Zhen Yang1,2, Yongfeng Huang1,2,*, Xing Li1,2, Wenyu Wang3
CMC-Computers, Materials & Continua, Vol.56, No.1, pp. 1-17, 2018, DOI:10.3970/cmc.2018.03697
Abstract To cope with privacy leakage caused by multimedia outsourcing and sharing, data provenance is used to analyze leaked multimedia and provide reactive accountability. Existing schemes of multimedia provenance are based on watermarking protocols. In an outsourcing scenario, existing schemes face two severe challenges: 1) when data leakage occurs, there exists a probability that data provenance results can be repudiated, in which case data provenance tracking fails; and 2) when outsourced data are shared, data encryption transfer causes key management burden outside the schemes, and privacy leakage threatens users. In this paper, we propose a novel More >