen Wolfram,et al.  A New Kind of Science , 2003, Artificial Life.

[30]  Kwok-Wo Wong,et al.  A chaos-based joint image compression and encryption scheme using DCT and SHA-1 , 2011, Appl. Soft Comput..

[31]  Tao Xiang,et al.  Secure MQ coder: An efficient way to protect JPEG 2000 images in wireless multimedia sensor networks , 2014, Signal Process. Image Commun..

[32]  Weigang Wang,et al.  Team-and-role-based organizational context and access control for cooperative hypermedia environments , 1999, Hypertext.

[33]  Stéphane Mallat,et al.  A Theory for Multiresolution Signal Decomposition: The Wavelet Representation , 1989, IEEE Trans. Pattern Anal. Mach. Intell..

[34]  Klara Nahrstedt,et al.  Using Cryptographic and Watermarking Algorithms , 2001, IEEE Multim..

[35]  Muhammad Khurram Khan,et al.  Challenge-response-based biometric image scrambling for secure personal identification , 2011, Future Gener. Comput. Syst..

[36]  Massimiliano Giordano,et al.  Visual Computer-Managed Security: A Framework for Developing Access Control in Enterprise Applications , 2013, IEEE Software.

[37]  S. Hamid Nawab,et al.  The relationship of transform coefficients for differing transforms and/or differing subblock sizes , 2004, IEEE Transactions on Signal Processing.

[38]  A. Akhavan,et al.  A novel algorithm for image encryption based on mixture of chaotic maps , 2008 .