咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >Efficient Secure Data Provenan... 收藏

Efficient Secure Data Provenance Scheme in Multimedia Outsourcing and Sharing

作     者:Zhen Yang Yongfeng Huang Xing Li Wenyu Wang 

作者机构:Department of Electronic EngineeringTsinghua UniversityBeijing100084China Tsinghua National Laboratory for Information Science and TechnologyBeijing100084China Information Networking InstituteCarnegie Mellon UniversityPittsburghPA15213USA 

出 版 物:《Computers, Materials & Continua》 (计算机、材料和连续体(英文))

年 卷 期:2018年第56卷第7期

页      面:1-17页

核心收录:

学科分类:0831[工学-生物医学工程(可授工学、理学、医学学位)] 0808[工学-电气工程] 0809[工学-电子科学与技术(可授工学、理学学位)] 08[工学] 0805[工学-材料科学与工程(可授工学、理学学位)] 0701[理学-数学] 0801[工学-力学(可授工学、理学学位)] 0812[工学-计算机科学与技术(可授工学、理学学位)] 

基  金:The authors would like to thank the anonymous referees for their valuable comments and helpful suggestions.The work is supported by the National Key Research and Development Program of China(No.2016YFB0800402) the National Natural Science Foundation of China(No.U1405254,No.U1536207). 

主  题:Data provenance asymmetric fingerprint protocol digital watermarking multimedia outsourcing 

摘      要:To cope with privacy leakage caused by multimedia outsourcing and sharing,data provenance is used to analyze leaked multimedia and provide reactive accountability.Existing schemes of multimedia provenance are based on watermarking protocols.In an outsourcing scenario,existing schemes face two severe challenges:1)when data leakage occurs,there exists a probability that data provenance results can be repudiated,in which case data provenance tracking fails;and 2)when outsourced data are shared,data encryption transfer causes key management burden outside the schemes,and privacy leakage threatens users.In this paper,we propose a novel data provenance scheme with an improved LUT-based fingerprinting protocol,which integrates an asymmetric watermarking protocol,robust watermark algorithm and homomorphic encryption and digital signatures to achieve full non-repudiation provenance.We build an in-scheme stream cipher to protect outsourced multimedia data from privacy leakage and complicated key management.Our scheme is also lightweight and easy to deploy.Extensive security and performance analysis compares our scheme with the state of the art.The results show that our scheme has not only better provenance security and data confidentiality but also higher efficiency for multimedia outsourcing,sharing and provenance.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分