Skip to main content
Log in

A secure social multimedia sharing scheme in the TSHWT_SVD domain based on neural network

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The rapid development of mobile social networks and wireless communication technology has made image/video sharing easier and more efficient. However, the convenience of social multimedia sharing can also cause serious problems such as privacy disclosure because of illegal use of shared contents, and the existing content sharing scheme cannot meet the privacy protection requirements of users in social networks. Therefore, secure multimedia sharing and privacy protection have become critical and urgent in multimedia social networks. For protecting multimedia sharing in multimedia social networks, a novel joint fingerprinting and encryption (JFE) scheme is proposed. Both fingerprint embedding and encryption are performed in the tree structure haar wavelet transform and singular value decomposition (TSHWT_SVD) domain based on chaotic neural network. First, the social image is decomposed based on the fingerprint code structure by the TSHWT. Then, perform SVD computing for selective subbands for parallel piecewise fingerprint segments embedding. In the end, the fingerprinted coefficient stream is encrypted via block permutation and SVD diffusion. It is worth mentioning that most of the existing image security algorithms encrypt and embed a watermark in the spatial domain, which cannot meet the requirements of the era of multimedia social networks due to lack of scalability. The proposed method, to the best of our knowledge, is the first scalable JFE method for fingerprinting and encryption in the TSHWT_SVD domain. The use of fingerprinting along with encryption in the TSHWT_SVD domain can provide scalable double-layer protection for secure social multimedia sharing. When compared with existing image security algorithms, the scalable selective encryption method greatly improves encryption efficiency. Moreover, experimental results and contrastive analyses show that the proposed JFE scheme has high security, fast speed and can resist various attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Al-Haj A, Abdel-Nabi H (2021) An efficient watermarking algorithm for medical images. Multimed Tools Appl 80(17):26021–26047. https://doi.org/10.1007/s11042-021-10801-7

    Article  Google Scholar 

  2. Anand A, Singh AK (2022) Dual watermarking for security of covid-19 patient record. IEEE Transactions on Dependable and Secure Computing, 1–1. https://doi.org/10.1109/TDSC.2022.3144657

  3. Cancellaro M, Battisti F, Carli M, Boato G, De Natale F, Neri A (2011) A commutative digital image watermarking and encryption method in the tree structured haar transform domain. Signal Process Image Commun 26(1):1–12

    Article  MATH  Google Scholar 

  4. Czaplewski B (2016) Joint fingerprinting and decryption method for color images based on quaternion rotation with cipher quaternion chaining. J Vis Commun Image Represent 40:1–13

    Article  Google Scholar 

  5. Diaconu A-V (2016) Circular inter-intra pixels bit-level permutation and chaos-based image encryption. Inf Sci 355:314–327. https://doi.org/10.1016/j.ins.2015.10.027

    Article  Google Scholar 

  6. Ding Y, Wu G, Chen D, Zhang N, Gong L, Cao M, Qin Z (2021) Deepedn: A deep-learning-based image encryption and decryption network for internet of medical things. IEEE Internet Things J 8(3):1504–1518. https://doi.org/10.1109/JIOT.2020.3012452

    Article  Google Scholar 

  7. Divya CD, Gururaj HL, Rohan R, Bhagyalakshmi V, Flammini F (2021) An efficient machine learning approach to nephrology through iris recognition. Discov Artif Intell 1(1):10–25. https://doi.org/10.1007/s44163-021-00010-4

    Article  Google Scholar 

  8. Egiazarian K, Astola J (2002) Tree-structured haar transforms. Journal of Mathematical Imaging and Vision 16(3):269–279

    Article  MathSciNet  MATH  Google Scholar 

  9. Egorova E, Fernandez M, Kabatiansky G, Lee MH (2019) Signature codes for weighted noisy adder channel, multimedia fingerprinting and compressed sensing. Des Codes Crypt 87(SI 2-3):455–462

    Article  MathSciNet  MATH  Google Scholar 

  10. Elhoseny M, Shankar K, Lakshmanaprabu SK, Maseleno A, Arunkumar N (2020) Hybrid optimization with cryptography encryption for medical image security in Internet of Things. Neural Comput Appl 32(15):10979–10993

    Article  Google Scholar 

  11. Feixiang Z, Mingzhe L, Kun W, Hong Z (2021) Color image encryption via hénon-zigzag map and chaotic restricted boltzmann machine over blockchain. Opt Laser Technol 135:1–13. https://doi.org/10.1016/j.optlastec.2020.106610

    Article  Google Scholar 

  12. Haddad S, Coatrieux G, Moreau-Gaudry A, Cozic M (2020) Joint watermarking-encryption-jpeg-ls for medical image reliability control in encrypted and compressed domains. IEEE Trans Inform Forensics and Secur 15:2556–2569

    Article  Google Scholar 

  13. Hua Z, Zhou Y, Huang H (2019) Cosine-transform-based chaotic system for image encryption. Inform Sci 480:403–419

    Article  Google Scholar 

  14. Jiang J, Gu Y, Cheng M (2020) Multimedia IPP codes with efficient tracing. Des Codes Crypt 88(5):851–866

    Article  MathSciNet  MATH  Google Scholar 

  15. Kundur D, Karthik K (2004) Video fingerprinting and encryption principles for digital rights management. Proc IEEE 92(6):918–932

    Article  Google Scholar 

  16. Li M, Chang H, Xiang Y, An D (2020) A Novel Anti-Collusion Audio Fingerprinting Scheme Based on Fourier Coefficients Reversing. IEEE Signal Process Lett 27:1794–1798

    Article  Google Scholar 

  17. Li M, Xiao D, Zhu Y, Zhang Y, Sun L (2019) Commutative fragile zero-watermarking and encryption for image integrity protection. Multimed Tools Appl 78(16):22727–22742

    Article  Google Scholar 

  18. Lian SG, Wang ZQ (2008) Collusion-traceable secure multimedia distribution based on controllable modulation. IEEE Trans Circuits Syst Video Technol 18(10):1462–1467

    Article  Google Scholar 

  19. Lin C-Y, Muchtar K, Yeh C-H, Lu C-S (2016) Secure multicasting of images via joint privacy-preserving fingerprinting, decryption, and authentication. J Vis Commun Image Represent 38:858–871

    Article  Google Scholar 

  20. Liu H, Wang X (2010) Color image encryption based on one-time keys and robust chaotic maps. Comput Math Appl 59(10):3320–3327

    Article  MathSciNet  MATH  Google Scholar 

  21. Megias D, Qureshi A (2017) Collusion-resistant and privacy-preserving P2P multimedia distribution based on recombined fingerprinting. Expert Syst Appl 71:147–172

    Article  Google Scholar 

  22. Mohamed KS, Nouh S, Naguib AM (2019) Adaptive power transmission and efficient energy scheme of dsr protocol (apee-dsr). Int J Comput Netw Appl 6(1):13–24

    Google Scholar 

  23. Peng H, Yang B, Li L, Yang Y (2020) Secure and traceable image transmission scheme based on semitensor product compressed sensing in telemedicine system. IEEE Internet Things J 7(3):2432–2451

    Article  Google Scholar 

  24. Ren H, Niu S Joint encryption and authentication in hybrid domains with hidden double random-phase encoding. Multimed Tools Appl . https://doi.org/10.1007/s11042-022-12013-z

  25. Rostami MJ, Shahba A, Saryazdi S, Nezamabadi-pour H (2017) A novel parallel image encryption with chaotic windows based on logistic map. Comput Electr Eng 62:384–400. https://doi.org/10.1016/j.compeleceng.2017.04.004

    Article  Google Scholar 

  26. Sahoo SR, Gupta BB (2019) Hybrid approach for detection of malicious profiles in twitter. Comput Electr Eng 76:65–81. https://doi.org/10.1016/j.compeleceng.2019.03.003

    Article  Google Scholar 

  27. Sahoo SR, Gupta BB (2019) Classification of various attacks and their defence mechanism in online social networks: a survey. Enterprise Information Systems 13(6):832–864. https://doi.org/10.1080/17517575.2019.1605542

    Article  Google Scholar 

  28. Sahoo SR, Gupta BB (2020) Classification of spammer and nonspammer content in online social network using genetic algorithm-based feature selection. Enterprise Information Systems 14(5):710–736. https://doi.org/10.1080/17517575.2020.1712742

    Article  Google Scholar 

  29. Sahoo SR, Gupta BB (2021) Multiple features based approach for automatic fake news detection on social networks using deep learning. Appl Soft Comput 100:106983. https://doi.org/10.1016/j.asoc.2020.106983

    Article  Google Scholar 

  30. Shanmugam L, Mani P, Rajan R, Joo YH (2020) Adaptive synchronization of reaction-diffusion neural networks and its application to secure communication. IEEE Trans Cybern 50(3):911–922

    Article  Google Scholar 

  31. Singh SK, Sachan MK (2021) Classification of code-mixed bilingual phonetic text using sentiment analysis. Int J Semant Web Inf Syst 17(2):59–78. https://doi.org/10.4018/IJSWIS.2021040104

    Article  Google Scholar 

  32. Skoric B, Katzenbeisser S, Celik M, Schaathun H (2011) Tardos fingerprinting codes in the combined digit model. IEEE Trans Inform Forensics and Secur 6(3):906–919

    Article  Google Scholar 

  33. Subhash S, Gururaj HL, Ramesh B (2016) Entropy correlation coefficient technique for visual data in multimedia sensor network. Indian J Comput Sci Eng 148(2):1–6

    Google Scholar 

  34. Tanuja U, Gururaj VHL (2020) Janhavi: A machine learning algorithm for classification, analyzation and prediction of multimedia messages in social networks. In: Singh PK, Pawłowski W, Tanwar S, Kumar N, Rodrigues JJPC, Obaidat MS (eds) Proceedings of first international conference on computing, communications, and cyber-security (IC4S 2019), vol 121. Springer, Singapore, pp 485–499

  35. Tembhurne JV, Almin MM, Diwan T (2022) Mc-dnn: Fake news detection using multi-channel deep neural networks. Int J Semantic Web Inform Syst 18(1):1–20. https://doi.org/10.4018/IJSWIS.295553

    Article  Google Scholar 

  36. Thakur S, Singh AK, Ghrera SP, Elhoseny M (2019) Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications. Multimed Tools Appl 78(3):3457–3470. https://doi.org/10.1007/s11042-018-6263-3

    Article  Google Scholar 

  37. Thanki R, Kothari A (2021) Multi-level security of medical images based on encryption and watermarking for telemedicine applications. Multimed Tools Appl 80(3):4307–4325. https://doi.org/10.1007/s11042-020-09941-z

    Article  Google Scholar 

  38. Wang X-Y, Li Z-M (2019) A color image encryption algorithm based on hopfield chaotic neural network. Opt Lasers Eng 115:107–118

    Article  Google Scholar 

  39. Wu J, Liao X, Yang B (2018) Image encryption using 2d hénon-sine map and dna approach. Signal Process 153:11–23

    Article  Google Scholar 

  40. Xiong Z, Wu Y, Ye C, Zhang X, Xu F (2019) Color image chaos encryption algorithm combining CRC and nine palace map. Multimed Tools Appl 78 (22):31035–31055

    Article  Google Scholar 

  41. Xiong L, Xia Z, Chen X, Shim HJ (2019) Secure multimedia distribution in cloud computing using re-encryption and fingerprinting. Multimed Tools Appl 78(21):30297–30313

    Article  Google Scholar 

  42. Yan L, Fu J, Wang C, Ye Z, Chen H, Ling H (2021) Enhanced network optimized generative adversarial network for image enhancement. Multimed Tools Appl 80(9):14363–14381. https://doi.org/10.1007/s11042-020-10310-z

    Article  Google Scholar 

  43. Yan L, Lu H, Wang C, Ye Z, Chen H, Ling H (2019) Deep linear discriminant analysis hashing for image retrieval. Multimed Tools Appl 78 (11):15101–15119. https://doi.org/10.1007/s11042-018-6855-y

    Article  Google Scholar 

  44. Yan L, Sheng M, Wang C, Gao R, Yu H (2022) Hybrid neural networks based facial expression recognition for smart city. Multimed Tools Appl 81(1):319–342. https://doi.org/10.1007/s11042-021-11530-7

    Article  Google Scholar 

  45. Yang Y, Liu X, Deng RH, Li Y (2020) Lightweight sharable and traceable secure mobile health system. IEEE Trans Dependable Secure Comput 17 (1):78–91

    Article  Google Scholar 

  46. Yasui T, Kuribayashi M, Funabiki N, Echizen I (2020) Near-optimal detection for binary tardos code by estimating collusion strategy. IEEE Trans Inf Forensics Secur 15:2069–2080

    Article  Google Scholar 

  47. Ye C, Ling H, Zou F, Lu Z (2013) A new fingerprinting scheme using social network analysis for majority attack. Telecommun Syst 54(3):315–331. https://doi.org/10.1007/s11235-013-9736-8

    Article  Google Scholar 

  48. Zhang LY, Zheng Y, Weng J, Wang C, Shan Z, Ren K (2020) You can access but you cannot leak: Defending against illegal content redistribution in encrypted cloud media center. IEEE Trans Dependable Secure Comput 17(6):1218–1231

    Article  Google Scholar 

Download references

Acknowledgments

This paper is supported by Natural Science Foundation of China (No.61502154, No.61972136, No.61370092), NSF of Chinese Hubei Provinc (No.2015CFB236), Natural Science Fundation of Hubei Provincial Department of Education (No.D20142703), Philosophy and Social Science Research Project of Hubei Provincial Department of Education (No.21Q213).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Conghuan Ye.

Ethics declarations

All data generated or analysed during this study are included in this published article.

Conflict of Interests

The authors declare that they have no conflict of interest.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Shenglong Tan, Zheng Wang, Li Shi and Jun Wang are contributed equally to this work.

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ye, C., Tan, S., Wang, Z. et al. A secure social multimedia sharing scheme in the TSHWT_SVD domain based on neural network. Multimed Tools Appl 82, 15395–15414 (2023). https://doi.org/10.1007/s11042-022-13953-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-022-13953-2

Keywords

Navigation