Hierarchical Encryption of Multimedia Contents for Access Control
An encryption scheme is proposed that considers hierarchies in media, such as text, images, sound, and so on, in a composite multimedia content to enable versatile access control. In the proposed scheme, a content provider has only one managed key (the master key) for a particular multimedia content...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1980 |
---|---|
container_issue | |
container_start_page | 1977 |
container_title | |
container_volume | |
creator | Fujiyoshi, M. Saitou, W. Watanabe, O. Kiya, H. |
description | An encryption scheme is proposed that considers hierarchies in media, such as text, images, sound, and so on, in a composite multimedia content to enable versatile access control. In the proposed scheme, a content provider has only one managed key (the master key) for a particular multimedia content, and an user who is permitted to access a reserved content objects in the composite content receives only one key that is subordinately generated from the master key. The key generated from the identical master key is delivered to another user, and this permits the user to access different objects. This scheme introduces a new key concept, namely "unusable key", to keep all objects encrypted in a particular medium and to simultaneously decrypt several objects in other media. The other new key, "numbering key," is also used in this scheme to support simultaneous partial decryption of multiple images that are coded with scalable coding technology. Simulation results show the effectiveness of the proposed scheme. |
doi_str_mv | 10.1109/ICIP.2006.312885 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_4106945</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4106945</ieee_id><sourcerecordid>4106945</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-f1e67ef4d886ff2d0a399b6332e1369e2811d597a723b871e15213957c929fa13</originalsourceid><addsrcrecordid>eNpVjktLw0AURscXGGv3gpv8gcR755GZWYbQ2kBFF7ou0-QOjqRJmYmL_ntF3bj64Bw4fIzdIZSIYB_apn0pOUBVCuTGqDO2tNqg5FKCNAjnLOPCYGGUtBf_HIhLlqHivJDGwDW7SekDgAMKzFi9CRRd7N5D54Z8NXbxdJzDNOaTz58-hzkcqA8ub6ZxpnFOuZ9iXncdpfTD4jTcsivvhkTLv12wt_XqtdkU2-fHtqm3RUCt5sIjVZq87I2pvOc9OGHtvhKCE4rKEjeIvbLaaS72RiN9P0Zhle4st96hWLD7324got0xhoOLp51EqKxU4gv4FU1U</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Hierarchical Encryption of Multimedia Contents for Access Control</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Fujiyoshi, M. ; Saitou, W. ; Watanabe, O. ; Kiya, H.</creator><creatorcontrib>Fujiyoshi, M. ; Saitou, W. ; Watanabe, O. ; Kiya, H.</creatorcontrib><description>An encryption scheme is proposed that considers hierarchies in media, such as text, images, sound, and so on, in a composite multimedia content to enable versatile access control. In the proposed scheme, a content provider has only one managed key (the master key) for a particular multimedia content, and an user who is permitted to access a reserved content objects in the composite content receives only one key that is subordinately generated from the master key. The key generated from the identical master key is delivered to another user, and this permits the user to access different objects. This scheme introduces a new key concept, namely "unusable key", to keep all objects encrypted in a particular medium and to simultaneously decrypt several objects in other media. The other new key, "numbering key," is also used in this scheme to support simultaneous partial decryption of multiple images that are coded with scalable coding technology. Simulation results show the effectiveness of the proposed scheme.</description><identifier>ISSN: 1522-4880</identifier><identifier>ISBN: 9781424404803</identifier><identifier>ISBN: 1424404800</identifier><identifier>EISSN: 2381-8549</identifier><identifier>EISBN: 9781424404810</identifier><identifier>EISBN: 1424404819</identifier><identifier>DOI: 10.1109/ICIP.2006.312885</identifier><language>eng</language><publisher>IEEE</publisher><subject>Access control ; Content management ; Cryptography ; Image coding ; Internet ; MPEG 4 Standard ; Multimedia communication ; Multimedia systems ; Permission ; Protection ; Scalability ; Videos</subject><ispartof>2006 International Conference on Image Processing, 2006, p.1977-1980</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4106945$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4106945$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Fujiyoshi, M.</creatorcontrib><creatorcontrib>Saitou, W.</creatorcontrib><creatorcontrib>Watanabe, O.</creatorcontrib><creatorcontrib>Kiya, H.</creatorcontrib><title>Hierarchical Encryption of Multimedia Contents for Access Control</title><title>2006 International Conference on Image Processing</title><addtitle>ICIP</addtitle><description>An encryption scheme is proposed that considers hierarchies in media, such as text, images, sound, and so on, in a composite multimedia content to enable versatile access control. In the proposed scheme, a content provider has only one managed key (the master key) for a particular multimedia content, and an user who is permitted to access a reserved content objects in the composite content receives only one key that is subordinately generated from the master key. The key generated from the identical master key is delivered to another user, and this permits the user to access different objects. This scheme introduces a new key concept, namely "unusable key", to keep all objects encrypted in a particular medium and to simultaneously decrypt several objects in other media. The other new key, "numbering key," is also used in this scheme to support simultaneous partial decryption of multiple images that are coded with scalable coding technology. Simulation results show the effectiveness of the proposed scheme.</description><subject>Access control</subject><subject>Content management</subject><subject>Cryptography</subject><subject>Image coding</subject><subject>Internet</subject><subject>MPEG 4 Standard</subject><subject>Multimedia communication</subject><subject>Multimedia systems</subject><subject>Permission</subject><subject>Protection</subject><subject>Scalability</subject><subject>Videos</subject><issn>1522-4880</issn><issn>2381-8549</issn><isbn>9781424404803</isbn><isbn>1424404800</isbn><isbn>9781424404810</isbn><isbn>1424404819</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2006</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpVjktLw0AURscXGGv3gpv8gcR755GZWYbQ2kBFF7ou0-QOjqRJmYmL_ntF3bj64Bw4fIzdIZSIYB_apn0pOUBVCuTGqDO2tNqg5FKCNAjnLOPCYGGUtBf_HIhLlqHivJDGwDW7SekDgAMKzFi9CRRd7N5D54Z8NXbxdJzDNOaTz58-hzkcqA8ub6ZxpnFOuZ9iXncdpfTD4jTcsivvhkTLv12wt_XqtdkU2-fHtqm3RUCt5sIjVZq87I2pvOc9OGHtvhKCE4rKEjeIvbLaaS72RiN9P0Zhle4st96hWLD7324got0xhoOLp51EqKxU4gv4FU1U</recordid><startdate>200610</startdate><enddate>200610</enddate><creator>Fujiyoshi, M.</creator><creator>Saitou, W.</creator><creator>Watanabe, O.</creator><creator>Kiya, H.</creator><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope></search><sort><creationdate>200610</creationdate><title>Hierarchical Encryption of Multimedia Contents for Access Control</title><author>Fujiyoshi, M. ; Saitou, W. ; Watanabe, O. ; Kiya, H.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-f1e67ef4d886ff2d0a399b6332e1369e2811d597a723b871e15213957c929fa13</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2006</creationdate><topic>Access control</topic><topic>Content management</topic><topic>Cryptography</topic><topic>Image coding</topic><topic>Internet</topic><topic>MPEG 4 Standard</topic><topic>Multimedia communication</topic><topic>Multimedia systems</topic><topic>Permission</topic><topic>Protection</topic><topic>Scalability</topic><topic>Videos</topic><toplevel>online_resources</toplevel><creatorcontrib>Fujiyoshi, M.</creatorcontrib><creatorcontrib>Saitou, W.</creatorcontrib><creatorcontrib>Watanabe, O.</creatorcontrib><creatorcontrib>Kiya, H.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Xplore</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Fujiyoshi, M.</au><au>Saitou, W.</au><au>Watanabe, O.</au><au>Kiya, H.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Hierarchical Encryption of Multimedia Contents for Access Control</atitle><btitle>2006 International Conference on Image Processing</btitle><stitle>ICIP</stitle><date>2006-10</date><risdate>2006</risdate><spage>1977</spage><epage>1980</epage><pages>1977-1980</pages><issn>1522-4880</issn><eissn>2381-8549</eissn><isbn>9781424404803</isbn><isbn>1424404800</isbn><eisbn>9781424404810</eisbn><eisbn>1424404819</eisbn><abstract>An encryption scheme is proposed that considers hierarchies in media, such as text, images, sound, and so on, in a composite multimedia content to enable versatile access control. In the proposed scheme, a content provider has only one managed key (the master key) for a particular multimedia content, and an user who is permitted to access a reserved content objects in the composite content receives only one key that is subordinately generated from the master key. The key generated from the identical master key is delivered to another user, and this permits the user to access different objects. This scheme introduces a new key concept, namely "unusable key", to keep all objects encrypted in a particular medium and to simultaneously decrypt several objects in other media. The other new key, "numbering key," is also used in this scheme to support simultaneous partial decryption of multiple images that are coded with scalable coding technology. Simulation results show the effectiveness of the proposed scheme.</abstract><pub>IEEE</pub><doi>10.1109/ICIP.2006.312885</doi><tpages>4</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1522-4880 |
ispartof | 2006 International Conference on Image Processing, 2006, p.1977-1980 |
issn | 1522-4880 2381-8549 |
language | eng |
recordid | cdi_ieee_primary_4106945 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Access control Content management Cryptography Image coding Internet MPEG 4 Standard Multimedia communication Multimedia systems Permission Protection Scalability Videos |
title | Hierarchical Encryption of Multimedia Contents for Access Control |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-07T07%3A43%3A31IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Hierarchical%20Encryption%20of%20Multimedia%20Contents%20for%20Access%20Control&rft.btitle=2006%20International%20Conference%20on%20Image%20Processing&rft.au=Fujiyoshi,%20M.&rft.date=2006-10&rft.spage=1977&rft.epage=1980&rft.pages=1977-1980&rft.issn=1522-4880&rft.eissn=2381-8549&rft.isbn=9781424404803&rft.isbn_list=1424404800&rft_id=info:doi/10.1109/ICIP.2006.312885&rft_dat=%3Cieee_6IE%3E4106945%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=9781424404810&rft.eisbn_list=1424404819&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=4106945&rfr_iscdi=true |