Skip to main content

A Copyright Protection Scheme of Visual Media in Big Data Environment

  • Conference paper
  • First Online:
Artificial Intelligence and Security (ICAIS 2021)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 12736))

Included in the following conference series:

  • 1734 Accesses

Abstract

Rapid development and application of big data technology is speeding up the dissemination and utilization of visible media big data. The intensive application of visual media brings about some security issues. The building of copyright protection mechanism of visual media big data under Internet environment can provide safety guarantee for content services of visual media in a digital library, and enhance integrated serviceability of digital resources in the digital library. Firstly, sparse features are extracted by exploiting the data sparsity and perception sparsity of visual media, and then a sparse perception computing model for visual media big data is built. Then the design idea of visual media copyright encryption, copyright authentication, copyright notice, and audit trail scheme are given from the point of view of sparse feature computation of visual media. Finally, a copyright protection application scheme of visual media big data under the network environment is developed. Its application in the digital library validates the effectiveness of this copyright protection mechanism of visual media. It can safeguard the confidentiality, integrity, availability, and auditing of visual media big data in the digital library, and enhance content serviceability of visual media in the digital library under big data environment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Singh, A., Mahapatra, S.: Network-based applications of multimedia big data computing in IoT environment. In: Tanwar, S., Tyagi, S., Kumar, N. (eds.) Multimedia Big Data Computing for IoT Applications: Concepts, Paradigms and Solutions, vol. 163, pp. 435–452. Springer Singapore, Singapore (2020). https://doi.org/10.1007/978-981-13-8759-3_17

    Chapter  Google Scholar 

  2. Ruoyu, R., Shulin, Y., Qi, Z.: Research on copyright protection of digital publishing in the era of big data. In: Proceedings of the 2019 2nd International Conference on Information Hiding and Image Processing, pp. 39–43. Association for Computing Machinery, London (2019)

    Google Scholar 

  3. Kapil, G., Ishrat, Z., Kumar, R., Agrawal, A., Khan, R.A.: Managing multimedia big data: security and privacy perspective. In: Tuba, M., Akashe, S., Joshi, A. (eds.) ICT Systems and Sustainability, vol. 1077, pp. 1–12. Springer Nature, Singapore (2020). https://doi.org/10.1007/978-981-15-0936-0_1

    Chapter  Google Scholar 

  4. Liu, Y., Peng, H., Wang, J.: Verifiable diversity ranking search over encrypted outsourced data. Comput. Mater. Continua 55, 037–057 (2018)

    Article  Google Scholar 

  5. Wang, B., Kong, W., Li, W., Xiong, N.N.: A dual-chaining watermark scheme for data integrity protection in internet of things. Comput. Mater. Continua 58, 679–695 (2019)

    Article  Google Scholar 

  6. Yang, H., Yin, J., Yang, Y.: Robust image hashing scheme based on low-rank decomposition and path integral LBP. IEEE Access 7, 51656–51664 (2019)

    Article  Google Scholar 

  7. Xiang, L.Y., Yang, S.H., Liu, Y.H., Li, Q., Zhu, C.Z.: Novel linguistic steganography based on character-level text generation. Mathematics 8, 1558 (2020)

    Article  Google Scholar 

  8. Yang, Z., Zhang, S., Hu, Y., Hu, Z., Huang, Y.: VAE-Stega: Linguistic steganography based on variational auto-encoder. IEEE Trans. Inf. Forensics 16, 880–895 (2021)

    Article  Google Scholar 

  9. Ting, P., Huang, S., Wu, T., Lin, H.: A provable watermark-based copyright protection scheme. In: 2015 10th Asia Joint Conference on Information Security, pp. 124–129. IEEE, Kaohsiung (2015)

    Google Scholar 

  10. Kukreja, S., Kasana, G., Kasana, S.S.: Curvelet transform based robust copyright protection scheme for color images using extended visual cryptography. Multimed. Tools Appl. 79, 26155–26179 (2020). https://doi.org/10.1007/s11042-020-09130-y

    Article  Google Scholar 

  11. Sinha Roy, S., Basu, A., Chattopadhyay, A.: On the implementation of a copyright protection scheme using digital image watermarking. Multimed. Tools Appl. 79, 13125–13138 (2020). https://doi.org/10.1007/s11042-020-08652-9

    Article  Google Scholar 

  12. Rani, A., Raman, B.: An image copyright protection scheme by encrypting secret data with the host image. Multimed. Tools Appl. 75(2), 1027–1042 (2014). https://doi.org/10.1007/s11042-014-2344-0

    Article  Google Scholar 

  13. El Hossaini, A.E.A., Aroussi, M., Jamali, K., Mbarki, S., Wahbi, M.: A new robust blind copyright protection scheme based on visual cryptography and steerable pyramid. Int. J. Netw. Secur. 18, 250–262 (2016)

    Google Scholar 

  14. Ahuja, R., Bedi, S.S.: Copyright protection using blind video watermarking algorithm based on MPEG-2 structure. In: International Conference on Computing, Communication & Automation, pp. 1048–1053. IEEE, Greater Noida (2015)

    Google Scholar 

  15. Kamnardsiri, T.: Digital art image copyright protection using combined DWT-DCT based watermarking technique. In: 1st International Conference on Digital Arts, Media and Technology (ICDAMT 2016), pp. 83–94. IEEE, Chiang Rai (2016)

    Google Scholar 

  16. Hashmi, M.F., Shukla, R.J., Keskar, A.G.: Real time copyright protection and implementation of image and video processing on android and embedded platforms. Proc. Comput. Sci. 46, 1626–1634 (2015)

    Article  Google Scholar 

  17. Mairal, J., Elad, M., Sapiro, G.: Sparse representation for color image restoration. IEEE Trans. Image Process. 17, 53–69 (2007)

    Article  MathSciNet  Google Scholar 

  18. Chen, X., Wang, S., Dong, Y., Wang, X.: Big data storage architecture design in cloud computing. In: Chen, W., Yin, G., Zhao, G., Han, Q., Jing, W., Sun, G., Lu, Z. (eds.) BDTA 2015. CCIS, vol. 590, pp. 7–14. Springer, Singapore (2016). https://doi.org/10.1007/978-981-10-0457-5_2

    Chapter  Google Scholar 

  19. Zhou, X., Yang, C., Zhao, H., Yu, W.: Low-rank modeling and its applications in image analysis. ACM Comput. Surv. 47, 1–33 (2014)

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported in component by the National Natural Science Foundation of China under Grant No. 61872408, the Natural Science Foundation of Hunan Province (2020JJ4238), the Social Science Fund of Hunan Province under Grant No. 16YBA102, and the Research Fund of Hunan Provincial Key Laboratory of informationization technology for basic education under Grant No. 2015TP1017.

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wang, S., Qin, J., Jiang, M., Gao, Z. (2021). A Copyright Protection Scheme of Visual Media in Big Data Environment. In: Sun, X., Zhang, X., Xia, Z., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2021. Lecture Notes in Computer Science(), vol 12736. Springer, Cham. https://doi.org/10.1007/978-3-030-78609-0_53

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-78609-0_53

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-78608-3

  • Online ISBN: 978-3-030-78609-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics