Abstract
With the rapid advancement of cloud computing, the use of third-party cloud datacenters for storing and processing (e.g, scaling and cropping) personal and critical images is becoming more common. For storage and bandwidth efficiency, the images are almost always compressed. Although cloud-based imaging has many advantages, security and privacy remain major issues. One way to address these two issues is to use Shamir’s (k, n) secret sharing-based secret image sharing schemes, which can distribute the secret image among n number of participants in such a way that no less than k (where k ≤ n) participants can know the image content. Existing secret image sharing schemes do not allow processing of a compressed image in the hidden domain. In this paper, we propose a scheme that can scale and crop a CDF (Cohen Daubechies Feauveau) wavelet-based compressed image (such as JPEG2000) in the encrypted domain by smartly applying secret sharing on the wavelet coefficients. Results and analyses show that our scheme is highly secure and has acceptable computational and data overheads.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Sertel, O., Kong, J., Shimada, H., et al.: Computer-aided prognosis of neuroblastoma on whole-slide images: classification of stromal development. Pattern Recognization 42, 1093–1103 (2009)
Medical imaging in the cloud. Online Report (2012), http://www.corp.att.com/healthcare/docs/medical_imaging_cloud.pdf
Mohanty, M., Ooi, W.T., Atrey, P.K.: Scale me, crop me, know me not: Supporting scaling and cropping in secret image sharing. In: Proceedings of the 2013 IEEE International Conference on Multimedia & Expo, San Jose, USA (2013)
Tsai, M.-H., Chen, C.-C.: A study on secret image sharing. In: Proceedings of the 6th International Workshop on Image Media Quality and its Applications, Tokyo, Japan (2013)
Shamir, A.: How to share a secret. Communication of the ACM 22, 612–613 (1979)
Thien, C.-C., Lin, J.-C.: Secret image sharing. Computers & Graphics 26, 765–770 (2002)
Bai, L.: A reliable (k, n) image secret sharing scheme. In: Second IEEE International Symposium on Dependable, Autonomic and Secure Computing, Indianapolis, USA, pp. 31–36 (2006)
Li, L., El-Latif, A.A.A.: A novel secret image sharing scheme based on chaotic system. In: Proceedings of SPIE Fourth International Conference on Digital Image Processing, Kuala Lumpur, Malaysia (2012)
Ulutas, M., Ulutas, G., Nabiyev, V.V.: Medical image security and EPR hiding using Shamir’s secret sharing scheme. Journal of Systems and Software 84, 341–353 (2011)
Alharthi, S.S., Atrey, P.K.: Further improvements on secret image sharing scheme. In: Proceedings of the 2nd ACM Workshop on Multimedia in Forensics, Security and Intelligence, Firenze, Italy, pp. 53–58 (2010)
Engel, D., Stütz, T., Uhl, A.: A survey on JPEG2000 encryption. Multimedia Systems 15(4), 243–270 (2009)
Martin, K., Lukac, R., Plataniotis, K.N.: Efficient encryption of wavelet-based coded color images. Pattern Recognition 38(7), 1111–1115 (2005)
Seo, Y.-H., Kim, D.-W., Yoo, J.-S., Dey, S., Agrawal, A.: Wavelet domain image encryption by subband selection and data bit selection. In: Proceedings of the World Wireless Congress, San Francisco, USA (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Kansal, K., Mohanty, M., Atrey, P.K. (2015). Scaling and Cropping of Wavelet-Based Compressed Images in Hidden Domain. In: He, X., Luo, S., Tao, D., Xu, C., Yang, J., Hasan, M.A. (eds) MultiMedia Modeling. MMM 2015. Lecture Notes in Computer Science, vol 8935. Springer, Cham. https://doi.org/10.1007/978-3-319-14445-0_37
Download citation
DOI: https://doi.org/10.1007/978-3-319-14445-0_37
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-14444-3
Online ISBN: 978-3-319-14445-0
eBook Packages: Computer ScienceComputer Science (R0)