Hierarchical encryption of multimedia contents for access control

被引:5
作者
Fujiyoshi, Masaaki [1 ]
Saitou, Wataru
Watanabe, Osamu [2 ,3 ]
Kiya, Hitoshi [1 ]
机构
[1] Tokyo Metropolitan Univ, Dept Informat & Commun Syst Engn, 1-1 MinamiOsawa, Hachioji, Tokyo 1920397, Japan
[2] Tokyo Metropolitan Univ, Elect & Informat Engn Dept, Hachioji, Tokyo 1920397, Japan
[3] Takushoku Univ, Dept Elect & Comp Syst, Tokyo 1930985, Japan
来源
2006 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, ICIP 2006, PROCEEDINGS | 2006年
关键词
multimedia communication; access control; cryptography; image coding; internet;
D O I
10.1109/ICIP.2006.312885
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
An encryption scheme is proposed that considers hierarchies in media, such as text, images, sound, and so on, in a composite multimedia content to enable versatile access control. In the proposed scheme, a content provider has only one managed key (the master key) for a particular multimedia content, and an user who is permitted to access a reserved content objects in the composite content receives only one key that is subordinately generated from the master key. The key generated from the identical master key is delivered to another user, and this permits the user to access different objects. This scheme introduces a new key concept, namely "unusable key", to keep all objects encrypted in a particular medium and to simultaneously decrypt several objects in other media. The other new key, "numbering key," is also used in this scheme to support simultaneous partial decryption of multiple images that are coded with scalable coding technology. Simulation results show the effectiveness of the proposed scheme.
引用
收藏
页码:1977 / +
页数:2
相关论文
共 12 条
[1]  
[Anonymous], P ACM INT C MULT
[2]  
[Anonymous], P IEEE INT C IM PROC
[3]  
FUJIYOSHI M, 2005, P IEEE ICIP, P969
[4]  
*INT STD ISO IEC, 2000, IS154441 ISOIECIS
[5]  
*ISO IEC, 2001, 144962FDAM4 ISOIEC
[6]  
KIYA H, 2003, P IEEE ICIP
[7]  
MUKHERJEE D, 2005, P IEEE ICIP, P1114
[8]  
Schneier B, 1996, APPL CRYPTOGRAPHY
[9]  
Taubman D., 2012, JPEG2000: Image Compression Funda- mentals, Standards and Practice, V642
[10]  
Yu HH, 2003, INT CONF ACOUST SPEE, P417