Hybridized Hierarchical Watermarking and Selective Encryption for Social Image Security

被引:0
|
作者
Ye, Conghuan [1 ,2 ]
Tan, Shenglong [1 ,2 ]
Wang, Zheng [1 ,2 ]
Shi, Binghua [1 ,2 ]
Shi, Li [1 ,2 ]
机构
[1] Hubei Univ Econ, Sch Informat Engn, Wuhan 430205, Peoples R China
[2] Hubei Univ Econ, Hubei Internet Finance Informat Engn Technol Res C, Wuhan 430205, Peoples R China
关键词
social network analysis; social image sharing; image encryption; joint watermarking and encryption; jiugongge game; RELIABILITY; SYSTEM;
D O I
10.3390/e25071031
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
With the advent of cloud computing and social multimedia communication, more and more social images are being collected on social media platforms, such as Facebook, TikTok, Flirk, and YouTube. The amount of social images produced and disseminated is rapidly increasing. Meanwhile, cloud computing-assisted social media platforms have made social image dissemination more and more efficient. There exists an unstoppable trend of fake/unauthorized social image dissemination. The growth of social image sharing underscores potential security risks for illegal use, such as image forgery, malicious copying, piracy exposure, plagiarism, and misappropriation. Therefore, secure social image dissemination has become urgent and critical on social media platforms. The authors propose a secure scheme for social image dissemination on social media platforms. The main objective is to make a map between the tree structure Haar (TSH) transform and the hierarchical community structure of a social network. First, perform the TSH transform on a social image using social network analysis (SNA). Second, all users in a social media platform are coded using SNA. Third, watermarking and encryption are performed in a compressed domain for protecting social image dissemination. Finally, the encrypted and watermarked contents are delivered to users via a hybrid multicast-unicast scheme. The use of encryption along with watermarking can provide double protection for social image dissemination. The theory analysis and experimental results demonstrate the effectiveness of the proposed scheme.
引用
收藏
页数:20
相关论文
共 50 条
  • [1] A SECURITY TECHNIQUE BASED ON WATERMARKING AND ENCRYPTION FOR MEDICAL IMAGE
    Sarani, N.
    Amudha, K.
    [J]. 2015 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION, EMBEDDED AND COMMUNICATION SYSTEMS (ICIIECS), 2015,
  • [2] Digital Image Security Improvement By Integrating Watermarking And Encryption Technique
    Metkar, Shilpa P.
    Lichade, Milind, V
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMPUTING AND CONTROL (ISPCC), 2013,
  • [3] Cryptanalysis and security improvement for selective image encryption
    T.M. Hoang
    D. Tran
    [J]. The European Physical Journal Special Topics, 2014, 223 : 1635 - 1646
  • [4] Cryptanalysis and security improvement for selective image encryption
    Hoang, T. M.
    Tran, D.
    [J]. EUROPEAN PHYSICAL JOURNAL-SPECIAL TOPICS, 2014, 223 (08): : 1635 - 1646
  • [5] Selective Robust Image Encryption for Social Networks
    Dirik, Ahmet Emir
    Memon, Nasir
    [J]. MULTIMEDIA COMMUNICATIONS, SERVICES AND SECURITY, MCSS 2013, 2013, 368 : 71 - 81
  • [6] Improved Image Security Scheme Using Combination of age Encryption and Reversible Watermarking
    Pushpad, Akshay
    Potnis, Anjali Ashish
    [J]. 2017 4TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND INTEGRATED NETWORKS (SPIN), 2017, : 293 - 297
  • [7] A NEW COMPREHENSIVE SECURITY PROTECTION FOR REMOTE SENSING IMAGE BASED ON THE INTEGRATION OF ENCRYPTION AND WATERMARKING
    Jiang, Li
    Xu, Zhengquan
    Xu, Yanyan
    [J]. 2013 IEEE INTERNATIONAL GEOSCIENCE AND REMOTE SENSING SYMPOSIUM (IGARSS), 2013, : 2577 - 2580
  • [8] Combination of Encryption and Digital Watermarking Techniques used for Security and Copyright Protection of Still Image
    Gange, Sudhanshu Suhas
    Ghatol, Ashok A.
    [J]. 2014 RECENT ADVANCES AND INNOVATIONS IN ENGINEERING (ICRAIE), 2014,
  • [9] Selective encryption for hierarchical MPEG
    Hofbauer, Heinz
    Stuetz, Thomas
    Uhl, Andreas
    [J]. COMMUNICATIONS AND MULTIMEDIA SECURITY, PROCEEDINGS, 2006, 4237 : 151 - 160
  • [10] Image Security Through Watermarking
    Umaamaheshvari, A.
    Thanushkodi, K.
    [J]. JOURNAL OF MEDICAL IMAGING AND HEALTH INFORMATICS, 2014, 4 (02) : 277 - 284