Skip to main content
Log in

A blockchain-based privacy preservation scheme in multimedia network

  • 1159T: Blockchain-based multimedia security
  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

With networking, big data and rapid development and wide application of 5G networks, traditional network architecture cannot handle massive amounts of media data generated by a large number of mobile or PC devices. In recent years, events on multimedia and data copyright violations of a substantial increase, data security and privacy protection of many original multimedia users is suffering an unprecedented challenge. On the other hand, due to the center and the invariance of the block chain, block chain has become a promising multimedia security technology. Blockchain technology provides a common, digitized and distributed books, P2P network composed of all peer nodes interconnected to each other, all participating nodes are equal, collaborative service, compared to traditional architecture under a single central point, can greatly reduce the risk of single point of failure. In this paper, based access scheme in combination with the secure multi-computing protocol blockchain system, the user needs to conduct the authentication system under the multi-computing in order to receive the data, greatly enhance the data safety of multimedia in complicated communication sceneries. In addition, the program mentioned in the text and related simulations and proof of security, usability and reliability can be guaranteed.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3.
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Bianchi T, Piva A (2013) Secure watermarking for multimedia content protection: A review of its bene fits and open issues. IEEE Signal Process Mag 30(2):87–96

  2. Butt AUAA, Bramwell SR, Fudge BT (2013) Multimedia distribution system, Jun. 25 2013, US Patent 8,472,792

  3. Candes E, Romberg J (2005) l1-magic: Recovery of sparse signals via convex programming, URL: www. acm. caltech. edu/l1magic/downloads/l1magic. pdf, vol 4, p 14

  4. Chan HT, Hwang WJ, Cheng CJ (2015) Digital hologram authentication using a hadamard-based reversible fragile watermarking algorithm. J Disp Technol 11(2):193–203

    Article  Google Scholar 

  5. Cox IJ, Miller ML, Bloom JA (2000) Watermarking applications and their properties, in Information Technology: Coding and Computing. Proceedings. International conference on, 2000, pp 6–10

  6. Dinh HT, Lee C, Niyato D et al (2013) a survey of mobile cloud computing: architecture, applications, and approaches[J]. Wireless Commun Mobile Comput 13(18):1587–1611

    Article  Google Scholar 

  7. Li Z, Kang J, Yu R, Ye D, Deng Q, Zhang Y (2018) Consortium blockchain for secure energy trading in industrial internet of things. IEEE Trans Industr Inform 14(8):3690–3700

  8. Liang KT, Man HA, Liu JK et al (2015) A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing[J]. Future Generation Comput Syst 52(C):95–108

    Article  Google Scholar 

  9. Lim Y, Park K, Lee JY, Aoki S, Fernando G (2013) MMT: an emerging MPEG standard for multimedia delivery over the internet. IEEE MultiMed 20(1):80–85

    Article  Google Scholar 

  10. Mougayar W (2016) The business blockchain: promise, practice, and application of the next internet technology. John Wiley & Sons, Hoboken

  11. Orsini G, Bade D, Lamersdorf W (2016) Computing at the mobile edge: designing elastic android applications for computation offloading[C]//The 9th Conference on the Joint IFIP Wireless and Mobile Networking (WMNC’16):112–119

  12. Pande A, Mohapatra P, Zambreno J (Oct 2013) Securing multimedia content using joint compression and encryption. IEEE MultiMed 20(4):50–61

    Article  Google Scholar 

  13. Perera C, Talagala DS, Liu CH, Estrella JC (2015) Energy-efficient location and activity-aware on-demand mobile distributed sensing platform for sensing as a service in IoT clouds. IEEE Trans Comput Social Syst 2(4):171–181

    Article  Google Scholar 

  14. Rudin LI, Osher S, Fatemi E (1992) Nonlinear total variation based noise removal algorithms. Physica D: Nonlinear Phenomena 60(1–4):259–268

    Article  MathSciNet  Google Scholar 

  15. Singh D, Singh SK (2016) Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability. J Vis Commun Image Represent 38:775–789

    Article  Google Scholar 

  16. Valenzise G, Tagliasacchi M, Tubaro S, Cancelli G, Barni M (2009) A compressive-sensing based watermarking scheme for sparse image tampering identification,” in IEEE International Conference on Image Processing (ICIP), pp 1265–1268

  17. Wang S, Zheng D, Zhao J, Tam WJ, Speranza F (2007) An image quality evaluation method based on digital watermarking. IEEE Trans Circuits Syst Video Technol 17(1):98–105

    Article  Google Scholar 

  18. WANG Q, WANG C, REN K et al (2011) Enabling public auditability and data dynamics for storage security in cloud computing[J]. IEEE Trans Parallel Distribut Syst 22(5):847–859

    Article  Google Scholar 

  19. Wu J et al (2017) FCSS: Fog computing based content aware filtering for security services in information centric social network. IEEE Trans Emerg Topics Comput (99):1–1. https://doi.org/10.1109/TETC.2017.2747158

  20. Yamada T, Maeta M, Mizushima F (2016) Video watermark application for embedding recipient id in real-time-encoding vod server. J Real-Time Image Proc 11(1):211–222

    Article  Google Scholar 

  21. Yang YJ, Zhu HY, Lu HB et al (2015) cloud based data sharing with fine-grained proxy re-encryption[J]. Pervasive Mobile Comput 28(C):122–134

    Google Scholar 

  22. YliHuumo J, Ko D, Choi S, Park S, Smolander K (2016) Where is current research on blockchain technology? A systematic review. PloS one 11(10):e0163477

  23. Yu SC, Wang C, Ren K, et al. (2010) Achieving secure, scalable, and fine-grained data access control in cloud computing[C]//The 29th Annual IEEE International Conference on Computer Communications (INFOCOM’10): 1–9

  24. Zhang H, Shu H, Coatrieux G, Zhu J, Wu QMJ, Zhang Y, Zhu H, Luo L (2011) Affine legendre moment invariants for image watermarking robust to geometric distortions. IEEE Trans Image Process 20(8):2189–2199

    Article  MathSciNet  Google Scholar 

  25. Zhang K, Liang X, Ni J, Yang K, Shen X (2018) Infection analysis without privacy leakage. IEEE Transactions on Dependable and Secure Computing, vol. 15, no. 4, pp. 607–620. "Exploiting social network to enhance human-to-human

  26. Zhou L, Wu D, Zheng B, Guizani M (2014) Joint physical application layer security for wireless multimedia delivery. IEEE Commun Mag 52(3):66–72

Download references

Funding

This work is supported by the National Key RD Program of China (2017YFB0802300), the National Natural Science Foundation of China (No. 61772403, U1836203), the Natural Science Foundation of Shaanxi Province (No. 2019ZDLGY12-02), the Shaanxi Innovation Team Project (No. 2018TD-007), the Xian Science and technology innovation plan (No. 201809168CX9JC10) and National 111 Program of China B16037.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Jianxing Liu or Kai Fan.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liu, J., Fan, K., Li, H. et al. A blockchain-based privacy preservation scheme in multimedia network. Multimed Tools Appl 80, 30691–30705 (2021). https://doi.org/10.1007/s11042-021-10513-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-021-10513-y

Keywords

Navigation