Skip to main content

Verifiable and Lossless Distributed Media Content Sharing

  • Conference paper
Ubiquitous Intelligence and Computing (UIC 2011)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 6905))

Included in the following conference series:

  • 1594 Accesses

Abstract

For digital communication, distributed storage and management of media content over system holders is a critical issue. In this article, an efficient verifiable sharing scheme is proposed that can satisfy the significant essentials of distribution sharing and can achieve the lossless property of the host media. Verifiability allows holders to detect and identify the counterfeited shadows during cooperation in order to prevent cheaters. Only authorized holders can reveal the lossless shared content and then reconstruct the original host image. The shared media capacity is adjustable and proportional to the increase of t. The more distributed holders, the larger the shared media capacity. Moreover, the ability to reconstruct the image preserves the fidelity of valuable host media, such as military and medical images. According to the results, the proposed approach can achieve superior performance to that of related sharing schemes in order to effectively provide distributed media management and storage.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Blakley, G.R.: Safeguarding cryptographic keys. In: Proceedings of AFIPS National Computer Conference, vol. 48, pp. 313–317 (1979)

    Google Scholar 

  2. Shamir, A.: How to share a secret. Communications of the ACM 22(11), 612–613 (1979)

    Article  MathSciNet  MATH  Google Scholar 

  3. Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)

    Chapter  Google Scholar 

  4. Beimel, A., Chor, B.: Secret sharing with public reconstruction. IEEE Transactions on Information Theory 44(5), 1887–1896 (1998)

    Article  MathSciNet  MATH  Google Scholar 

  5. Tompa, M., Woll, H.: How to share a secret with cheaters. Journal of Cryptology 1(2), 133–138 (1988)

    MathSciNet  MATH  Google Scholar 

  6. Thien, C.C., Lin, J.C.: Secret image sharing. Computer & Graphics 26(1), 765–770 (2002)

    Article  Google Scholar 

  7. Lee, C.C., Wu, H.C., Tsai, C.S., Chu, Y.P.: Adaptive lossless steganographic scheme with centralized difference expansion. Pattern Recognition 41(6), 2097–2106 (2008)

    Article  MATH  Google Scholar 

  8. Wu, Y.S., Thien, C.C., Lin, J.C.: Sharing and hiding secret images with size constraint. Pattern Recognition 37(7), 1377–1385 (2004)

    Article  Google Scholar 

  9. Lin, C.C., Tsai, W.H.: Secret image sharing with steganography and authentication. The Journal of Systems and Software 73(3), 405–414 (2004)

    Article  Google Scholar 

  10. Yang, C.N., Chen, T.S., Yu, K.H., Wang, C.C.: Improvements of image sharing with steganography and authentication. The Journal of Systems and Software 80(7), 1070–1076 (2007)

    Article  Google Scholar 

  11. Chang, C.C., Hsieh, Y.P., Lin, C.H.: Sharing secrets in stego images with authentication. Pattern Recognition 41(10), 3130–3137 (2008)

    Article  MATH  Google Scholar 

  12. Eslami, Z., Razzaghi, S.H., Ahmadabadi, J.Z.: Secret image sharing based on cellular automata and steganography. Pattern Recognition 43(1), 397–404 (2010)

    Article  MATH  Google Scholar 

  13. Chang, C.C., Chen, Y.H., Wang, H.C.: Meaningful secret sharing technique with authentication and remedy abilities. Information Sciences 181(14), 3073–3084 (2011)

    Article  MathSciNet  Google Scholar 

  14. Liu, T.Y., Tsai, W.H.: Generic lossless visible watermarking - a new approach. IEEE Transactions on Image Processing 19(5), 1224–1235 (2010)

    Article  MathSciNet  Google Scholar 

  15. Zeng, X.T., Ping, L.D., Pan, X.Z.: A lossless robust data hiding scheme. Pattern Recognition 43(4), 1656–1667 (2010)

    Article  MATH  Google Scholar 

  16. Lin, P.Y., Lee, J.S., Chang, C.C.: Distortion-free secret image sharing mechanism using modulus operator. Pattern Recognition 42(5), 886–895 (2009)

    Article  MATH  Google Scholar 

  17. Stinson, D.R.: Cryptography – Theory and Practice, 2nd edn. CRC Press Inc., New York (2002)

    MATH  Google Scholar 

  18. Ulutas, M., Ulutas, G., Nabiyev, V.V.: Medical image security and EPR hiding using Shamir’s secret sharing scheme. Journal of Systems and Software 84(3), 341–353 (2011)

    Article  Google Scholar 

  19. Kundur, D., Hatzinakos, D.: Digital watermarking for telltale tamper proofing and authentication. IEEE Proceedings 87(7), 1167–1180 (1999)

    Article  Google Scholar 

  20. Lu, C.S., Liao, H.Y.: Structural digital signature for image authentication: an incidental distortion resistant scheme. IEEE Transactions on Multimedia 5(2), 161–173 (2003)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lin, PY. (2011). Verifiable and Lossless Distributed Media Content Sharing. In: Hsu, CH., Yang, L.T., Ma, J., Zhu, C. (eds) Ubiquitous Intelligence and Computing. UIC 2011. Lecture Notes in Computer Science, vol 6905. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23641-9_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-23641-9_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-23640-2

  • Online ISBN: 978-3-642-23641-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics