Skip to main content

Example Based Privacy-Preserving Video Color Grading

  • Chapter
  • First Online:
  • 1290 Accesses

Abstract

The integration of cloud computing and smart multimedia gadgets has made an attractive business model today. However, data privacy is one of the major concern when moving to third party driven infrastructures like cloud. Furthermore, due to diverse camera sensors, the captured multimedia may contain insufficient lightning/colors and processing them manually is a painstakingly task. A few schemes have been proposed to address this problem, however they suffered from the major drawback of computational and storage overhead, and becomes non-trivial in case of videos. Considering these challenges, we propose an automatic video color grading approach in this chapter. The proposed approach enables cloud data center to process encrypted multimedia data by transferring its colors as per an example image as the reference. We analyze the correlation between consecutive video sequences and propose to evaluate the color transformation parameters for every alternate video frame. In addition, proxy encryption based Paillier cryptosystem has been used for video encryption. As a result, the computational and storage overheads are drastically reduced with effective video grading results. The feasibility and robustness of the proposed approach are validated through various tests.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   279.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Barni, M., Bianchi, T., Catalano, D., Di Raimondo, M., Donida Labati, R., Failla, P., Fiore, D., Lazzeretti, R., Piuri, V., Scotti, F. et al. [2010], Privacy-preserving fingercode authentication, in ‘Proceedings of the 12th ACM workshop on Multimedia and security’, ACM, pp. 231–240.

    Google Scholar 

  2. Boneh, D., Goh, E.-J. and Nissim, K. [2005], Evaluating 2-dnf formulas on ciphertexts, in ‘Theory of Cryptography Conference’, Springer, pp. 325–341.

    Google Scholar 

  3. Boneh, D. et al. [ 1999], ‘Twenty years of attacks on the rsa cryptosystem’, Notices of the AMS 46(2), 203–213.

    Google Scholar 

  4. Brakerski, Z. [ 2012], Fully homomorphic encryption without modulus switching from classical gapsvp, in ‘Advances in cryptology–crypto 2012’, Springer, pp. 868–886.

    Google Scholar 

  5. Bresson, E., Catalano, D. and Pointcheval, D. [2003], A simple public-key cryptosystem with a double trapdoor decryption mechanism and its applications, in ‘International Conference on the Theory and Application of Cryptology and Information Security’, Springer, pp. 37–54.

    Google Scholar 

  6. Chan, A. B., Liang, Z.-S. J. and Vasconcelos, N. [2008], Privacy preserving crowd monitoring: Counting people without people models or tracking, in ‘Computer Vision and Pattern Recognition, 2008. CVPR 2008. IEEE Conference on’, IEEE, pp. 1–7.

    Google Scholar 

  7. Chen, X., Huang, X., Li, J., Ma, J., Lou, W. and Wong, D. S. [ 2015], ‘New algorithms for secure outsourcing of large-scale systems of linear equations’, IEEE transactions on information forensics and security 10(1), 69–78.

    Google Scholar 

  8. Coron, J.-S., Mandal, A., Naccache, D. and Tibouchi, M. [ 2011], Fully homomorphic encryption over the integers with shorter public keys, in ‘Annual Cryptology Conference’, Springer, pp. 487–504.

    Google Scholar 

  9. ElGamal, T. [ 1985], ‘A public key cryptosystem and a signature scheme based on discrete logarithms’, IEEE transactions on information theory 31(4), 469–472.

    Article  MathSciNet  Google Scholar 

  10. Erkin, Z., Franz, M., Guajardo, J., Katzenbeisser, S., Lagendijk, I. and Toft, T. [ 2009], Privacy-preserving face recognition, in ‘International Symposium on Privacy Enhancing Technologies’, Springer, pp. 235–253.

    Google Scholar 

  11. Ferreira, B., Rodrigues, J., Leitao, J. and Domingos, H. [ 2015], Privacy-preserving content-based image retrieval in the cloud, in ‘Reliable Distributed Systems (SRDS), 2015 IEEE 34th Symposium on’, IEEE, pp. 11–20.

    Google Scholar 

  12. Gentry, C. [ 2010], ‘Computing arbitrary functions of encrypted data’, Communications of the ACM 53(3), 97–105.

    Article  Google Scholar 

  13. Gentry, C., Halevi, S. and Smart, N. P. [ 2012 a], Better bootstrapping in fully homomorphic encryption, in ‘International Workshop on Public Key Cryptography’, Springer, pp. 1–16.

    Google Scholar 

  14. Gentry, C., Halevi, S. and Smart, N. P. [ 2012 b], Fully homomorphic encryption with polylog overhead, in ‘Annual International Conference on the Theory and Applications of Cryptographic Techniques’, Springer, pp. 465–482.

    Google Scholar 

  15. Gentry, C., Sahai, A. and Waters, B. [2013], Homomorphic encryption from learning with errors: Conceptually-simpler, asymptotically-faster, attribute-based, in ‘Advances in Cryptology–CRYPTO 2013’, Springer, pp. 75–92.

    Google Scholar 

  16. Goldwasser, S. and Micali, S. [ 1982], Probabilistic encryption & how to play mental poker keeping secret all partial information, in ‘Proceedings of the fourteenth annual ACM symposium on Theory of computing’, ACM, pp. 365–377.

    Google Scholar 

  17. Guo, J., Zheng, P. and Huang, J. [2017], ‘An efficient motion detection and tracking scheme for encrypted surveillance videos’, ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM) 13(4), 61.

    Google Scholar 

  18. Halevi, S. and Shoup, V. [ 2014], Algorithms in helib, in ‘International Cryptology Conference’, Springer, pp. 554–571.

    Google Scholar 

  19. Halevi, S. and Shoup, V. [ 2015], Bootstrapping for helib, in ‘Annual International conference on the theory and applications of cryptographic techniques’, Springer, pp. 641–670.

    Google Scholar 

  20. Hsu, C.-Y., Lu, C.-S. and Pei, S.-C. [2012], ‘Image feature extraction in encrypted domain with privacy-preserving sift’, IEEE Transactions on Image Processing 21(11), 4593–4607.

    Article  MathSciNet  Google Scholar 

  21. Hu, X., Zhang, W., Li, K., Hu, H. and Yu, N. [2016], ‘Secure nonlocal denoising in outsourced images’, ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM) 12(3), 40.

    Google Scholar 

  22. Jagannathan, G. and Wright, R. N. [2005], Privacy-preserving distributed k-means clustering over arbitrarily partitioned data, in ‘Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining’, ACM, pp. 593–599.

    Google Scholar 

  23. Jia, L. and Radke, R. J. [ 2014], ‘Using time-of-flight measurements for privacy-preserving tracking in a smart room’, IEEE Transactions on Industrial Informatics 10(1), 689–696.

    Article  Google Scholar 

  24. Jost, C., Lam, H., Maximov, A. and Smeets, B. J. [2015], ‘Encryption performance improvements of the paillier cryptosystem.’, IACR Cryptology ePrint Archive 2015, 864.

    Google Scholar 

  25. Kargupta, H., Datta, S., Wang, Q. and Sivakumar, K. [2005], ‘Random-data perturbation techniques and privacy-preserving data mining’, Knowledge and Information Systems 7(4), 387–414.

    Article  Google Scholar 

  26. Lathey, A. and Atrey, P. K. [ 2015], ‘Image enhancement in encrypted domain over cloud’, ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM) 11(3), 38.

    Article  Google Scholar 

  27. Lathey, A., Atrey, P. K. and Joshi, N. [2013], Homomorphic low pass filtering on encrypted multimedia over cloud, in ‘IEEE Seventh International Conference on Semantic Computing (ICSC)’, IEEE, pp. 310–313.

    Google Scholar 

  28. Marwan, M., Kartit, A. and Ouahmane, H. [2018], ‘Security enhancement in healthcare cloud using machine learning’, Procedia Computer Science 127, 388–397.

    Article  Google Scholar 

  29. Mohanty, M., Asghar, M. R. and Russello, G. [2016], ‘2dcrypt: Image scaling and cropping in encrypted domains’, IEEE Transactions on Information Forensics and Security 11(11), 2542–2555.

    Article  Google Scholar 

  30. Mohanty, M., Ooi, W. T. and Atrey, P. K. [ 2013 a], Scale me, crop me, knowme not: Supporting scaling and cropping in secret image sharing, in ‘IEEE International Conference on Multimedia and Expo (ICME)’, IEEE, pp. 1–6.

    Google Scholar 

  31. Mohanty, M., Ooi, W. T. and Atrey, P. K. [ 2013 b], Secure cloud-based volume ray-casting, in ‘International Conference on Cloud Computing Technology and Science (CloudCom)’, Vol. 1, IEEE, pp. 531–538.

    Google Scholar 

  32. Paillier, P. [ 1999], Public-key cryptosystems based on composite degree residuosity classes, in ‘International Conference on the Theory and Applications of Cryptographic Techniques’, Springer, pp. 223–238.

    Google Scholar 

  33. Rahulamathavan, Y., Phan, R. C.-W., Chambers, J. A. and Parish, D. J. [ 2013], ‘Facial expression recognition in the encrypted domain based on local fisher discriminant analysis’, IEEE Transactions on Affective Computing 4(1), 83–92.

    Article  Google Scholar 

  34. Rahulamathavan, Y., Veluru, S., Phan, R. C.-W., Chambers, J. A. and Rajarajan, M. [ 2014], ‘Privacy-preserving clinical decision support system using gaussian kernel-based classification’, IEEE journal of biomedical and health informatics 18(1), 56–66.

    Article  Google Scholar 

  35. Rajput, A. S. and Raman, B. [ 2017], Color me, store me, know me not: Supporting image color transfer and storage in encrypted domain over cloud, in ‘International Conference on Multimedia & Expo Workshops (ICMEW)’, IEEE, pp. 291–296.

    Google Scholar 

  36. Rajput, A. S. and Raman, B. [ 2018 a], ‘Cloud based image color transfer and storage in encrypted domain’, Multimedia Tools and Applications. https://doi.org/10.1007/s11042-017-5580-2 pp. 1–29.

    Article  Google Scholar 

  37. Rajput, A. S. and Raman, B. [ 2018 b], ‘Cryptoct: towards privacy preserving color transfer and storage over cloud’, Multimedia Tools and Applications. https://doi.org/10.1007/s11042-018-5729-7 pp. 1–23.

    Article  Google Scholar 

  38. Rane, S. and Boufounos, P. T. [ 2013], ‘Privacy-preserving nearest neighbor methods: Comparing signals without revealing them’, IEEE Signal Processing Magazine 30(2), 18–28.

    Article  Google Scholar 

  39. Reinhard, E., Adhikhmin, M., Gooch, B. and Shirley, P. [ 2001], ‘Color transfer between images’, IEEE Computer graphics and applications 21(5), 34–41.

    Article  Google Scholar 

  40. Rivest, R. L., Shamir, A. and Adleman, L. [1978], ‘A method for obtaining digital signatures and public-key cryptosystems’, Communications of the ACM 21(2), 120–126.

    Article  MathSciNet  Google Scholar 

  41. Shamir, A. [ 1979], ‘How to share a secret’, Communications of the ACM 22(11), 612–613.

    Article  MathSciNet  Google Scholar 

  42. Singh, P., Agarwal, N. and Raman, B. [2018], ‘Secure data deduplication using secret sharing schemes over cloud’, Future Generation Computer Systems.

    Google Scholar 

  43. Singh, P., Raman, B., Agarwal, N. and Atrey, P. K. [2017], ‘Secure cloud-based image tampering detection and localization using pob number system’, ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM) 13(3), 23.

    Google Scholar 

  44. Van Dijk, M., Gentry, C., Halevi, S. and Vaikuntanathan, V. [ 2010], Fully homomorphic encryption over the integers, in ‘Annual International Conference on the Theory and Applications of Cryptographic Techniques’, Springer, pp. 24–43.

    Google Scholar 

  45. Wang, Q., He, M., Du, M., Chow, S. S., Lai, R. W. and Zou, Q. [ 2016], ‘Searchable encryption over feature-rich data’, IEEE Transactions on Dependable and Secure Computing.

    Google Scholar 

  46. Weng, L., Amsaleg, L., Morton, A. and Marchand-Maillet, S. [ 2015], ‘A privacy-preserving framework for large-scale content-based information retrieval’, IEEE Transactions on Information Forensics and Security 10(1), 152–167.

    Article  Google Scholar 

  47. Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X. and Ren, K. [ 2016], ‘A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing’, IEEE Transactions on Information Forensics and Security 11(11), 2594–2608.

    Article  Google Scholar 

  48. Yagisawa, M. [ 2015], ‘Fully homomorphic encryption without bootstrapping.’, IACR Cryptology ePrint Archive 2015, 474.

    Google Scholar 

  49. Yakubu, A. M., Maddage, N. C. and Atrey, P. K. [2017], ‘Securing speech noise reduction in outsourced environment’, ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM) 13(4), 51.

    Google Scholar 

  50. Yakubu, M. A., Maddage, N. C. and Atrey, P. K. [2016], Encrypted domain cloud-based speech noise reduction with comb filter, in ‘Multimedia & Expo Workshops (ICMEW), 2016 IEEE International Conference on’, IEEE, pp. 1–6.

    Google Scholar 

  51. Yao, A. C. [ 1982], Protocols for secure computations, in ‘23rd Annual Symposium on Foundations of Computer Science’, IEEE, pp. 160–164.

    Google Scholar 

  52. Zhou, J., Cao, Z., Dong, X. and Lin, X. [2015], ‘Ppdm: A privacy-preserving protocol for cloud-assisted e-healthcare systems’, IEEE Journal of Selected Topics in Signal Processing 9(7), 1332–1344.

    Article  Google Scholar 

Download references

Acknowledgement

This work was supported by Information Security Education and Awareness (ISEA) Project (phase II), Deity, Government of India.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Amitesh Singh Rajput .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Rajput, A.S., Raman, B. (2019). Example Based Privacy-Preserving Video Color Grading. In: Singh, A., Mohan, A. (eds) Handbook of Multimedia Information Security: Techniques and Applications. Springer, Cham. https://doi.org/10.1007/978-3-030-15887-3_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-15887-3_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-15886-6

  • Online ISBN: 978-3-030-15887-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics