Abstract
With the development of digital image processing and big data analysis, there exist massive digital images that can be obtained by ordinary online users. However, regarding to the volume of data and the lack of access control embedded within digital images, some images may impose risks of leakage and exposure. Especially, some images need to keep secret totally or at least only can be accessed partially. Those are not be classified and protected with a subtle manner or accessed by fine-grained privileges. In addition, recent most access control strategies separate control lists from accessed objects, so that the execution of access control relies on the networking links to remote servers. Sometimes remote servers may be available, thus the control will be hindered. Moreover, it is not easy to share and distribute a large volume of data together with their access control policies on different servers. In this paper, we propose a novel access control model based on invisible watermarks, where embed access control policies. This model realizes the marriage of accessing objects and access control strategies, and can be delivered together with big data objects such as digital images.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Wang, Y., Doherty, J.F., Dyck, R.E.V.: A wavelet-based watermarking algorithm for ownership verification of digital images. IEEE Trans. Image Process. 11(2), 77–88 (2002). https://doi.org/10.1109/83.982816
Wong, P.W.: A public key watermark for image verification and authentication. In: Proceedings 1998 International Conference on Image Processing, ICIP98 (Cat. No.98CB36269), vol. 1, pp. 455–459 (1998). https://doi.org/10.1109/ICIP.1998.723526
Wolfgang, R.B., Delp, E.J.: A watermark for digital images. In: Proceedings of 3rd IEEE International Conference on Image Processing, vol. 3, pp. 219–222 (1996). https://doi.org/10.1109/ICIP.1996.560423
Lin, E.I., Eskicioglu, A.M., Lagendijk, R.L., Delp, E.J.: Advances in digital video content protection. Proc. IEEE 93(1), 171–183 (2005)
Gholve, N., Sutar, S., Dhokey, S., Hande, S.: Cascaded algorithm: DWT-DCT-SVD in watermarking. Digit. Image Process. 3(13), 814–819 (2011)
Pickering, M., Coria, L.E., Nasiopoulos, P.: A novel blind video watermarking scheme for access control using complex wavelets. In: 2007 Digest of Technical Papers International Conference on Consumer Electronics, pp. 1–2 (2007). https://doi.org/10.1109/ICCE.2007.341545
Coria, L., Nasiopoulos, P., Ward, R., Pickering, M.: An access control video watermarking method that is robust to geometric distortions. In: 2007 2nd International Conference on Digital Information Management, vol. 1, pp. 460–465 (2007). https://doi.org/10.1109/ICDIM.2007.4444266
Liao, K.C., Lee, W.H., Sung, M.H., Lin, T.C.: A one-time password scheme with QR-code based on mobile phone. In: 2009 Fifth International Joint Conference on INC, IMS and IDC, pp. 2069–2071 (2009). https://doi.org/10.1109/NCM.2009.324
Kao, Y.W., Luo, G.H., Lin, H.T., Huang, Y.K., Yuan, S.M.: Physical access control based on QR code. In: 2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, pp. 285–288 (2011). https://doi.org/10.1109/CyberC.2011.55
Liu, Y., Liu, M.: Automatic recognition algorithm of quick response code based on embedded system. In:: Sixth International Conference on Intelligent Systems Design and Applications, vol. 2, pp. 783–788 (2006). https://doi.org/10.1109/ISDA.2006.253712
Melgar, M.E.V., Zaghetto, A., Macchiavello, B., Nascimento, A.C.A.: CQR codes: colored quick-response codes. In: 2012 IEEE Second International Conference on Consumer Electronics - Berlin (ICCE-Berlin), pp. 321–325 (2012). https://doi.org/10.1109/ICCE-Berlin.2012.6336526
Acknowledgement
This work was supported by the science and technology project of Guangdong Power Grid Co., Ltd, (036000KK52170002).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Chen, Y., Jiang, W., Kang, Z. (2018). A Novel Watermark-Based Access Control Model for Digital Imagines. In: Sun, X., Pan, Z., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science(), vol 11068. Springer, Cham. https://doi.org/10.1007/978-3-030-00021-9_25
Download citation
DOI: https://doi.org/10.1007/978-3-030-00021-9_25
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-00020-2
Online ISBN: 978-3-030-00021-9
eBook Packages: Computer ScienceComputer Science (R0)