MA Zhaofeng, HUANG Jianqing, JIANG Ming, et al., “A Novel Image Digital Rights Management Scheme with High-Level Security, Usage Control and Traceability,” Chinese Journal of Electronics, vol. 25, no. 3, pp. 481-494, 2016, doi: 10.1049/cje.2016.05.014
Citation: MA Zhaofeng, HUANG Jianqing, JIANG Ming, et al., “A Novel Image Digital Rights Management Scheme with High-Level Security, Usage Control and Traceability,” Chinese Journal of Electronics, vol. 25, no. 3, pp. 481-494, 2016, doi: 10.1049/cje.2016.05.014

A Novel Image Digital Rights Management Scheme with High-Level Security, Usage Control and Traceability

doi: 10.1049/cje.2016.05.014
Funds:  This work is supported by the National Natural Science Foundation of China (No.61272519, No.61170297, No.61572080, No.61472258).
  • Received Date: 2015-10-10
  • Rev Recd Date: 2015-12-06
  • Publish Date: 2016-05-10
  • Current methods of image protection based on chaos encryption can only provide security in Human visual system (HVS) level, however they can not provide usage control when the image is opened, printed or exported. To solve this problem, we proposed a novel image digital rights management scheme for Confidential image data security based on encryption and watermark (CIDSEW) with high-level security, usage control and traceability, in which we employed full content image encryption for confidentiality of the image to be protected, and we firstly proposed strict and detailed Usage control (UC) scheme for Confidential image data (CIData) usage password-based authentication, opening times, printing and exporting control. And when the CIData need to delivery or export to other users or domain, we proposed the secure export and misused tracing and detect approach, in which before the ciphered CIData is exported, we decrypted the CIData in a plain mode, and simultaneously we embedded user-identity-related and hardware-related information as robust watermark for traceability and responsibility confirmation. Finally, we evaluated the proposed CIDSEW by groups of variant size image data for security and efficiency, a large amount of groups of experiments manifest the proposed CIDSEW is secure, efficient, pervasive and robust for confident image data protection, usage control and misuse tracing.
  • loading
  • A. Uhl and A. Pommer, Image and Video Encryption, Springer Press, pp.45-134, 2005.
    Lini Abraham and Neenu Daniel, "Secure image encryption algorithms: A review", International Journal of Science & technology, Vol.2, No.4, pp.186-189, 2013.
    N.K. Pareek, V. Patidar and K.K. Sud, "Image encryption using chaotic logistic map", Image and Vision Computing, Vol.24, No.9, pp.926-934, 2006.
    S.J. Shyu, "Image encryption by random grids", Pattern Recognition, Vol.40, No.3, pp.1014-1031, 2007.
    S. Lian, J. Sun and Z.Wang, "A block cipher based on a suitable use of the chaotic standard map", Chaos, Solitons and Fractals, Vol.26, No.1, pp.117-129, 2005.
    R. Luka and K.N. Plataniotis, "Bit-level based secret sharing for image encryption", Pattern Recognition, Vol.38, No.5, pp.767- 772, 2005.
    Y. Xu, H. Wang, Y.G. Li, et al., "Image encryption based on synchronization of fractional chaotic systems", Commun Nonlinear Science Numeric Simulation, Vol.19, No.10, pp.3735- 3744, 2014.
    C.E. Dong, "Color image encryption using one-time keys and coupled chaotic systems", Signal Processing: Image Communication, Vol.29, No.5, pp.628-640, 2014.
    A.K. Osama and A.M. Zin, "An efficient adaptive of transparent spatial digital image encryption", Procedia Technology, Vol.11, No.1, pp.288-297, 2013.
    K. Ramani, E.V. Prasad, S. Varadarajan, et al., "A robust watermarking scheme for information hiding", International Conference on Advanced Computing and Communications, pp.58- 64, 2008.
    D.M. Ferdinando and S. Salvatore, "Fragile watermarking tamper detection with images compressed by fuzzy transform", Information Sciences, Vol.195, No.13, pp.62-90, 2012.
    S. Rawat and B. Raman, "A chaotic system based fragile watermarking scheme for image tamper detection", AEUInternational Journal of Electronics and Communications, Vol.62, No.10, pp.840-847, 2011.
    X.P. Zhang, S.Z. Wang, Z.X. Qian, et al., "Reversible fragile watermarking for locating tampered blocks in JPEG images", Signal Processing, Vol.90, No.12, pp.3026-3036, 2010.
    M. Moniruzzaman, M.A. Hawlader and M.F. Hossain, "An image fragile watermarking scheme based on chaotic system for image tamper detection", International Conference on Informatics, Electronics & Vision, pp.1-6, 2014.
    P. Patil and S. Sonavane, "Fragile watermarking scheme for image tamper detection", International Conference on Communication Systems and Network Technologies, pp.531-535, 2011.
    R.O. Preda, "Semi-fragile watermarking for image authentication with sensitive tamper localization in the wavelet domain", Measurement, Vol.46, No.1, pp.367-373, 2013.
    X.Z. Zhu and T.S. Anthony, "A new semi-fragile image watermarking with robust tampering restoration using irregular sampling", Signal Processing: Image Communication, Vol.22, No.5, pp.515-528, 2007.
    I.J. Cox, M.L. Miller and J.A. Bloom, Digital Watermarking, Morgan Kauffman Publishers, San Francisco, CA, USA, 2001.
    M. Naor and A. Shamir, "Visual cryptography, Advances in cryptology", Eurocrypt '94 Proceeding LNCS, Vol.950, pp.1-12, 1995.
    G. Ateniese, C. Blundo, A. De Santis, et al., "Extended capabilities for visual cryptography", Theoretical Computer Science, Vol.250, No.1-2, pp.143-161, 2001.
    N. Askari and C. Moloney, "Application of visual cryptography to biometric authentication", NECEC, 2011.
    Microsoft, "Windows Media DRM",, 2009-11-09.
    Microsoft, "Playready",, 2014-08-17.
    Adobe, "Adobe Access ",, 2014-03-12.
    Armjisoft, "Adobe Flash (SWF, FLV) Protection, DRM, Security and Distribution Management Solution", http://www. armjisoft. com. 2015-11-11.
    Apple, "HTTP Live Streaming", streaming. 2012-09-21.
    Overdigital, "The difference between encrypted HLS, PHLS and HLS with DRM", available at http://www.overdigital. com/online-video/content-protection. 2015-06-18.
    Q. LiuR. Safavi-Nain and N.P. Sheppard, "Digital rights management for content distribution", Proceedings of the Australasian Information Security Workshop Conference on Acsw Frontiers, Vol.21, pp.49-58, 2003.
    J. Park and R. Sandhu, "The UCON ABC usage control model", ACM Transactions on Information & System Security, Vol.7, pp.128-174, 2002.
    P.W. Wong and N. Memon, "Secret and public key image watermarking schemes for image authentication and ownership verification", IEEE Transactions on Image Processing, Vol.10, No.10, pp.1593-601, 2001.
    S. Walton, "Image authentication for a slippery new age", Dr. Dobbe's Journal, Vol.20, No.9, pp.35-42, 1995.
    Y.Q. Zhao, M. Liao, et al., "Tampered region detection of inpainting JPEG images. Optik", International Journal for Light and Electron Optics, Vol.124, No.16, pp.2487-2492, 2013.
    Z.C. Lin, J.F. He, et al., "Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis", Pattern Recognition, Vol.42, No.11, pp.2492-2501, 2009.
    H.C. Wu and C.C. Chang, "Detection and restoration of tampered JPEG compressed images", Journal of Systems and Software, Vol.64, No.2, pp.151-161, 2002.
    P.W. Wong, "A public key watermark for image verification and authentication", Proceedings of IEEE international conference on image processing, pp.455-463, 1998.
    M.Y. Syue and L.J. Wang, "A Wavelet-based multipurpose watermarking for image authentication and recovery", International Journal of Communications, Vol.2, No.4, pp.35-39, 2013.
    B.Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, John Wiley & Sons, Inc., 1996.
    A.J. Menezes, S.A. Vanstone and P.C.V. Oorschot, Handbook of Applied Cryptography, CRC Press, 1996.
    FIPS 197-2001, Advanced Encryption Standard (AES), http://, 2001-03-08.
    FIPS 186-3-2009, Digital Signature Standard (DSS), http://, 2009-10-04.
  • 加载中


    通讯作者: 陈斌,
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (410) PDF downloads(2516) Cited by()
    Proportional views


    DownLoad:  Full-Size Img  PowerPoint