{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T15:40:35Z","timestamp":1760197235618,"version":"build-2065373602"},"reference-count":23,"publisher":"MDPI AG","issue":"8","license":[{"start":{"date-parts":[[2018,7,29]],"date-time":"2018-07-29T00:00:00Z","timestamp":1532822400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100018533","name":"Major Scientific and Technological Special Project of Guizhou Province","doi-asserted-by":"publisher","award":["20183001"],"award-info":[{"award-number":["20183001"]}],"id":[{"id":"10.13039\/501100018533","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Guizhou Provincial Key Laboratory of Public Big Data","award":["2017BDKFJJ006"],"award-info":[{"award-number":["2017BDKFJJ006"]}]},{"name":"Hubei Provincial Key Laboratory of Intelligent Geo-Information Processing","award":["KLIGIP2016A05"],"award-info":[{"award-number":["KLIGIP2016A05"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>When large images are used for big data analysis, they impose new challenges in protecting image privacy. For example, a geographic image may consist of several sensitive areas or layers. When it is uploaded into servers, the image will be accessed by diverse subjects. Traditional access control methods regulate access privileges to a single image, and their access control strategies are stored in servers, which imposes two shortcomings: (1) fine-grained access control is not guaranteed for areas\/layers in a single image that need to maintain secret for different roles; and (2) access control policies that are stored in servers suffers from multiple attacks (e.g., transferring attacks). In this paper, we propose a novel watermark-based access control model in which access control policies are associated with objects being accessed (called an in-situ model). The proposed model integrates access control policies as watermarks within images, without relying on the availability of servers or connecting networks. The access control for images is still maintained even though images are redistributed again to further subjects. Therefore, access control policies can be delivered together with the big data of images. Moreover, we propose a hierarchical key-role-area model for fine-grained encryption, especially for large size images such as geographic maps. The extensive analysis justifies the security and performance of the proposed model.<\/jats:p>","DOI":"10.3390\/fi10080069","type":"journal-article","created":{"date-parts":[[2018,7,30]],"date-time":"2018-07-30T11:55:08Z","timestamp":1532951708000},"page":"69","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Watermark-Based In-Situ Access Control Model for Image Big Data"],"prefix":"10.3390","volume":"10","author":[{"given":"Jinyi","family":"Guo","sequence":"first","affiliation":[{"name":"School of Computer Science, China University of Geosciences, Wuhan 430074, China"},{"name":"Hubei Key Laboratory of Intelligent Geo-Information Processing, China University of Geosciences (Wuhan), Wuhan 430074, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8590-1737","authenticated-orcid":false,"given":"Wei","family":"Ren","sequence":"additional","affiliation":[{"name":"School of Computer Science, China University of Geosciences, Wuhan 430074, China"},{"name":"Hubei Key Laboratory of Intelligent Geo-Information Processing, China University of Geosciences (Wuhan), Wuhan 430074, China"},{"name":"Guizhou Provincial Key Laboratory of Public Big Data, GuiZhou University, Guizhou 550025, China"}]},{"given":"Yi","family":"Ren","sequence":"additional","affiliation":[{"name":"School of Computing Science, University of East Anglia, Norwich NR4 7TJ, UK"}]},{"given":"Tianqing","family":"Zhu","sequence":"additional","affiliation":[{"name":"School of Software, University of Technology Sydney, Ultimo, Sydney, NSW 2007, Australia"}]}],"member":"1968","published-online":{"date-parts":[[2018,7,29]]},"reference":[{"key":"ref_1","unstructured":"(2018, June 20). Facebook Says Cambridge Analytica May Have Gained 37 m More Users\u2019 Data. Available online: https:\/\/www.theguardian.com\/technology\/2018\/apr\/04\/facebook-cambridge-analytica-user-data-latest-more-than-thought."},{"key":"ref_2","unstructured":"Xiong, H., Choo, K.K.R., and Vasilakos, A.V. (2017). Revocable Identity-Based Access Control for Big Data with Verifiable Outsourced Computing. IEEE Trans. Big Data, 99."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Xiao, M., Wang, M., Liu, X., and Sun, J. (May, January 26). Efficient distributed access control for big data in clouds. Proceedings of the 2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Hong Kong, China.","DOI":"10.1109\/INFCOMW.2015.7179385"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1109\/83.982816","article-title":"A wavelet-based watermarking algorithm for ownership verification of digital images","volume":"11","author":"Wang","year":"2002","journal-title":"IEEE Trans. Image Process."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"1121","DOI":"10.1016\/S0165-1684(01)00037-8","article-title":"The role of information theory in watermarking and its application to image watermarking","volume":"81","author":"Moulin","year":"2001","journal-title":"Signal Process."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Gunjan, R., Laxmi, V., and Gaur, M.S. (2012, January 25\u201327). Detection attack analysis using partial watermark in DCT domain. Proceedings of the Fifth International Conference on Security of Information and Networks, New York, NY, USA.","DOI":"10.1145\/2388576.2388605"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Wolfgang, R.B., and Delp, E.J. (1996, January 19). A watermark for digital images. Proceedings of the 3rd IEEE International Conference on Image Processing, Lausanne, Switzerland.","DOI":"10.1109\/ICIP.1996.560423"},{"key":"ref_8","unstructured":"Wong, P.W. (1998, January 4\u20137). A public key watermark for image verification and authentication. Proceedings of the 1998 International Conference on Image Processing (ICIP98) (Cat. No.98CB36269), Chicago, IL, USA."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Kountchev, R., Milanova, M., and Kountcheva, R. (2015, January 2\u20134). Content protection and hierarchical access control in image databases. Proceedings of the 2015 International Symposium on Innovations in Intelligent SysTems and Applications (INISTA), Madrid, Spain.","DOI":"10.1109\/INISTA.2015.7276730"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"1725","DOI":"10.1007\/s11042-013-1714-3","article-title":"A secure removable visible watermarking for BTC compressed images","volume":"76","author":"Yang","year":"2015","journal-title":"Multimed. Tools Appl."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Phadikar, A., Maity, S.P., and Delpha, C. (2011, January 11\u201315). Data hiding for quality access control and error concealment in digital images. Proceedings of the 2011 IEEE International Conference on Multimedia and Expo, Barcelona, Spain.","DOI":"10.1109\/ICME.2011.6012132"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Phadikar, A., and Maity, S.P. (2008, January 8\u201310). A Cost Effective Scheme for Content Verification and Access Control of Quality of an Image. Proceedings of the 2008 IEEE Region 10 and the Third international Conference on Industrial and Information Systems, Kharagpur, India.","DOI":"10.1109\/ICIINFS.2008.4798419"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"649","DOI":"10.1007\/s11042-011-0969-9","article-title":"Partial encryption and watermarking scheme for audio files with controlled degradation of quality","volume":"64","author":"Datta","year":"2013","journal-title":"Multimed. Tools Appl."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Asikuzzaman, M., and Pickering, M.R. (2017). An Overview of Digital Video Watermarking. IEEE Trans. Circuits Syst. Video Technol., 99.","DOI":"10.1109\/TCSVT.2017.2712162"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1559\/15230406382201","article-title":"Planetary Map Data Model for Geologic Mapping","volume":"38","author":"Nass","year":"2011","journal-title":"Cartogr. Geogr. Inf. Sci."},{"key":"ref_16","unstructured":"Han-fa, X., Bing-liang, C., and Li-lin, X. (2010, January 28\u201331). An Mixed Access control method Based on Trust and Role. Proceedings of the 2010 Second IITA International Conference on Geoscience and Remote Sensing, Qingdao, China."},{"key":"ref_17","unstructured":"Kim, J., Jeong, D., and Baik, D.K. (2009, January 10\u201314). A Multi-layer based Access Control Model for GIS Mobile Web Services. Proceedings of the 2009 Digest of Technical Papers International Conference on Consumer Electronics, Las Vegas, NV, USA."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Kirkpatrick, M.S., Damiani, M.L., and Bertino, E. (2011, January 1\u20134). Prox-RBAC: A proximity-based spatially aware RBAC. Proceedings of the 19th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, New York, NY, USA.","DOI":"10.1145\/2093973.2094018"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Ma, F., Gao, Y., Yan, M., Xu, F., and Liu, D. (2010, January 18\u201320). The fine-grained security access control of spatial data. Proceedings of the 2010 18th International Conference on Geoinformatics, Beijing, China.","DOI":"10.1109\/GEOINFORMATICS.2010.5567713"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"478","DOI":"10.23919\/TST.2017.8030537","article-title":"Conflict Analysis and Detection Based on Model Checking for Spatial Access Control Policy","volume":"22","author":"Zhang","year":"2017","journal-title":"Tsinghua Sci. Technol."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Kao, Y.W., Luo, G.H., Lin, H.T., Huang, Y.K., and Yuan, S.M. (2011, January 10\u201312). Physical Access Control Based on QR Code. Proceedings of the 2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, Beijing, China.","DOI":"10.1109\/CyberC.2011.55"},{"key":"ref_22","unstructured":"Melgar, M.E.V., Zaghetto, A., Macchiavello, B., and Nascimento, A.C. (2012, January 3\u20135). CQR codes: Colored quick-response codes. Proceedings of the 2012 IEEE Second International Conference on Consumer Electronics-Berlin (ICCE-Berlin), Berlin, Germany."},{"key":"ref_23","unstructured":"(2018, June 20). Available online:, Available online: https:\/\/zhfw.tianditu.gov.cn\/."}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/10\/8\/69\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T15:15:06Z","timestamp":1760195706000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/10\/8\/69"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,29]]},"references-count":23,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2018,8]]}},"alternative-id":["fi10080069"],"URL":"https:\/\/doi.org\/10.3390\/fi10080069","relation":{},"ISSN":["1999-5903"],"issn-type":[{"type":"electronic","value":"1999-5903"}],"subject":[],"published":{"date-parts":[[2018,7,29]]}}}