CryptoCT: towards privacy preserving color transfer and storage over cloud

Article
  • 36 Downloads

Abstract

Current trend toward cloud computing coupled with emerging technologies such as high definition images/videos and 360-degree videos, has led the requirement of performing color transfer remotely by third party servers. However, users are always concerned about storing and processing their personal images over the cloud. Addressing this problem, we propose CryptoCT, a novel approach for privacy preserving color transfer and storage over third party cloud infrastructures. Paillier cryptosystem is employed in a manner that secret images can be processed for color transfer without revealing any information. Unlike the previous methods which involve multiple cloud servers, we use a single cloud server to accomplish the task of encrypted domain color transfer. We show that same color transfer effects as of the existing methods in plain domain are achieved in encrypted domain using our approach. To the best of our knowledge, CryptoCT is among the first known ventures to perform the task of color transfer in encrypted domain. Experimental results and security analysis validates the correctness of our approach.

Keywords

Color transfer Homomorphic encryption Encrypted domain processing Cloud computing 

Notes

Acknowledgements

This work was supported by Information Security Education and Awareness (ISEA) Project (phase II), Deity, Government of INDIA.

Compliance with Ethical Standards

Conflict of interests

All authors declare that they have no conflicts of interest regarding the publication of this manuscript.

References

  1. 1.
    Accelerate your business with fast, engaging images. imgix. https://www.imgix.com. Accessed 24 Nov 2017
  2. 2.
    Aljawarneh S (2011) A web engineering security methodology for e-learning systems. Netw Secur 2011(3):12–15CrossRefGoogle Scholar
  3. 3.
    Aljawarneh SA, Yassein MOB (2016) A conceptual security framework for cloud computing issues. Int J Intell Inf Technol (IJIIT) 12(2):12–24CrossRefGoogle Scholar
  4. 4.
    Aljawarneh SA, Moftah RA, Maatuk AM (2016) Investigations of automatic methods for detecting the polymorphic worms signatures. Futur Gener Comput Syst 60:67–77CrossRefGoogle Scholar
  5. 5.
    Aljawarneh SA, Alawneh A, Jaradat R (2017) Cloud security engineering: early stages of sdlc. Futur Gener Comput Syst 74:385–392CrossRefGoogle Scholar
  6. 6.
    Aljawarneh S, Yassein MB et al (2017) A resource-efficient encryption algorithm for multimedia big data. Multimedia Tools and Applications 76(21):22703–22724CrossRefGoogle Scholar
  7. 7.
    Ayoup AM, Hussein AH, Attia MA (2016) Efficient selective image encryption. Multimedia Tools and Applications 75(24):17,171–17,186CrossRefGoogle Scholar
  8. 8.
    Benaloh JC (1988) Verifiable secret-ballot elections. PhD Thesis, Yale UniversityGoogle Scholar
  9. 9.
    Chu KY, Kuo YH, Hsu WH (2013) Real-time privacy-preserving moving object detection in the cloud. In: Proceedings of the 21st ACM international conference on multimedia. ACM, pp 597–600Google Scholar
  10. 10.
    Finlayson GD, Mackiewicz M, Hurlbert A (2015) Color correction using root-polynomial regression. IEEE Trans Image Process 24(5):1460–1470MathSciNetCrossRefGoogle Scholar
  11. 11.
    Guesmi R, Farah M, Kachouri A, Samet M (2016) A novel chaos-based image encryption using dna sequence operation and secure hash algorithm sha-2. Nonlinear Dynamics 83(3):1123–1136MathSciNetCrossRefMATHGoogle Scholar
  12. 12.
    Guesmi R, Farah MAB, Kachouri A, Samet M (2016) Hash key-based image encryption using crossover operator and chaos. Multimedia Tools and Applications 75 (8):4753–4769CrossRefMATHGoogle Scholar
  13. 13.
    Hu X, Zhang W, Li K, Hu H, Yu N (2016) Secure nonlocal denoising in outsourced images. ACM Trans Multimed Comput Commun Appl (TOMM) 12(3):40Google Scholar
  14. 14.
    Hwang Y, Lee JY, So Kweon I, Joo Kim S (2014) Color transfer using probabilistic moving least squares. In: Proceedings of the IEEE conference on computer vision and pattern recognition (CVPR), pp 3342–3349Google Scholar
  15. 15.
    I. Skiljan.irfanview. http://www.irfanview.com. Accessed 26 April 2017
  16. 16.
    Image and video management in the cloud. cloudinary. https://cloudinary.com/. Accessed 24 Nov 2017
  17. 17.
    Image processing service for developers. blitline. https://www.blitline.com/v3/home. Accessed 24 Nov 2017
  18. 18.
    Karim MSA, Wong K (2014) Universal data embedding in encrypted domain. Signal Process 94:174–182CrossRefGoogle Scholar
  19. 19.
    Lathey A, Atrey PK (2015) Image enhancement in encrypted domain over cloud. ACM Trans Multimed Comput Commun Appl (TOMM) 11(3):38Google Scholar
  20. 20.
    Martin D, Fowlkes C, Tal D, Malik J (2001) A database of human segmented natural images and its application to evaluating segmentation algorithms and measuring ecological statistics. In: Proceedings of eighth IEEE international conference on computer vision (ICCV), vol 2. IEEE, pp 416–423Google Scholar
  21. 21.
    Mohanty M, Ooi WT, Atrey PK (2013) Scale me, crop me, knowme not: supporting scaling and cropping in secret image sharing. In: IEEE International conference on multimedia and expo (ICME). IEEE, pp 1–6Google Scholar
  22. 22.
    Mohanty M, Ooi WT, Atrey PK (2016) Secret sharing approach for securing cloud-based pre-classification volume ray-casting. Multimedia Tools and Applications 75(11):6207–6235CrossRefGoogle Scholar
  23. 23.
    Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. In: International conference on the theory and applications of cryptographic techniques. Springer, pp 223–238Google Scholar
  24. 24.
    Parvin Z, Seyedarabi H, Shamsi M (2016) A new secure and sensitive image encryption scheme based on new substitution with chaotic function. Multimedia Tools and Applications 75(17):10,631–10,648CrossRefGoogle Scholar
  25. 25.
    Rabin J, Ferradans S, Papadakis N (2014) Adaptive color transfer with relaxed optimal transport. In: International conference on image processing (ICIP). IEEE, pp 4852–4856Google Scholar
  26. 26.
    Rajput AS, Raman B (2017) Color me, store me, know me not: supporting image color transfer and storage in encrypted domain over cloud. In: International conference on multimedia & expo workshops (ICMEW). IEEE, pp 291–296Google Scholar
  27. 27.
    Reinhard E, Adhikhmin M, Gooch B, Shirley P (2001) Color transfer between images. IEEE Comput Graph Appl 21(5):34–41CrossRefGoogle Scholar
  28. 28.
    Rezai A, Keshavarzi P (2011) High-performance modular exponentiation algorithm by using a new modified modular multiplication algorithm and common-multiplicand-multiplication method. In: World congress on internet security (worldCIS). IEEE, pp 192–197Google Scholar
  29. 29.
    Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613MathSciNetCrossRefMATHGoogle Scholar
  30. 30.
    Song ZC, Liu SG (2017) Sufficient image appearance transfer combining color and texture. IEEE Transactions on Multimedia 19(4):702–711CrossRefGoogle Scholar
  31. 31.
    Soumya T, Thampi SM (2015) Day color transfer based night video enhancement for surveillance system. In: IEEE international conference on signal processing, informatics, communication and energy systems (SPICES). IEEE, pp 1–5Google Scholar
  32. 32.
    Strecha C, Von Hansen W, Van Gool L, Fua P, Thoennessen U (2008) On benchmarking camera calibration and multi-view stereo for high resolution imagery. In: IEEE conference on computer vision and pattern recognition (CVPR). IEEE, pp 1–8Google Scholar
  33. 33.
    Teng L, Wang X (2012) A bit-level image encryption algorithm based on spatiotemporal chaotic system and self-adaptive. Opt Commun 285(20):4048–4054CrossRefGoogle Scholar
  34. 34.
    The dangers of trusting cloud computing over personal storage. forbes. https://www.forbes.com/sites/ewanspence/2015/06/01/the-dangers-of-trusting-cloud-computing-over-personal-storage/72ad475b4cd9. Accessed 24 Nov 2017
  35. 35.
    Wang X, Jin C (2012) Image encryption using game of life permutation and pwlcm chaotic system. Opt Commun 285(4):412–417CrossRefGoogle Scholar
  36. 36.
    We handle files, so you don’t have to. uploadcare. https://uploadcare.com/. Accessed 24 Nov 2017
  37. 37.
    We optimize your images and accelerate your websites. kraken. https://kraken.io/. Accessed 24 Nov 2017
  38. 38.
    Wong WK, Cheung DWl, Kao B, Mamoulis N (2009) Secure knn computation on encrypted databases. In: Proceedings of the 2009 ACM SIGMOD international conference on management of data. ACM, pp 139–152Google Scholar
  39. 39.
    Xiao Y, Wan L, Leung CS, Lai YK, Wong TT (2013) Example-based color transfer for gradient meshes. IEEE Transactions on Multimedia 15(3):549–560CrossRefGoogle Scholar
  40. 40.
    Xu W, Mulligan J (2010) Performance evaluation of color correction approaches for automatic multi-view image and video stitching. In: Conference on computer vision and pattern recognition (CVPR). IEEE, pp 263–270Google Scholar
  41. 41.
    Zhang S, Gao T (2016) An image encryption scheme based on dna coding and permutation of hyper-image. Multimedia Tools and Applications 75(24):17,157–17,170CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Department of Computer Science & EngineeringIndian Institute of Technology RoorkeeRoorkeeIndia

Personalised recommendations