Skip to main content

Scaling and Cropping of Wavelet-Based Compressed Images in Hidden Domain

  • Conference paper
MultiMedia Modeling (MMM 2015)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 8935))

Included in the following conference series:

Abstract

With the rapid advancement of cloud computing, the use of third-party cloud datacenters for storing and processing (e.g, scaling and cropping) personal and critical images is becoming more common. For storage and bandwidth efficiency, the images are almost always compressed. Although cloud-based imaging has many advantages, security and privacy remain major issues. One way to address these two issues is to use Shamir’s (k, n) secret sharing-based secret image sharing schemes, which can distribute the secret image among n number of participants in such a way that no less than k (where k ≤ n) participants can know the image content. Existing secret image sharing schemes do not allow processing of a compressed image in the hidden domain. In this paper, we propose a scheme that can scale and crop a CDF (Cohen Daubechies Feauveau) wavelet-based compressed image (such as JPEG2000) in the encrypted domain by smartly applying secret sharing on the wavelet coefficients. Results and analyses show that our scheme is highly secure and has acceptable computational and data overheads.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Sertel, O., Kong, J., Shimada, H., et al.: Computer-aided prognosis of neuroblastoma on whole-slide images: classification of stromal development. Pattern Recognization 42, 1093–1103 (2009)

    Article  Google Scholar 

  2. Medical imaging in the cloud. Online Report (2012), http://www.corp.att.com/healthcare/docs/medical_imaging_cloud.pdf

  3. Mohanty, M., Ooi, W.T., Atrey, P.K.: Scale me, crop me, know me not: Supporting scaling and cropping in secret image sharing. In: Proceedings of the 2013 IEEE International Conference on Multimedia & Expo, San Jose, USA (2013)

    Google Scholar 

  4. Tsai, M.-H., Chen, C.-C.: A study on secret image sharing. In: Proceedings of the 6th International Workshop on Image Media Quality and its Applications, Tokyo, Japan (2013)

    Google Scholar 

  5. Shamir, A.: How to share a secret. Communication of the ACM 22, 612–613 (1979)

    Article  MATH  MathSciNet  Google Scholar 

  6. Thien, C.-C., Lin, J.-C.: Secret image sharing. Computers & Graphics 26, 765–770 (2002)

    Article  Google Scholar 

  7. Bai, L.: A reliable (k, n) image secret sharing scheme. In: Second IEEE International Symposium on Dependable, Autonomic and Secure Computing, Indianapolis, USA, pp. 31–36 (2006)

    Google Scholar 

  8. Li, L., El-Latif, A.A.A.: A novel secret image sharing scheme based on chaotic system. In: Proceedings of SPIE Fourth International Conference on Digital Image Processing, Kuala Lumpur, Malaysia (2012)

    Google Scholar 

  9. Ulutas, M., Ulutas, G., Nabiyev, V.V.: Medical image security and EPR hiding using Shamir’s secret sharing scheme. Journal of Systems and Software 84, 341–353 (2011)

    Article  Google Scholar 

  10. Alharthi, S.S., Atrey, P.K.: Further improvements on secret image sharing scheme. In: Proceedings of the 2nd ACM Workshop on Multimedia in Forensics, Security and Intelligence, Firenze, Italy, pp. 53–58 (2010)

    Google Scholar 

  11. Engel, D., Stütz, T., Uhl, A.: A survey on JPEG2000 encryption. Multimedia Systems 15(4), 243–270 (2009)

    Article  Google Scholar 

  12. Martin, K., Lukac, R., Plataniotis, K.N.: Efficient encryption of wavelet-based coded color images. Pattern Recognition 38(7), 1111–1115 (2005)

    Article  MATH  Google Scholar 

  13. Seo, Y.-H., Kim, D.-W., Yoo, J.-S., Dey, S., Agrawal, A.: Wavelet domain image encryption by subband selection and data bit selection. In: Proceedings of the World Wireless Congress, San Francisco, USA (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Kansal, K., Mohanty, M., Atrey, P.K. (2015). Scaling and Cropping of Wavelet-Based Compressed Images in Hidden Domain. In: He, X., Luo, S., Tao, D., Xu, C., Yang, J., Hasan, M.A. (eds) MultiMedia Modeling. MMM 2015. Lecture Notes in Computer Science, vol 8935. Springer, Cham. https://doi.org/10.1007/978-3-319-14445-0_37

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-14445-0_37

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-14444-3

  • Online ISBN: 978-3-319-14445-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics