A Novel Image Digital Rights Management Scheme with High-Level Security, Usage Control and Traceability

被引:3
|
作者
Ma Zhaofeng [1 ]
Huang Jianqing [2 ]
Jiang Ming [3 ]
Niu Xinxin [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Informat Secur Ctr, Beijing 100876, Peoples R China
[2] Lib Beijing Univ Posts & Telecommun, Beijing 100876, Peoples R China
[3] China Elect Technol Grp Corp, Res Inst 3, Audio & Video Dept, Beijing 100015, Peoples R China
基金
中国国家自然科学基金;
关键词
Digital rights management; Confidential image data security; Encryption; Watermark; Usage control (UC); Traceability; ENCRYPTION; WATERMARKING; AUTHENTICATION; RESTORATION; SECRET;
D O I
10.1049/cje.2016.05.014
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Current methods of image protection based on chaos encryption can only provide security in Human visual system (HVS) level, however they can not provide usage control when the image is opened, printed or exported. To solve this problem, we proposed a novel image digital rights management scheme for Confidential image data security based on encryption and watermark (CID SEW) with high-level security, usage control and traceability, in which we employed full content image encryption for confidentiality of the image to be protected, and we firstly proposed strict and detailed Usage control (UC) scheme for Confidential image data (CIData) usage password-based authentication, opening times, printing and exporting control. And when the CIData need to delivery or export to other users or domain, we proposed the secure export and misused tracing and detect approach, in which before the ciphered CIData is exported, we decrypted the CI Data in a plain mode, and simultaneously we embedded user-identity-related and hardware-related information as robust watermark for traceability and responsibility confirmation. Finally, we evaluated the proposed CIDSEW by groups of variant size image data for security and efficiency, a large amount of groups of experiments manifest the proposed CIDSEW is secure, efficient, pervasive and robust for confident image data protection, usage control and misuse tracing.
引用
收藏
页码:481 / 494
页数:14
相关论文
共 50 条