Abstract
In image sharing schemes, the privacy of shared images can be protected by sending encrypted images to the receiver. However, the decrypted image cannot avoid being illegally distributed by receivers for their own benefits. Some methods have been proposed to solve this problem by embedding query user’s identification into the image. However, spatial domain embedding are usually vulnerable to attacks, such as Least Significant Bit (LSB) replacement attacks. We propose a privacy-preserving image sharing scheme for detecting illegal distributors based on edge detection and Arnold transformation. This scheme can adaptively embed the query user’s authentication information into 1 to 5 LSBs of each pixel of the image according to the embedded position map. After receiving the scrambled encrypted image and embedded position map, the cloud server will generate the embedded value map and embed in the encrypted domain. The image owner can identify the distributor’s identification with the help of cloud server when a suspected illegally distributed image is found. The scheme is robust under different attacks as shown by experiments.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Wang, T., Ke, H.X., Wang, K., Sangaiah, A.K., Liu, A.F.: Big data cleaning based on mobile edge computing in industrial sensor-cloud. IEEE Trans. Ind. Inform. 16(2), 1321–1329 (2020)
Xiong, J.B., Bi, R.W., Zhao, M.F., Guo, J.D., Yang, Q.: Edge-assisted privacy-preserving raw data sharing framework for connected autonomous vehicles. IEEE Wirel. Commun. 27(3), 24–30 (2020)
Yuan, L., Korshunov, P., Ebrahimi, T.: Secure JPEG scrambling enabling privacy in photo sharing. In: Proceedings of the 11th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition, pp. 1–6. IEEE Computer Society (2015)
Amato, F., Moscato, V., Picariello, A.: SOS: a multimedia recommender system for online social networks. Future Gener. Comput. Syst. 93, 914–923 (2019)
Sun, W., Zhou, J., Zhu, S., Tang, Y.Y.: Robust privacy-preserving image sharing over online social networks. ACM Trans. Multimed. Comput. Commun. Appl. 14(1), 14:1–14:22 (2018)
Li, X., Li, J., Yiu, S., Gao, C., Xiong, J.: Privacy-preserving edge-assisted image retrieval and classification in IoT. Front. Comput. Sci. 13(5), 1136–1147 (2018). https://doi.org/10.1007/s11704-018-8067-z
Xia, Z.H., Wang, X.H., Zhang, L.G., Qin, Z., Sun, X.M., Ren, K.: A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans. Inf. Forensics Secur. 11(11), 2594–2608 (2011)
Khan, A., Siddiqa, A., Munib, S., Malik, S.A.: A recent survey of reversible watermarking techniques. Inf. Sci. 279, 251–272 (2014)
Wu, H.T., Huang, J., Shi, Y.Q.: A reversible data hiding method with contrast enhancement for medical images. J. Vis. Commun. Image Represent. 31, 146–153 (2015)
Qian, Z., Zhang, X.P.: Reversible data hiding in encrypted images with distributed source encoding. IEEE Trans. Circuits Syst. Video Technol. 26(4), 636–646 (2016)
Zhang, X.P.: Reversible data hiding in encrypted image. IEEE Signal Process. Lett. 18(4), 255–258 (2011)
Puteaux, P., Puech, W.: An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images. IEEE Trans. Inf. Forensics Secur. 13(7), 1670–1681 (2018)
Ferreira, B., Rodrigues, J., Leitao, J., Domingos, H.: Privacy-preserving content-based image retrieval in the cloud. IACR Cryptol. ePrint Arch. 2015, 710 (2015)
Zhang, L., et al.: Pic: Enable large-scale privacy preserving content-based image search on cloud[J]. IEEE Trans. Parallel Distrib. Syst. 28(11), 3258–3271 (2017)
Cao, X., Du, L., Wei, X.X., Meng, D., Guo, X.J.: High capacity reversible data hiding in encrypted images by patch-level sparse representation. IEEE Trans. Cybern. 46(5), 1132–1143 (2016)
Ma, K., Zhang, W.M., Zhao, X.F., Yu, N.H., Li, F.H.: Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans. Inf. Forensics Secur. 8(3), 553–562 (2013)
Wu, X.T., Sun, W.: High-capacity reversible data hiding in encrypted images by prediction error. Signal Process. 104, 387–400 (2014)
Acknowledgments
This work is supported by the National Natural Science Foundation of China (61872088, 61872090, 61872086); and the Natural Science Foundation of Fujian Province (2019J01276).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Deng, T., Li, X., Jin, B., Xiong, J. (2021). Who Distributes It? Privacy-Preserving Image Sharing Scheme with Illegal Distribution Detection. In: Wang, G., Chen, B., Li, W., Di Pietro, R., Yan, X., Han, H. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2020. Lecture Notes in Computer Science(), vol 12383. Springer, Cham. https://doi.org/10.1007/978-3-030-68884-4_22
Download citation
DOI: https://doi.org/10.1007/978-3-030-68884-4_22
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-68883-7
Online ISBN: 978-3-030-68884-4
eBook Packages: Computer ScienceComputer Science (R0)