Abstract
Rapid development and application of big data technology is speeding up the dissemination and utilization of visible media big data. The intensive application of visual media brings about some security issues. The building of copyright protection mechanism of visual media big data under Internet environment can provide safety guarantee for content services of visual media in a digital library, and enhance integrated serviceability of digital resources in the digital library. Firstly, sparse features are extracted by exploiting the data sparsity and perception sparsity of visual media, and then a sparse perception computing model for visual media big data is built. Then the design idea of visual media copyright encryption, copyright authentication, copyright notice, and audit trail scheme are given from the point of view of sparse feature computation of visual media. Finally, a copyright protection application scheme of visual media big data under the network environment is developed. Its application in the digital library validates the effectiveness of this copyright protection mechanism of visual media. It can safeguard the confidentiality, integrity, availability, and auditing of visual media big data in the digital library, and enhance content serviceability of visual media in the digital library under big data environment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Singh, A., Mahapatra, S.: Network-based applications of multimedia big data computing in IoT environment. In: Tanwar, S., Tyagi, S., Kumar, N. (eds.) Multimedia Big Data Computing for IoT Applications: Concepts, Paradigms and Solutions, vol. 163, pp. 435–452. Springer Singapore, Singapore (2020). https://doi.org/10.1007/978-981-13-8759-3_17
Ruoyu, R., Shulin, Y., Qi, Z.: Research on copyright protection of digital publishing in the era of big data. In: Proceedings of the 2019 2nd International Conference on Information Hiding and Image Processing, pp. 39–43. Association for Computing Machinery, London (2019)
Kapil, G., Ishrat, Z., Kumar, R., Agrawal, A., Khan, R.A.: Managing multimedia big data: security and privacy perspective. In: Tuba, M., Akashe, S., Joshi, A. (eds.) ICT Systems and Sustainability, vol. 1077, pp. 1–12. Springer Nature, Singapore (2020). https://doi.org/10.1007/978-981-15-0936-0_1
Liu, Y., Peng, H., Wang, J.: Verifiable diversity ranking search over encrypted outsourced data. Comput. Mater. Continua 55, 037–057 (2018)
Wang, B., Kong, W., Li, W., Xiong, N.N.: A dual-chaining watermark scheme for data integrity protection in internet of things. Comput. Mater. Continua 58, 679–695 (2019)
Yang, H., Yin, J., Yang, Y.: Robust image hashing scheme based on low-rank decomposition and path integral LBP. IEEE Access 7, 51656–51664 (2019)
Xiang, L.Y., Yang, S.H., Liu, Y.H., Li, Q., Zhu, C.Z.: Novel linguistic steganography based on character-level text generation. Mathematics 8, 1558 (2020)
Yang, Z., Zhang, S., Hu, Y., Hu, Z., Huang, Y.: VAE-Stega: Linguistic steganography based on variational auto-encoder. IEEE Trans. Inf. Forensics 16, 880–895 (2021)
Ting, P., Huang, S., Wu, T., Lin, H.: A provable watermark-based copyright protection scheme. In: 2015 10th Asia Joint Conference on Information Security, pp. 124–129. IEEE, Kaohsiung (2015)
Kukreja, S., Kasana, G., Kasana, S.S.: Curvelet transform based robust copyright protection scheme for color images using extended visual cryptography. Multimed. Tools Appl. 79, 26155–26179 (2020). https://doi.org/10.1007/s11042-020-09130-y
Sinha Roy, S., Basu, A., Chattopadhyay, A.: On the implementation of a copyright protection scheme using digital image watermarking. Multimed. Tools Appl. 79, 13125–13138 (2020). https://doi.org/10.1007/s11042-020-08652-9
Rani, A., Raman, B.: An image copyright protection scheme by encrypting secret data with the host image. Multimed. Tools Appl. 75(2), 1027–1042 (2014). https://doi.org/10.1007/s11042-014-2344-0
El Hossaini, A.E.A., Aroussi, M., Jamali, K., Mbarki, S., Wahbi, M.: A new robust blind copyright protection scheme based on visual cryptography and steerable pyramid. Int. J. Netw. Secur. 18, 250–262 (2016)
Ahuja, R., Bedi, S.S.: Copyright protection using blind video watermarking algorithm based on MPEG-2 structure. In: International Conference on Computing, Communication & Automation, pp. 1048–1053. IEEE, Greater Noida (2015)
Kamnardsiri, T.: Digital art image copyright protection using combined DWT-DCT based watermarking technique. In: 1st International Conference on Digital Arts, Media and Technology (ICDAMT 2016), pp. 83–94. IEEE, Chiang Rai (2016)
Hashmi, M.F., Shukla, R.J., Keskar, A.G.: Real time copyright protection and implementation of image and video processing on android and embedded platforms. Proc. Comput. Sci. 46, 1626–1634 (2015)
Mairal, J., Elad, M., Sapiro, G.: Sparse representation for color image restoration. IEEE Trans. Image Process. 17, 53–69 (2007)
Chen, X., Wang, S., Dong, Y., Wang, X.: Big data storage architecture design in cloud computing. In: Chen, W., Yin, G., Zhao, G., Han, Q., Jing, W., Sun, G., Lu, Z. (eds.) BDTA 2015. CCIS, vol. 590, pp. 7–14. Springer, Singapore (2016). https://doi.org/10.1007/978-981-10-0457-5_2
Zhou, X., Yang, C., Zhao, H., Yu, W.: Low-rank modeling and its applications in image analysis. ACM Comput. Surv. 47, 1–33 (2014)
Acknowledgements
This work was supported in component by the National Natural Science Foundation of China under Grant No. 61872408, the Natural Science Foundation of Hunan Province (2020JJ4238), the Social Science Fund of Hunan Province under Grant No. 16YBA102, and the Research Fund of Hunan Provincial Key Laboratory of informationization technology for basic education under Grant No. 2015TP1017.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Wang, S., Qin, J., Jiang, M., Gao, Z. (2021). A Copyright Protection Scheme of Visual Media in Big Data Environment. In: Sun, X., Zhang, X., Xia, Z., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2021. Lecture Notes in Computer Science(), vol 12736. Springer, Cham. https://doi.org/10.1007/978-3-030-78609-0_53
Download citation
DOI: https://doi.org/10.1007/978-3-030-78609-0_53
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-78608-3
Online ISBN: 978-3-030-78609-0
eBook Packages: Computer ScienceComputer Science (R0)