• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

用于社交图像安全的混合分层水印与选择性加密

Hybridized Hierarchical Watermarking and Selective Encryption for Social Image Security.

作者信息

Ye Conghuan, Tan Shenglong, Wang Zheng, Shi Binghua, Shi Li

机构信息

School of Information Engineering, Hubei University of Economics, Wuhan 430205, China.

Hubei Internet Finance Information Engineering Technology Research Center, Hubei University of Economics, Wuhan 430205, China.

出版信息

Entropy (Basel). 2023 Jul 7;25(7):1031. doi: 10.3390/e25071031.

DOI:10.3390/e25071031
PMID:37509978
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC10378305/
Abstract

With the advent of cloud computing and social multimedia communication, more and more social images are being collected on social media platforms, such as Facebook, TikTok, Flirk, and YouTube. The amount of social images produced and disseminated is rapidly increasing. Meanwhile, cloud computing-assisted social media platforms have made social image dissemination more and more efficient. There exists an unstoppable trend of fake/unauthorized social image dissemination. The growth of social image sharing underscores potential security risks for illegal use, such as image forgery, malicious copying, piracy exposure, plagiarism, and misappropriation. Therefore, secure social image dissemination has become urgent and critical on social media platforms. The authors propose a secure scheme for social image dissemination on social media platforms. The main objective is to make a map between the tree structure Haar (TSH) transform and the hierarchical community structure of a social network. First, perform the TSH transform on a social image using social network analysis (SNA). Second, all users in a social media platform are coded using SNA. Third, watermarking and encryption are performed in a compressed domain for protecting social image dissemination. Finally, the encrypted and watermarked contents are delivered to users via a hybrid multicast-unicast scheme. The use of encryption along with watermarking can provide double protection for social image dissemination. The theory analysis and experimental results demonstrate the effectiveness of the proposed scheme.

摘要

随着云计算和社交多媒体通信的出现,越来越多的社交图像在社交媒体平台上被收集,如脸书、抖音、弗利克和优兔。所产生和传播的社交图像数量正在迅速增加。与此同时,云计算辅助的社交媒体平台使社交图像传播变得越来越高效。存在着虚假/未经授权的社交图像传播这一不可阻挡的趋势。社交图像分享的增长凸显了非法使用的潜在安全风险,如图像伪造、恶意复制、盗版曝光、剽窃和挪用。因此,在社交媒体平台上实现安全的社交图像传播已变得紧迫且至关重要。作者提出了一种社交媒体平台上社交图像传播的安全方案。主要目标是在树形结构哈尔(TSH)变换与社交网络的层次社区结构之间建立映射。首先,使用社交网络分析(SNA)对社交图像进行TSH变换。其次,使用SNA对社交媒体平台上的所有用户进行编码。第三,在压缩域中进行水印和加密以保护社交图像传播。最后,通过混合多播-单播方案将加密和带水印的内容传送给用户。加密与水印的结合使用可为社交图像传播提供双重保护。理论分析和实验结果证明了所提方案的有效性。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f181/10378305/6b68ce7ebacb/entropy-25-01031-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f181/10378305/356c4157f3cb/entropy-25-01031-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f181/10378305/6980f5a91a25/entropy-25-01031-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f181/10378305/d77a9274d2fc/entropy-25-01031-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f181/10378305/c5f9395f9088/entropy-25-01031-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f181/10378305/0e4855e26b52/entropy-25-01031-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f181/10378305/c9350f1b7f07/entropy-25-01031-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f181/10378305/6b68ce7ebacb/entropy-25-01031-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f181/10378305/356c4157f3cb/entropy-25-01031-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f181/10378305/6980f5a91a25/entropy-25-01031-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f181/10378305/d77a9274d2fc/entropy-25-01031-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f181/10378305/c5f9395f9088/entropy-25-01031-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f181/10378305/0e4855e26b52/entropy-25-01031-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f181/10378305/c9350f1b7f07/entropy-25-01031-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f181/10378305/6b68ce7ebacb/entropy-25-01031-g007.jpg

相似文献

1
Hybridized Hierarchical Watermarking and Selective Encryption for Social Image Security.用于社交图像安全的混合分层水印与选择性加密
Entropy (Basel). 2023 Jul 7;25(7):1031. doi: 10.3390/e25071031.
2
A cloud-based buyer-seller watermarking protocol (CB-BSWP) using semi-trusted third party for copy deterrence and privacy preserving.一种基于云的买卖双方水印协议(CB-BSWP),使用半可信第三方来防止复制并保护隐私。
Multimed Tools Appl. 2022;81(15):21417-21448. doi: 10.1007/s11042-022-12550-7. Epub 2022 Mar 15.
3
Complex entropy based encryption and decryption technique for securing medical images.基于复杂熵的医学图像加密和解密技术,用于保护医学图像安全。
Multimed Tools Appl. 2022;81(26):37441-37459. doi: 10.1007/s11042-022-13546-z. Epub 2022 Jul 26.
4
Joint Image Encryption and Screen-Cam Robust Two Watermarking Scheme.联合图像加密与屏幕摄像头鲁棒双水印方案
Sensors (Basel). 2021 Jan 20;21(3):701. doi: 10.3390/s21030701.
5
Efficient and accountable anti-leakage attribute-based encryption scheme for cloud storage.用于云存储的高效且可问责的抗泄漏属性基加密方案。
Heliyon. 2024 Jun 7;10(12):e32404. doi: 10.1016/j.heliyon.2024.e32404. eCollection 2024 Jun 30.
6
Advance hybrid medical watermarking algorithm using speeded up robust features and discrete cosine transform.基于快速鲁棒特征和离散余弦变换的混合医学水印算法。
PLoS One. 2020 Jun 4;15(6):e0232902. doi: 10.1371/journal.pone.0232902. eCollection 2020.
7
WatMIF: Multimodal Medical Image Fusion-Based Watermarking for Telehealth Applications.WatMIF:用于远程医疗应用的基于多模态医学图像融合的水印技术
Cognit Comput. 2022 Jul 7:1-17. doi: 10.1007/s12559-022-10040-4.
8
Secure Collaborative Platform for Health Care Research in an Open Environment: Perspective on Accountability in Access Control.安全的开放环境下医疗保健研究协作平台:访问控制中的问责制视角。
J Med Internet Res. 2022 Oct 14;24(10):e37978. doi: 10.2196/37978.
9
A New Secure Model for Data Protection over Cloud Computing.云计算中数据保护的新型安全模型。
Comput Intell Neurosci. 2021 Nov 24;2021:8113253. doi: 10.1155/2021/8113253. eCollection 2021.
10
A joint encryption/watermarking algorithm for verifying the reliability of medical images: application to echographic images.一种用于验证医学图像可靠性的联合加密/水印算法:在超声图像中的应用。
Comput Methods Programs Biomed. 2012 Apr;106(1):47-54. doi: 10.1016/j.cmpb.2011.09.015. Epub 2011 Nov 4.

本文引用的文献

1
Adaptive Synchronization of Reaction-Diffusion Neural Networks and Its Application to Secure Communication.反应扩散神经网络的自适应同步及其在保密通信中的应用。
IEEE Trans Cybern. 2020 Mar;50(3):911-922. doi: 10.1109/TCYB.2018.2877410. Epub 2018 Nov 13.
2
A novel edge based embedding in medical images based on unique key generated using sudoku puzzle design.一种基于数独谜题设计生成的唯一密钥的医学图像中基于边缘的新型嵌入方法。
Springerplus. 2016 Sep 29;5(1):1670. doi: 10.1186/s40064-016-3356-1. eCollection 2016.
3
A joint encryption/watermarking system for verifying the reliability of medical images.
一种用于验证医学图像可靠性的联合加密/水印系统。
IEEE Trans Inf Technol Biomed. 2012 Sep;16(5):891-9. doi: 10.1109/TITB.2012.2207730. Epub 2012 Jul 10.
4
A buyer-seller watermarking protocol.一个买卖双方水印协议。
IEEE Trans Image Process. 2001;10(4):643-9. doi: 10.1109/83.913598.