Encryption of Composite Multimedia Contents for Access Control(Image,<Special Section>Multimedia and Mobile Signal Processing)
スポンサーリンク
概要
- 論文の詳細を見る
An encryption scheme is proposed that considers hierarchies in media, such as text, images, sound, and so on, in a composite multimedia content to enable versatile access control. In the proposed scheme, a content provider has only one managed key (the master key) for a particular composite multimedia content, and an user who is permitted to access a reserved content entities in the composite content receives only one key that is subordinately generated from the master key. Another key generated from the identical master key is delivered to another user, and this permits the user to access different entities. This scheme introduces a new key concept, namely "unusable key," to keep all entities encrypted in a particular medium and to simultaneously decrypt several entities in other media. The other new key, "numbering key," is also used in this scheme to support simultaneous partial decryption of multiple images that are coded with a scalable coding technology. Simulation results show the effectiveness of the proposed scheme; in particular, the length of the managed master key and that of keys to be delivered to users are small.
- 社団法人電子情報通信学会の論文
- 2007-03-01
著者
-
Fujiyoshi Masaaki
Faculty of System Design, Tokyo Metropolitan University
-
Kiya Hitoshi
Faculty of System Design, Tokyo Metropolitan University
-
Kiya Hitoshi
Dept. Of Information And Communication Systems Engineering Tokyo Metropolitan University
-
Kiya Hitoshi
Faculty Of System Design Tokyo Metropolitan University
-
Kiya Hitoshi
Department Of Information And Communication Systems Engineering Faculty Of System Design Tokyo Metro
-
Kiya Hitoshi
Tokyo Metropolitan Univ. Hachioji‐shi Jpn
-
IMAIZUMI Shoko
Industrial Research Institute of Niigata Prefecture
-
Fujiyoshi Masaaki
Department Of Electrical Engineering Tokyo Metropolitan University
-
Fujiyoshi Masaaki
Graduate School Of System Design Tokyo Metropolitan University
-
Fujiyoshi Masaaki
Dept. Of Information And Communication Systems Engineering Tokyo Metropolitan University
-
Fujiyoshi Masaaki
Faculty Of System Design Tokyo Metropolitan University
-
Fujiyoshi Masaaki
Graduate School Of Engineering Tokyo Metropolitan University
-
Kiya Hitoshi
Faculty Of Engineering Tokyo Metropolitan University
関連論文
- A parameter memorization-free lossless data hiding method with flexible payload size
- Reversible Data Hiding Based on Adaptive Modulation of Statistics Invertibility
- Parallel Processing of Distributed Video Coding to Reduce Decoding Time
- Layered Low-Density Generator Matrix Codes for Super High Definition Scalable Video Coding System
- SCALABLE SCRAMBLING FOR MPEG VIDEO(International Workshop on Advanced Image Technology 2005)
- Codeblock-Based Error Concealment for JPEG2000 Coded Image Transmission over RTP(Digital Signal Processing)
- QOS ESTIMATION BASED ON PSNR FOR MOTION JPEG2000 VIDEO IN LOSSY PACKET NETWORKS(International Workshop on Advanced Image Technology 2007)
- QOS ESTIMATION BASED ON PSNR FOR MOTION JPEG2000 VIDEO IN LOSSY PACKET NETWORKS
- Codeblock-Based Error Concealment for JPEG 2000 Coded Image Transmission over Lossy Packet Networks(音響信号処理/一般)
- Codeblock-Based Error Concealment for JPEG 2000 Coded Image Transmission over Lossy Packet Networks
- Codeblock-Based Error Concealment for JPEG 2000 Coded Image Transmission over Lossy Packet Networks
- Encryption of Composite Multimedia Contents for Access Control(Image,Multimedia and Mobile Signal Processing)
- A Reversible Image Authentication Method without Memorization of Hiding Parameters
- A REVERSIBLE IMAGE AUTHENTICATION METHOD FREE FROM LOCATION MAP AND PARAMETER MEMORIZATION(International Workshop on Advanced Image Technology 2009)
- An Efficient Reversible Image Authentication Method
- A-4-2 Applying Cipher to the Reversible Image Authentication
- Lossless Data Hiding in the Spatial Domain for High Quality Images(Selected Papers from the 19th Workshop on Circuits and Systems in Karuizawa)
- DCT Sign-Based Similarity Measure for JPEG Image Retrieval(Image)
- Fast Image Identification Methods for JPEG Images with Different Compression Ratios(Papers Selected from 2005 International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC 2005))
- FAST AND ROBUST IDENTIFICATION METHODS FOR JPEG-CODED IMAGES(International Workshop on Advanced Image Technology 2006)
- SCRAMBLING OF MPEG VIDEO SUITABLE FOR IMAGE SEARCH (Image Processing and Coding)(International Workshop On Advanced Image Technology (IWAIT2004))
- A Method of Guaranteeing Image-Quality for Quantization-Based Watermarking Using a Nonorthogonal Transformation(Papers Selected from ITC-CSCC 2004)
- MORPHOLOGICAL IMAGE TAMPER DETECTING METHOD CONSIDERING ROBUSTNESS AGAINST COMPRESSION(INTERNATIONAL Workshop on Advanced Image Technology 2008)
- AN IMAGE TAMPER DETECTION USING MATHEMATICAL MORPHOLOGY AND ITS APPLICATION(International Workshop on Advanced Image Technology 2007)
- AN IMAGE TAMPER DETECTION USING MATHEMATICAL MORPHOLOGY AND ITS APPLICATION
- Special Section on Papers Selected from 2005 International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC2005)
- A Super-Resolution Method Based on the Discrete Cosine Transform (Special Section of Papers Selected from JTC-CSCC'95)
- A Representation Method of the Convergence Characteristic of the LMS Algorithm Using Tap-Input Vectors
- Parallel Processing Techniques for Multidimensional Sampling Lattice Alteration Based on Overlap-Add and Overlap-Save Methods
- An LS Based New Gradient Type Adaptive Algorithm : Least Squares Gradient (Special Section of Papers Selected from the 8th Digital Signal Processing Symymposium)
- A New Factorization Technique for the Generalized Linear-Phase LOT and Its Fast Implementation (Special Section on Digital Signal Processing)
- An Image Trading System Using Amplitude-Only Images for Privacy- and Copyright-Protection
- A Generation Method of Amplitude-Only Images with Low Intensity Ranges
- An efficient access control method for composite multimedia content
- A Cheat-Prevention Visual Secret Sharing Scheme with Efficient Pixel Expansion