Content security protection for remote sensing images integrating selective content encryption and digital fingerprint

被引:3
作者
Xu, Yanyan [1 ]
Xu, Zhengquan [1 ]
Zhang, Yuxia [1 ]
机构
[1] Wuhan Univ, State Key Lab Informat Engn Surveying Mapping & R, Wuhan 430079, Hubei, Peoples R China
基金
中国国家自然科学基金;
关键词
content security protection; joint fingerprinting and decryption; remote sensing images; selective content encryption; structure distortion; digital fingerprint; WATERMARKING;
D O I
10.1117/1.JRS.6.063505
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
Content security protection methods should be adopted to guarantee the security of highly sensitive remote sensing images during their transmission and usage. The joint fingerprinting and decryption (JFD) framework, which integrates encryption and fingerprinting, can provide comprehensive, effective content security protection for remote sensing information. However, several challenges need to be overcome. In order to solve the contradictory relationship between encryption security and fingerprinted image quality in JFD, a selective content encryption strategy is proposed to enhance encryption security and a new method for choosing fingerprint embedding area is proposed to reduce partial decryption's influence on image quality. Furthermore, a new method for generating and controlling fingerprints is introduced to JFD to eliminate its vulnerability to collusion attacks. The experiment results show that the proposed techniques are highly effective. Because of its high security, good fingerprinted image quality and high data processing and transmission speed, the new JFD scheme is an effective content security protection approach for remote sensing images, especially suitable for massive remote sensing images. (C) 2012 Society of Photo-Optical Instrumentation Engineers (SPIE). [DOI: 10.1117/1.JRS.6.063505]
引用
收藏
页数:15
相关论文
共 17 条
[1]  
Adelsbach A, 2006, LECT NOTES COMPUT SC, V4058, P136
[2]  
Anderson R, 1997, LECT NOTES COMPUT SC, V1267, P107
[3]  
Barni M, 2002, INT GEOSCI REMOTE SE, P1447, DOI 10.1109/IGARSS.2002.1026144
[4]  
Bloom JA, 2003, 2003 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOL I, PROCEEDINGS, P621
[5]   Collusion-secure fingerprinting for digital data [J].
Boneh, D ;
Shaw, J .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1998, 44 (05) :1897-1905
[6]  
Hartung F, 1997, INT CONF ACOUST SPEE, P2621, DOI 10.1109/ICASSP.1997.595326
[7]  
Karthik K., 2007, INT J NETWORK SECURI, V4, P254
[8]   Video fingerprinting and encryption principles for digital rights management [J].
Kundur, D ;
Karthik, K .
PROCEEDINGS OF THE IEEE, 2004, 92 (06) :918-932
[9]  
Lemma A, 2006, LECT NOTES COMPUT SC, V4283, P433
[10]   Collusion-Traceable Secure Multimedia Distribution Based on Controllable Modulation [J].
Lian, Shiguo ;
Wang, Zhiquan .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2008, 18 (10) :1462-1467