Hierarchical Encryption of Multimedia Contents for Access Control

An encryption scheme is proposed that considers hierarchies in media, such as text, images, sound, and so on, in a composite multimedia content to enable versatile access control. In the proposed scheme, a content provider has only one managed key (the master key) for a particular multimedia content...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Fujiyoshi, M., Saitou, W., Watanabe, O., Kiya, H.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 1980
container_issue
container_start_page 1977
container_title
container_volume
creator Fujiyoshi, M.
Saitou, W.
Watanabe, O.
Kiya, H.
description An encryption scheme is proposed that considers hierarchies in media, such as text, images, sound, and so on, in a composite multimedia content to enable versatile access control. In the proposed scheme, a content provider has only one managed key (the master key) for a particular multimedia content, and an user who is permitted to access a reserved content objects in the composite content receives only one key that is subordinately generated from the master key. The key generated from the identical master key is delivered to another user, and this permits the user to access different objects. This scheme introduces a new key concept, namely "unusable key", to keep all objects encrypted in a particular medium and to simultaneously decrypt several objects in other media. The other new key, "numbering key," is also used in this scheme to support simultaneous partial decryption of multiple images that are coded with scalable coding technology. Simulation results show the effectiveness of the proposed scheme.
doi_str_mv 10.1109/ICIP.2006.312885
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_4106945</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4106945</ieee_id><sourcerecordid>4106945</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-f1e67ef4d886ff2d0a399b6332e1369e2811d597a723b871e15213957c929fa13</originalsourceid><addsrcrecordid>eNpVjktLw0AURscXGGv3gpv8gcR755GZWYbQ2kBFF7ou0-QOjqRJmYmL_ntF3bj64Bw4fIzdIZSIYB_apn0pOUBVCuTGqDO2tNqg5FKCNAjnLOPCYGGUtBf_HIhLlqHivJDGwDW7SekDgAMKzFi9CRRd7N5D54Z8NXbxdJzDNOaTz58-hzkcqA8ub6ZxpnFOuZ9iXncdpfTD4jTcsivvhkTLv12wt_XqtdkU2-fHtqm3RUCt5sIjVZq87I2pvOc9OGHtvhKCE4rKEjeIvbLaaS72RiN9P0Zhle4st96hWLD7324got0xhoOLp51EqKxU4gv4FU1U</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Hierarchical Encryption of Multimedia Contents for Access Control</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Fujiyoshi, M. ; Saitou, W. ; Watanabe, O. ; Kiya, H.</creator><creatorcontrib>Fujiyoshi, M. ; Saitou, W. ; Watanabe, O. ; Kiya, H.</creatorcontrib><description>An encryption scheme is proposed that considers hierarchies in media, such as text, images, sound, and so on, in a composite multimedia content to enable versatile access control. In the proposed scheme, a content provider has only one managed key (the master key) for a particular multimedia content, and an user who is permitted to access a reserved content objects in the composite content receives only one key that is subordinately generated from the master key. The key generated from the identical master key is delivered to another user, and this permits the user to access different objects. This scheme introduces a new key concept, namely "unusable key", to keep all objects encrypted in a particular medium and to simultaneously decrypt several objects in other media. The other new key, "numbering key," is also used in this scheme to support simultaneous partial decryption of multiple images that are coded with scalable coding technology. Simulation results show the effectiveness of the proposed scheme.</description><identifier>ISSN: 1522-4880</identifier><identifier>ISBN: 9781424404803</identifier><identifier>ISBN: 1424404800</identifier><identifier>EISSN: 2381-8549</identifier><identifier>EISBN: 9781424404810</identifier><identifier>EISBN: 1424404819</identifier><identifier>DOI: 10.1109/ICIP.2006.312885</identifier><language>eng</language><publisher>IEEE</publisher><subject>Access control ; Content management ; Cryptography ; Image coding ; Internet ; MPEG 4 Standard ; Multimedia communication ; Multimedia systems ; Permission ; Protection ; Scalability ; Videos</subject><ispartof>2006 International Conference on Image Processing, 2006, p.1977-1980</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4106945$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4106945$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Fujiyoshi, M.</creatorcontrib><creatorcontrib>Saitou, W.</creatorcontrib><creatorcontrib>Watanabe, O.</creatorcontrib><creatorcontrib>Kiya, H.</creatorcontrib><title>Hierarchical Encryption of Multimedia Contents for Access Control</title><title>2006 International Conference on Image Processing</title><addtitle>ICIP</addtitle><description>An encryption scheme is proposed that considers hierarchies in media, such as text, images, sound, and so on, in a composite multimedia content to enable versatile access control. In the proposed scheme, a content provider has only one managed key (the master key) for a particular multimedia content, and an user who is permitted to access a reserved content objects in the composite content receives only one key that is subordinately generated from the master key. The key generated from the identical master key is delivered to another user, and this permits the user to access different objects. This scheme introduces a new key concept, namely "unusable key", to keep all objects encrypted in a particular medium and to simultaneously decrypt several objects in other media. The other new key, "numbering key," is also used in this scheme to support simultaneous partial decryption of multiple images that are coded with scalable coding technology. Simulation results show the effectiveness of the proposed scheme.</description><subject>Access control</subject><subject>Content management</subject><subject>Cryptography</subject><subject>Image coding</subject><subject>Internet</subject><subject>MPEG 4 Standard</subject><subject>Multimedia communication</subject><subject>Multimedia systems</subject><subject>Permission</subject><subject>Protection</subject><subject>Scalability</subject><subject>Videos</subject><issn>1522-4880</issn><issn>2381-8549</issn><isbn>9781424404803</isbn><isbn>1424404800</isbn><isbn>9781424404810</isbn><isbn>1424404819</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2006</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpVjktLw0AURscXGGv3gpv8gcR755GZWYbQ2kBFF7ou0-QOjqRJmYmL_ntF3bj64Bw4fIzdIZSIYB_apn0pOUBVCuTGqDO2tNqg5FKCNAjnLOPCYGGUtBf_HIhLlqHivJDGwDW7SekDgAMKzFi9CRRd7N5D54Z8NXbxdJzDNOaTz58-hzkcqA8ub6ZxpnFOuZ9iXncdpfTD4jTcsivvhkTLv12wt_XqtdkU2-fHtqm3RUCt5sIjVZq87I2pvOc9OGHtvhKCE4rKEjeIvbLaaS72RiN9P0Zhle4st96hWLD7324got0xhoOLp51EqKxU4gv4FU1U</recordid><startdate>200610</startdate><enddate>200610</enddate><creator>Fujiyoshi, M.</creator><creator>Saitou, W.</creator><creator>Watanabe, O.</creator><creator>Kiya, H.</creator><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope></search><sort><creationdate>200610</creationdate><title>Hierarchical Encryption of Multimedia Contents for Access Control</title><author>Fujiyoshi, M. ; Saitou, W. ; Watanabe, O. ; Kiya, H.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-f1e67ef4d886ff2d0a399b6332e1369e2811d597a723b871e15213957c929fa13</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2006</creationdate><topic>Access control</topic><topic>Content management</topic><topic>Cryptography</topic><topic>Image coding</topic><topic>Internet</topic><topic>MPEG 4 Standard</topic><topic>Multimedia communication</topic><topic>Multimedia systems</topic><topic>Permission</topic><topic>Protection</topic><topic>Scalability</topic><topic>Videos</topic><toplevel>online_resources</toplevel><creatorcontrib>Fujiyoshi, M.</creatorcontrib><creatorcontrib>Saitou, W.</creatorcontrib><creatorcontrib>Watanabe, O.</creatorcontrib><creatorcontrib>Kiya, H.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Xplore</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Fujiyoshi, M.</au><au>Saitou, W.</au><au>Watanabe, O.</au><au>Kiya, H.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Hierarchical Encryption of Multimedia Contents for Access Control</atitle><btitle>2006 International Conference on Image Processing</btitle><stitle>ICIP</stitle><date>2006-10</date><risdate>2006</risdate><spage>1977</spage><epage>1980</epage><pages>1977-1980</pages><issn>1522-4880</issn><eissn>2381-8549</eissn><isbn>9781424404803</isbn><isbn>1424404800</isbn><eisbn>9781424404810</eisbn><eisbn>1424404819</eisbn><abstract>An encryption scheme is proposed that considers hierarchies in media, such as text, images, sound, and so on, in a composite multimedia content to enable versatile access control. In the proposed scheme, a content provider has only one managed key (the master key) for a particular multimedia content, and an user who is permitted to access a reserved content objects in the composite content receives only one key that is subordinately generated from the master key. The key generated from the identical master key is delivered to another user, and this permits the user to access different objects. This scheme introduces a new key concept, namely "unusable key", to keep all objects encrypted in a particular medium and to simultaneously decrypt several objects in other media. The other new key, "numbering key," is also used in this scheme to support simultaneous partial decryption of multiple images that are coded with scalable coding technology. Simulation results show the effectiveness of the proposed scheme.</abstract><pub>IEEE</pub><doi>10.1109/ICIP.2006.312885</doi><tpages>4</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1522-4880
ispartof 2006 International Conference on Image Processing, 2006, p.1977-1980
issn 1522-4880
2381-8549
language eng
recordid cdi_ieee_primary_4106945
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Access control
Content management
Cryptography
Image coding
Internet
MPEG 4 Standard
Multimedia communication
Multimedia systems
Permission
Protection
Scalability
Videos
title Hierarchical Encryption of Multimedia Contents for Access Control
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-07T07%3A43%3A31IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Hierarchical%20Encryption%20of%20Multimedia%20Contents%20for%20Access%20Control&rft.btitle=2006%20International%20Conference%20on%20Image%20Processing&rft.au=Fujiyoshi,%20M.&rft.date=2006-10&rft.spage=1977&rft.epage=1980&rft.pages=1977-1980&rft.issn=1522-4880&rft.eissn=2381-8549&rft.isbn=9781424404803&rft.isbn_list=1424404800&rft_id=info:doi/10.1109/ICIP.2006.312885&rft_dat=%3Cieee_6IE%3E4106945%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=9781424404810&rft.eisbn_list=1424404819&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=4106945&rfr_iscdi=true