Skip to main content

Who Distributes It? Privacy-Preserving Image Sharing Scheme with Illegal Distribution Detection

  • Conference paper
  • First Online:
  • 983 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 12383))

Abstract

In image sharing schemes, the privacy of shared images can be protected by sending encrypted images to the receiver. However, the decrypted image cannot avoid being illegally distributed by receivers for their own benefits. Some methods have been proposed to solve this problem by embedding query user’s identification into the image. However, spatial domain embedding are usually vulnerable to attacks, such as Least Significant Bit (LSB) replacement attacks. We propose a privacy-preserving image sharing scheme for detecting illegal distributors based on edge detection and Arnold transformation. This scheme can adaptively embed the query user’s authentication information into 1 to 5 LSBs of each pixel of the image according to the embedded position map. After receiving the scrambled encrypted image and embedded position map, the cloud server will generate the embedded value map and embed in the encrypted domain. The image owner can identify the distributor’s identification with the help of cloud server when a suspected illegally distributed image is found. The scheme is robust under different attacks as shown by experiments.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Wang, T., Ke, H.X., Wang, K., Sangaiah, A.K., Liu, A.F.: Big data cleaning based on mobile edge computing in industrial sensor-cloud. IEEE Trans. Ind. Inform. 16(2), 1321–1329 (2020)

    Article  Google Scholar 

  2. Xiong, J.B., Bi, R.W., Zhao, M.F., Guo, J.D., Yang, Q.: Edge-assisted privacy-preserving raw data sharing framework for connected autonomous vehicles. IEEE Wirel. Commun. 27(3), 24–30 (2020)

    Article  Google Scholar 

  3. Yuan, L., Korshunov, P., Ebrahimi, T.: Secure JPEG scrambling enabling privacy in photo sharing. In: Proceedings of the 11th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition, pp. 1–6. IEEE Computer Society (2015)

    Google Scholar 

  4. Amato, F., Moscato, V., Picariello, A.: SOS: a multimedia recommender system for online social networks. Future Gener. Comput. Syst. 93, 914–923 (2019)

    Article  Google Scholar 

  5. Sun, W., Zhou, J., Zhu, S., Tang, Y.Y.: Robust privacy-preserving image sharing over online social networks. ACM Trans. Multimed. Comput. Commun. Appl. 14(1), 14:1–14:22 (2018)

    Article  Google Scholar 

  6. Li, X., Li, J., Yiu, S., Gao, C., Xiong, J.: Privacy-preserving edge-assisted image retrieval and classification in IoT. Front. Comput. Sci. 13(5), 1136–1147 (2018). https://doi.org/10.1007/s11704-018-8067-z

    Article  Google Scholar 

  7. Xia, Z.H., Wang, X.H., Zhang, L.G., Qin, Z., Sun, X.M., Ren, K.: A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans. Inf. Forensics Secur. 11(11), 2594–2608 (2011)

    Article  Google Scholar 

  8. Khan, A., Siddiqa, A., Munib, S., Malik, S.A.: A recent survey of reversible watermarking techniques. Inf. Sci. 279, 251–272 (2014)

    Article  Google Scholar 

  9. Wu, H.T., Huang, J., Shi, Y.Q.: A reversible data hiding method with contrast enhancement for medical images. J. Vis. Commun. Image Represent. 31, 146–153 (2015)

    Article  Google Scholar 

  10. Qian, Z., Zhang, X.P.: Reversible data hiding in encrypted images with distributed source encoding. IEEE Trans. Circuits Syst. Video Technol. 26(4), 636–646 (2016)

    Article  Google Scholar 

  11. Zhang, X.P.: Reversible data hiding in encrypted image. IEEE Signal Process. Lett. 18(4), 255–258 (2011)

    Article  Google Scholar 

  12. Puteaux, P., Puech, W.: An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images. IEEE Trans. Inf. Forensics Secur. 13(7), 1670–1681 (2018)

    Article  Google Scholar 

  13. Ferreira, B., Rodrigues, J., Leitao, J., Domingos, H.: Privacy-preserving content-based image retrieval in the cloud. IACR Cryptol. ePrint Arch. 2015, 710 (2015)

    Google Scholar 

  14. Zhang, L., et al.: Pic: Enable large-scale privacy preserving content-based image search on cloud[J]. IEEE Trans. Parallel Distrib. Syst. 28(11), 3258–3271 (2017)

    Article  Google Scholar 

  15. Cao, X., Du, L., Wei, X.X., Meng, D., Guo, X.J.: High capacity reversible data hiding in encrypted images by patch-level sparse representation. IEEE Trans. Cybern. 46(5), 1132–1143 (2016)

    Article  Google Scholar 

  16. Ma, K., Zhang, W.M., Zhao, X.F., Yu, N.H., Li, F.H.: Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans. Inf. Forensics Secur. 8(3), 553–562 (2013)

    Article  Google Scholar 

  17. Wu, X.T., Sun, W.: High-capacity reversible data hiding in encrypted images by prediction error. Signal Process. 104, 387–400 (2014)

    Article  Google Scholar 

Download references

Acknowledgments

This work is supported by the National Natural Science Foundation of China (61872088, 61872090, 61872086); and the Natural Science Foundation of Fujian Province (2019J01276).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xuan Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Deng, T., Li, X., Jin, B., Xiong, J. (2021). Who Distributes It? Privacy-Preserving Image Sharing Scheme with Illegal Distribution Detection. In: Wang, G., Chen, B., Li, W., Di Pietro, R., Yan, X., Han, H. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2020. Lecture Notes in Computer Science(), vol 12383. Springer, Cham. https://doi.org/10.1007/978-3-030-68884-4_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-68884-4_22

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-68883-7

  • Online ISBN: 978-3-030-68884-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics