Tree-Structured Haar Transforms
Journal of Mathematical Imaging and Vision
A chaos-based joint image compression and encryption scheme using DCT and SHA-1
Applied Soft Computing
MM '11 Proceedings of the 19th ACM international conference on Multimedia
Partial encryption of compressed images and videos
IEEE Transactions on Signal Processing
A buyer-seller watermarking protocol
IEEE Transactions on Image Processing
Collusion-Traceable Secure Multimedia Distribution Based on Controllable Modulation
IEEE Transactions on Circuits and Systems for Video Technology
Hi-index | 0.00 |
In this paper, a JFE (joint fingerprinting and encryption) scheme based on the Tree-Structured Harr (TSH) transform is proposed with the purpose of protecting media distribution in social network environment. The motivation is to map hierarchical community structure of social network into tree structure of TSH transform for fingerprinting and encryption. Firstly, the fingerprint code is produced using social network analysis. Secondly, the content is decomposed by the TSH transform. Thirdly, the content is fingerprinted and encrypted in the TSH transform domain. At last, the encrypted contents are delivered to users via hybrid multicast-unicast. The proposed method, to the best of our knowledge, is the first JFE method in the TSH transform domain using social network analysis. The use of fingerprinting along with encryption can provide a double-layer of protection to media sharing in social network environment. Theory analysis and experimental results show the effectiveness of the proposed JFE scheme.