Providing security and privacy to huge and vulnerable songs repository using visual cryptography

In the today’s scenario, the number of online song repositories such as iTunes, Hungama.com, etc. is increasing day-by-day. The reason for this can be attributed to the exponential growth in the Internet users in the past few years. These song repositories store huge number of songs (mostly in millions) and charge their users for listening and downloading them. With increased number of users requires more enhanced security measures to protect such vulnerable songs repository. Any breach in security of such song repositories would not only cause huge financial loss but also copyright infringement for the owners. Therefore, in this paper we have presented a novel and efficient approach for providing security and privacy to huge and vulnerable songs repository using visual cryptography. Presented approach not only provides confidentiality to the songs but also provides integrity verification with access control to the songs repository. We have also removed various basic security constraints of (2, 2) visual cryptography existed in most of the state of art approaches like meaningless pattern of the shares, explicit codebook requirement, contrast loss, lossy recovery etc which are eliminated in the proposed approach.

[1]  Alimohammad Latif,et al.  An adaptive secret image sharing with a new bitwise steganographic property , 2016, Inf. Sci..

[2]  Zhihua Xia,et al.  A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data , 2016, IEEE Transactions on Parallel and Distributed Systems.

[3]  Mahmoud Al-Ayyoub,et al.  Accelerating 3D medical volume segmentation using GPUs , 2016, Multimedia Tools and Applications.

[4]  Hongjun Liu,et al.  Audio encryption scheme by confusion and diffusion based on multi-scroll chaotic system and one-time keys , 2016 .

[5]  Abdellah Adib,et al.  Audio watermarking with high embedding capacity based on multiple access techniques , 2014, Digit. Signal Process..

[6]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[7]  Ling-Yuan Hsu,et al.  Perceptual-based DWPT-DCT framework for selective blind audio watermarking , 2014, Signal Process..

[8]  Kouichi Sakurai,et al.  An enhanced audio ownership protection scheme based on visual cryptography , 2014, EURASIP J. Inf. Secur..

[9]  Suneeta Agarwal,et al.  VPVC: verifiable progressive visual cryptography , 2016, Pattern Analysis and Applications.

[10]  Jianzhong Li,et al.  Color image watermarking scheme based on quaternion Hadamard transform and Schur decomposition , 2017, Multimedia Tools and Applications.

[11]  Yodai Watanabe,et al.  Security of audio secret sharing scheme encrypting audio secrets with bounded shares , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[12]  Wen-Hsiang Tsai,et al.  A covert communication method via spreadsheets by secret sharing with a self-authentication capability , 2013, J. Syst. Softw..

[13]  Moni Naor,et al.  Visual Authentication and Identification , 1997, CRYPTO.

[14]  Zhihua Xia,et al.  A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing , 2016, IEEE Transactions on Information Forensics and Security.

[15]  Tetsuya Shimamura,et al.  Blind SVD-based audio watermarking using entropy and log-polar transformation , 2015, J. Inf. Secur. Appl..

[16]  Jiwu Huang,et al.  Twenty years of digital audio watermarking - a comprehensive review , 2016, Signal Process..

[17]  S. Hemalatha,et al.  Wavelet Transform Based Steganography Technique to Hide Audio Signals in Image , 2015 .

[18]  Indranil Sengupta,et al.  An adaptive audio watermarking based on the singular value decomposition in the wavelet domain , 2010, Digit. Signal Process..

[19]  Ling-Yuan Hsu,et al.  Robust, transparent and high-capacity audio watermarking in DCT domain , 2015, Signal Process..

[20]  S. Hemalatha,et al.  Audio data hiding technique using integer wavelet transform , 2016, Int. J. Electron. Secur. Digit. Forensics.

[21]  Fathi E. Abd El-Samie,et al.  An SVD audio watermarking approach using chaotic encrypted images , 2011, Digit. Signal Process..

[22]  Zhi Zhou,et al.  Halftone visual cryptography , 2006, IEEE Transactions on Image Processing.

[23]  Suneeta Agarwal,et al.  Quantization-Based Fragile Watermarking using Block-Wise Authentication and Pixel-Wise Recovery Scheme for Tampered Image , 2013, Int. J. Image Graph..

[24]  Oscar C. Au,et al.  Joint visual cryptography and watermarking , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).