Cloud based image color transfer and storage in encrypted domain



Cloud infrastructures are developed and maintained by third parties and users are always concerned about processing and storing their data over the cloud. Recent technologies such as high definition and 360-degree images/videos require efficient color processing, and current trend towards the cloud computing has initiated a necessity of performing color transfer remotely by untrusted third party servers. Nowadays, this field is emerging fast due to its inherent potential and research work in this direction is highly demanded. To address this necessity, we present a system that addresses the challenge of performing privacy preserving color transfer over third party servers. We use a one-dimensional chaotic logistic map coupled with ramp secret sharing scheme in a manner that secret images can be stored and processed for color transfer in the encrypted domain. Experimental results and security analysis demonstrate effectiveness of the approach against existing techniques of color transfer as well as image encryption.


Color transfer Encrypted domain processing Cloud computing 



This work was supported by Information Security Education and Awareness (ISEA) Project (phase II), Deity, Government of INDIA.

Compliance with Ethical Standards

Conflict of interests

All authors declare that they have no conflicts of interest regarding the publication of this manuscript.


  1. 1.
    I. Skiljan.irfanview Accessed: 2017-04-26
  2. 2.
    Iitr-tennis court dataset Accessed: 2017-05-09
  3. 3.
    Inria person dataset Accessed: 2017-05-11
  4. 4.
    Al-Otaibi NA, Gutub AA (2014) 2-leyer security system for hiding sensitive text data on personal computers. Lect NoteS Inform Theory 2:151–157Google Scholar
  5. 5.
    Al-Otaibi NA, Gutub AA (2014) Flexible stego-system for hiding text in images of personal computers based on user security priority. In: International conference on advanced engineering technologies (AET-2014), pp 250–256Google Scholar
  6. 6.
    Alassaf N, Alkazemi B, Gutub A (2003) Applicable light-weight cryptography to secure medical data in iot systems. ArabiaGoogle Scholar
  7. 7.
    Alotaibi N, Gutub A, Khan E (2015) Stego-system for hiding text in images of personal computers. In: The 12th learning and technology conference: Wearable tech/wearable learningGoogle Scholar
  8. 8.
    Amini A, Jamil N, Ahmad A, Z’aba M (2015) Threat modeling approaches for securing cloud computing. J Appl Sci 15(7):953CrossRefGoogle Scholar
  9. 9.
    Finlayson GD, Mackiewicz M, Hurlbert A (2015) Color correction using root-polynomial regression. IEEE Trans Image Process 24(5):1460–1470MathSciNetCrossRefGoogle Scholar
  10. 10.
    Fu C, Chen JJ, Zou H, Meng WH, Zhan YF, Yu YW (2012) A chaos-based digital image encryption scheme with an improved diffusion strategy. Optics Express 20(3):2363–2378CrossRefGoogle Scholar
  11. 11.
    Gutub AAA et al (2010) Pixel indicator technique for rgb image steganography. Journal of Emerging Technologies in Web Intelligence 2(1):56–64Google Scholar
  12. 12.
    Gutub AAA, Khan FAA (2012) Hybrid crypto hardware utilizing symmetric-key and public-key cryptosystems. In: International conference on advanced computer science applications and technologies (ACSAT), pp 116–121. IEEEGoogle Scholar
  13. 13.
    Gutub A, Ankeer M, Abu-Ghalioun M, Shaheen A, Alvi A (2008) Pixel indicator high capacity technique for rgb image based steganography. In: International conference on advanced computer science applications and technologies (ACSAT)Google Scholar
  14. 14.
    Hsu CY, Lu CS, Pei SC (2012) Image feature extraction in encrypted domain with privacy-preserving sift. IEEE Trans Image Process 21(11):4593–4607MathSciNetCrossRefMATHGoogle Scholar
  15. 15.
    Khan F, Gutub AAA (2007) Message concealment techniques using image based steganography. IEEEGCC 2007Google Scholar
  16. 16.
    Lathey A, Atrey PK (2015) Image enhancement in encrypted domain over cloud. ACM Trans Multimed Comput Commun Appl (TOMM) 11(3):38Google Scholar
  17. 17.
    Lu H, Li Y, Serikawa S (2013) Underwater image enhancement using guided trigonometric bilateral filter and fast automatic color correction. In: 20Th IEEE international conference on image processing (ICIP), pp 3412–3416. IEEEGoogle Scholar
  18. 18.
    Ly DS, Beucher S, Bilodeau M (2014) Color correction through region matching leveraged by point correspondences. In: IEEE International conference on image processing (ICIP), pp 640–644 . IEEEGoogle Scholar
  19. 19.
    Martin D, Fowlkes C, Tal D, Malik J (2001) A database of human segmented natural images and its application to evaluating segmentation algorithms and measuring ecological statistics. In: 8th IEEE international conference on computer vision, 2001 (ICCV), vol 2, pp 416–423. IEEEGoogle Scholar
  20. 20.
    Mohanty M, Ooi WT, Atrey PK (2013) Scale me, crop me, knowme not: Supporting scaling and cropping in secret image sharing. In: IEEE international conference on multimedia and expo (ICME), pp 1–6. IEEEGoogle Scholar
  21. 21.
    Nanda H, Cutler R (2001) Practical calibrations for a real-time digital omnidirectional camera. CVPR Technical Sketch 20:1–4. IEEEGoogle Scholar
  22. 22.
    Pareek NK, Patidar V, Sud KK (2013) Diffusion–substitution based gray image encryption scheme. Digital signal processing 23(3):894–901MathSciNetCrossRefGoogle Scholar
  23. 23.
    Pitié F, Kokaram AC, Dahyot R (2007) Automated colour grading using colour distribution transfer. Comput Vis Image Underst 107(1):123–137CrossRefGoogle Scholar
  24. 24.
    Rahulamathavan Y, Phan RCW, Chambers JA, Parish DJ (2013) Facial expression recognition in the encrypted domain based on local fisher discriminant analysis. IEEE Trans Affect Comput 4(1):83– 92CrossRefGoogle Scholar
  25. 25.
    Rajput AS, Raman B (2017) Color me, store me, know me not: Supporting image color transfer and storage in encrypted domain over cloud. In: IEEE International conference on multimedia & expo workshops (ICMEW), pp 291–296. IEEEGoogle Scholar
  26. 26.
    Reinhard E, Adhikhmin M, Gooch B, Shirley P (2001) Color transfer between images. IEEE Comput Graph Appl 21(5):34–41CrossRefGoogle Scholar
  27. 27.
    Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613MathSciNetCrossRefMATHGoogle Scholar
  28. 28.
    Soares LF, Fernandes DA, Freire MM, Inácio PR (2013) Secure user authentication in cloud computing management interfaces. In: 32nd IEEE international performance computing and communications conference (IPCCC), pp 1–2. IEEEGoogle Scholar
  29. 29.
    Tai YW, Jia J, Tang CK (2005) Local color transfer via probabilistic segmentation by expectation-maximization. In: IEEE computer society conference on computer vision and pattern recognition (CVPR), vol 1, pp 747–754. IEEEGoogle Scholar
  30. 30.
    Teng L, Wang X (2012) A bit-level image encryption algorithm based on spatiotemporal chaotic system and self-adaptive. Opt Commun 285(20):4048–4054CrossRefGoogle Scholar
  31. 31.
    Thien CC, Lin JC (2002) Secret image sharing. Comput Graph 26(5):765–770CrossRefGoogle Scholar
  32. 32.
    Uyttendaele M, Eden A, Skeliski R (2001) Eliminating ghosting and exposure artifacts in image mosaics. In: IEEE Computer society conference on computer vision and pattern recognition (CVPR), vol 2, pp II–II. IEEEGoogle Scholar
  33. 33.
    Wang X, Jin C (2012) Image encryption using game of life permutation and pwlcm chaotic system. Opt Commun 285(4):412–417CrossRefGoogle Scholar
  34. 34.
    Wu Y, Yang G, Jin H, Noonan JP (2012) Image encryption using the two-dimensional logistic chaotic map. Journal of Electronic Imaging 21(1):013,014–1CrossRefGoogle Scholar
  35. 35.
    Xiang Y, Zou B, Li H (2009) Selective color transfer with multi-source images. Pattern Recogn Lett 30(7):682–689CrossRefGoogle Scholar
  36. 36.
    Xu W, Mulligan J (2010) Performance evaluation of color correction approaches for automatic multi-view image and video stitching. In: IEEE conference on computer vision and pattern recognition (CVPR), pp 263–270. IEEEGoogle Scholar
  37. 37.
    Yan WQ, Kankanhalli MS (2015) Face search in encrypted domain. In: Pacific-rim symposium on image and video technology, pp 775–790. SpringerGoogle Scholar
  38. 38.
    Zafar F, Khan A, Malik SUR, Ahmed M, Anjum A, Khan MI, Javed N, Alam M, Jamil F (2017) A survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trends. Computers & Security 65:29–49CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Department of Computer Science & EngineeringIndian Institute of Technology RoorkeeRoorkeeIndia

Personalised recommendations