Secure multicasting of images via joint privacy-preserving fingerprinting, decryption, and authentication

Chih Yang Lin, Kahlil Muchtar, Chia Hung Yeh*, Chun Shien Lu

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

6 Citations (Scopus)

Abstract

Joint fingerprinting and decryption (JFD) is useful in securing media transmission and distribution in a multicasting environment. Common drawbacks of the existing JFD methods are the transmitted data may leak the content of data, and a subscriber cannot determine if a received image is modified such that tampering attack can be mounted successfully. Here we focus on security and privacy of image multicasting and introduce a new framework called JFDA (joint privacy-preserving fingerprinting, decryption, and authentication). It has several main characteristics, JFDA: (1) accomplishes fingerprinting in the encryption domain to preserve privacy and prevent encrypted data from being tampered without additional hash code/digest, (2) prevents tampering attack on the decrypted data to ensure the fidelity of the fingerprinted data, (3) makes user subscribing to a visual media be an examiner to authenticate the same visual media over the Internet. The effectiveness of the proposed method is confirmed by experimental results.

Original languageEnglish
Pages (from-to)858-871
Number of pages14
JournalJournal of Visual Communication and Image Representation
Volume38
DOIs
Publication statusPublished - 2016 Jul 1
Externally publishedYes

Keywords

  • Authentication
  • Content integrity
  • Data encryption
  • Image authentication
  • Joint fingerprinting and decryption (JFD)
  • Multimedia distribution
  • Privacy-preserving fingerprinting
  • Secret sharing

ASJC Scopus subject areas

  • Signal Processing
  • Media Technology
  • Computer Vision and Pattern Recognition
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Secure multicasting of images via joint privacy-preserving fingerprinting, decryption, and authentication'. Together they form a unique fingerprint.

Cite this