Skip to main content

A Novel Watermark-Based Access Control Model for Digital Imagines

  • Conference paper
  • First Online:
Cloud Computing and Security (ICCCS 2018)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11068))

Included in the following conference series:

  • 1468 Accesses

Abstract

With the development of digital image processing and big data analysis, there exist massive digital images that can be obtained by ordinary online users. However, regarding to the volume of data and the lack of access control embedded within digital images, some images may impose risks of leakage and exposure. Especially, some images need to keep secret totally or at least only can be accessed partially. Those are not be classified and protected with a subtle manner or accessed by fine-grained privileges. In addition, recent most access control strategies separate control lists from accessed objects, so that the execution of access control relies on the networking links to remote servers. Sometimes remote servers may be available, thus the control will be hindered. Moreover, it is not easy to share and distribute a large volume of data together with their access control policies on different servers. In this paper, we propose a novel access control model based on invisible watermarks, where embed access control policies. This model realizes the marriage of accessing objects and access control strategies, and can be delivered together with big data objects such as digital images.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Wang, Y., Doherty, J.F., Dyck, R.E.V.: A wavelet-based watermarking algorithm for ownership verification of digital images. IEEE Trans. Image Process. 11(2), 77–88 (2002). https://doi.org/10.1109/83.982816

    Article  Google Scholar 

  2. Wong, P.W.: A public key watermark for image verification and authentication. In: Proceedings 1998 International Conference on Image Processing, ICIP98 (Cat. No.98CB36269), vol. 1, pp. 455–459 (1998). https://doi.org/10.1109/ICIP.1998.723526

  3. Wolfgang, R.B., Delp, E.J.: A watermark for digital images. In: Proceedings of 3rd IEEE International Conference on Image Processing, vol. 3, pp. 219–222 (1996). https://doi.org/10.1109/ICIP.1996.560423

  4. Lin, E.I., Eskicioglu, A.M., Lagendijk, R.L., Delp, E.J.: Advances in digital video content protection. Proc. IEEE 93(1), 171–183 (2005)

    Article  Google Scholar 

  5. Gholve, N., Sutar, S., Dhokey, S., Hande, S.: Cascaded algorithm: DWT-DCT-SVD in watermarking. Digit. Image Process. 3(13), 814–819 (2011)

    Google Scholar 

  6. Pickering, M., Coria, L.E., Nasiopoulos, P.: A novel blind video watermarking scheme for access control using complex wavelets. In: 2007 Digest of Technical Papers International Conference on Consumer Electronics, pp. 1–2 (2007). https://doi.org/10.1109/ICCE.2007.341545

  7. Coria, L., Nasiopoulos, P., Ward, R., Pickering, M.: An access control video watermarking method that is robust to geometric distortions. In: 2007 2nd International Conference on Digital Information Management, vol. 1, pp. 460–465 (2007). https://doi.org/10.1109/ICDIM.2007.4444266

  8. Liao, K.C., Lee, W.H., Sung, M.H., Lin, T.C.: A one-time password scheme with QR-code based on mobile phone. In: 2009 Fifth International Joint Conference on INC, IMS and IDC, pp. 2069–2071 (2009). https://doi.org/10.1109/NCM.2009.324

  9. Kao, Y.W., Luo, G.H., Lin, H.T., Huang, Y.K., Yuan, S.M.: Physical access control based on QR code. In: 2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, pp. 285–288 (2011). https://doi.org/10.1109/CyberC.2011.55

  10. Liu, Y., Liu, M.: Automatic recognition algorithm of quick response code based on embedded system. In:: Sixth International Conference on Intelligent Systems Design and Applications, vol. 2, pp. 783–788 (2006). https://doi.org/10.1109/ISDA.2006.253712

  11. Melgar, M.E.V., Zaghetto, A., Macchiavello, B., Nascimento, A.C.A.: CQR codes: colored quick-response codes. In: 2012 IEEE Second International Conference on Consumer Electronics - Berlin (ICCE-Berlin), pp. 321–325 (2012). https://doi.org/10.1109/ICCE-Berlin.2012.6336526

Download references

Acknowledgement

This work was supported by the science and technology project of Guangdong Power Grid Co., Ltd, (036000KK52170002).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wenting Jiang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chen, Y., Jiang, W., Kang, Z. (2018). A Novel Watermark-Based Access Control Model for Digital Imagines. In: Sun, X., Pan, Z., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science(), vol 11068. Springer, Cham. https://doi.org/10.1007/978-3-030-00021-9_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00021-9_25

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00020-2

  • Online ISBN: 978-3-030-00021-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics