Abstract
High end computational and storage resources provided by the cloud based paradigm are attracting the global infrastructure. However, the wide attacking surface of the public cloud may pose threat to security if outsourcing of the multimedia content is done without obscuring. Employing the traditional encryption schemes may serve as a feasible solution. However, processing in the encrypted domain to fetch the same services as plaintext domain may not be possible due to limitations of the encryption schemes. In this article, a secured scheme based on Shamir’s secret sharing and permutation ordered binary (POB) number system for processing of image in encrypted domain itself over the cloud severs has been proposed. Obfuscated shares are obtained by distributing the image information into multiple shares that can be sent and processed in frequency domain over the cloud servers. The performance of various image operations such as denoising, dehazing, edge sharpening, unsharp masking, contrast enhancement, etc has been validated on these encrypted shares in the frequency domain along with the comparative results in the plaintext domain. The processed image can be obtained from these processed shares only by the authentic entity possessing the secret keys.
















Similar content being viewed by others
References
Alharthi SS, Atrey PK (2010) An improved scheme for secret image sharing. In: IEEE International conference on multimedia and expo (ICME), IEEE, pp 1661–1666
Alharthi SS, Atrey PK (2010) Further improvements on secret image sharing scheme. In: Proceedings of the 2nd ACM workshop on multimedia in forensics, security and intelligence (ACM), pp 53–58
Ali M, Khan SU, Vasilakos AV (2015) Security in cloud computing: opportunities and challenges. Inform Sci 305:357–383
Asmuth C, Bloom J (1983) A modular approach to key safeguarding. IEEE Trans Inf Theory 30(2):208
Benaloh JC (1986) Secret sharing homomorphisms: keeping shares of a secret secret Conference on the theory and application of cryptographic techniques. Springer, pp 251–260
Bhatnagar G, Wu QMJ, Raman B (2012) Robust gray-scale logo watermarking in wavelet domain. Comput Electr Eng 38(5):1164. Special issue on recent advances in security and privacy in distributed communications and image processing. ISSN 0045–7906. doi:10.1016/j.compeleceng.2012.02.002
Bogdanov D (2007) Foundations and properties of Shamir’s secret sharing scheme research seminar in cryptography. University of Tartu, Institute of Computer Science
Brakerski Z, Gentry C, Vaikuntanathan V (Leveled) Fully homomorphic encryption without bootstrapping. In: Proceedings of the 3rd innovations in theoretical computer science conference ITCS ’12. ACM, New York, pp 309–325. doi:10.1145/2090236.2090262.
Buyya R, Broberg J, Goscinski A M (2010) Cloud computing: principles and paradigms, vol 87. Wiley
Damgård I, Jurik M (2001) A generalisation, a simplification and some applications of paillier’s probabilistic public-key system. In: Proceedings of the 4th international workshop on practice and theory in public key cryptography: public key cryptography PKC ’01. ISBN 3-540-41658-7. Springer-Verlag, London, pp 119–136
Deepika M, Sreekumar A (2016) A novel secret sharing scheme using POB number system and CRT. Int J Appl Eng Res 11(3):2049–2054
El Gamal T (1985) A public key cryptosystem and a signature scheme based on discrete logarithms. In: Proceedings of CRYPTO 84 on advances in cryptology. ISBN 0-387-15658-5, vol 9. Springer-Verlag New York Inc., New York, pp 10–18
Fontaine C, Galand F (2007) A survey of homomorphic encryption for nonspecialists. EURASIP J Inf Secur 2007(15):1. ISSN 1687–4161. doi:10.1155/2007/13801
Lathey A, Atrey PK (2015) Image enhancement in encrypted domain over cloud. ACM Trans Multimedia Comput Commun Appl 11(3):38:1. doi:10.1145/2656205
Melchor CA, Fau S, Fontaine C, Gogniat G, Sirdey R (2013) Recent advances in homomorphic encryption: a possible future for signal processing in the encrypted domain. IEEE Signal Process Mag 30(2):108
Mignotte M (1982) How to share a secret. In: Workshop on cryptography. Springer, pp 371–375
Mohanty M, Atrey P K, Ooi WT (2012) Secure cloud-based medical data visualization. In: Proceedings of the 20th ACM international conference on multimedia. ACM, pp 1105–1108
Mohanty M, Ooi WT, Atrey PK (2013) Scale me, crop me, knowme not: supporting scaling and cropping in secret image sharing. In: ICME. IEEE Computer Society, pp 1–6
Mohanty M, Ooi WT, Atrey PK (2013) Scale me, crop me, knowme not: supporting scaling and cropping in secret image sharing. In: IEEE international conference on multimedia and expo (ICME). IEEE, pp 1–6
Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. In: Stern J (ed) International conference on the theory and application of cryptographic techniques prague, Czech Republic, May 2–6, 1999 proceedings. Advances in cryptology — EUROCRYPT ’99. Springer Berlin Heidelberg, Berlin, Heidelberg, pp 223–238. doi:10.1007/3-540-48910-X-16 ISBN 978-3-540-48910-8
Rawat S, Raman B (2011) A chaotic system based fragile watermarking scheme for image tamper detection. AEU - Int J Electr Commun 65(10):840–847. doi:10.1016/j.aeue.2011.01.016. Cited By 0
SaghaianNejadEsfahani SM, Luo Y, Sen-ching SC (2012) Privacy protected image denoising with secret shares. In: 2012 19th IEEE international conference on image processing. IEEE, pp 253–256
Shamir A (1979) How to share a secret. Commun ACM 22(11):612
Sheikh LCHR, Wang Z, Bovik A. http://live.ece.utexas.edu/research/quality
Sreekumar A, Sundar SB (2009) An efficient secret sharing scheme for n out of n scheme using POB-number system. Hack 2009:33
Thien CC, Lin JC (2002) Secret image sharing. Comput Graph 26(5):765
Upmanyu M, Namboodiri AM, Srinathan K, Jawahar CV (2009) Efficient privacy preserving video surveillance. In: ICCV. IEEE Computer Society, pp 1639–1646
van Dijk M, Gentry C, Halevi S, Vaikuntanathan V (2010) Fully homomorphic encryption over the integers. Springer Berlin Heidelberg, Berlin, Heidelberg, pp 24–43. doi:10.1007/978-3-642-13190-5-2
Zhao B, Delp EJ (2011) Secret sharing in the encrypted domain with secure comparison. In: Global telecommunications conference (GLOBECOM 2011). IEEE, pp 1–5
Acknowledgements
This work was supported by Information Security Education and Awareness (ISEA) Project (phase II) MIT-867-CSE, DeitY, New Delhi, INDIA.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Singh, P., Raman, B. & Misra, M. Just process me, without knowing me: a secure encrypted domain processing based on Shamir secret sharing and POB number system. Multimed Tools Appl 77, 12581–12605 (2018). https://doi.org/10.1007/s11042-017-4906-4
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-017-4906-4