Skip to main content
Log in

Obfuscated volume rendering

  • Original Article
  • Published:
The Visual Computer Aims and scope Submit manuscript

Abstract

Analyzing and processing various data types in a privacy-preserving perspective has been researched in many disciplines; however, such an issue draws very limited attention in the research field of scientific visualization. We wondered if it is possible to delegate the rendering of a volume data set to a remote server(s) while still being able to preserve its privacy to certain extent. This paper presents a block-based volume data transformation algorithm that obfuscates a volume data set so as to reduce the user’s privacy concern when the volume data set is to be uploaded to a remote server. In addition, a privacy-aware transfer function adjustment is proposed so that not only the privacy is protected during the rendering process, but also the computational loading could be leveraged to the server side as much as possible. Experimental results show that the proposed method yields visually satisfactory results compared with a normal direct volume rendering approach. Moreover, the decrease of the rendering efficiency caused by the proposed method is still controlled within an acceptable range. A case study proves that the proposed approach can be adopted in practice. This work explores the possibility of rendering a volume data set through remote server(s) while the privacy of data is still maintained.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Chu, K.Y., Kuo, Y.H., Hsu, W.H.: Real-time privacy-preserving moving object detection in the cloud. In: Proceedings of the 21st ACM International Conference on Multimedia, MM ’13, pp. 597–600 (2013)

  2. Dasgupta, A., Kosara, R.: Adaptive privacy-preserving visualization using parallel coordinates. IEEE Trans. Vis. Comput. Graph. 17(12), 2241–2248 (2011)

    Article  Google Scholar 

  3. Dasgupta, A., Kosara, R.: Privacy-preserving data visualization using parallel coordinates, pp. 78,680O–1–78,680O–12 (2011)

  4. Demaine, E.D., Demaine, M.L.: Jigsaw puzzles, edge matching, and polyomino packing: connections and complexity. Graphs Comb. 23, 195–208 (2007)

    Article  MathSciNet  MATH  Google Scholar 

  5. Devore, J.L.: Probability and statistics for engineering and the sciences, 2nd edn. Brooks/Cole Publishing Company, USA (1987)

    MATH  Google Scholar 

  6. Erkin, Z., Piva, A., Katzenbeisser, S., Lagendijk, R.L., Shokrollahi, J., Neven, G., Barni, M.: Protection and retrieval of encrypted multimedia content: when cryptography meets signal processing. EURASIP J. Inf. Secur. 7(2), 1–20 (2007)

    Article  Google Scholar 

  7. Fontaine, C., Galand, F.: A survey of homomorphic encryption for nonspecialists. EURASIP J. Inf. Secur (2007)

  8. Gautam, A., Panwar, M., Gupta, P.: A new image encryption approach using block based transformation algorithm. Int. J. Adv. Eng. Sci. Technol. 8(1), 90–96 (2011)

    Google Scholar 

  9. Gentry, C.: Computing arbitrary functions of encrypted data. Commun. ACM 53(3), 97–105 (2010)

    Article  MATH  Google Scholar 

  10. Jolfaei, A., Mirghadri, A.: An image encryption approach using chaos and stream cipher. J. Theor. Appl. Inf. Technol. 19(2), 117–125 (2010)

    Google Scholar 

  11. Koller, D., Turitzin, M., Levoy, M., Tarini, M., Croccia, G., Cignoni, P., Scopigno, R.: Protected interactive 3d graphics via remote rendering. ACM Trans. Graph. 23(3), 695–703 (2004). doi:10.1145/1015706.1015782

    Article  Google Scholar 

  12. Levoy, M.: Display of surfaces from volume data. IEEE Comput. Graph. Appl. 8(3), 29–37 (1988)

    Article  Google Scholar 

  13. Lin, S.C., Lin, K.J., Hsiao, I.T., Hsieh, C.J., Lin, W.Y., Lu, C.S., Wey, S.P., Yen, T.C., Kung, M.P., Weng, Y.H.: In vivo detection of monoaminergic degeneration in early Parkinson disease by 18F-9-fluoropropyl-(+)-dihydrotetrabenzazine PET. J. Nucl. Med. 55(1), 73–79 (2013)

    Article  Google Scholar 

  14. Liu, W., Zhao, C.: Digital watermarking for volume data based on 3D-DWT and 3D-DCT. In: Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human, ICIS ’09, pp. 352–357 (2009)

  15. Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: l-diversity: privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data 1(1) (2007)

  16. Melchor, C.A., Fau, S., Fontaine, C., Gogniat, G., Sirdey, R.: Recent advances in homomorphic encryption: a possible future for signal processing in the encrypted domain. IEEE Signal Process. Mag. 30(2), 108–117 (2013)

    Article  Google Scholar 

  17. Mitra, A., Rao, Y.V.S., Prasanna, S.R.M.: A new image encryption approach using combinational permutation techniques. J. Comput. Sci. 1(1), 127–131 (2006)

    Google Scholar 

  18. Mohanty, M., Atrey, P., Ooi, W.T.: Secure cloud-based medical data visualization. In: Proceedings of the 20th ACM International Conference on Multimedia, MM ’12, pp. 1105–1108 (2012)

  19. Mohanty, M., Ooi, W.T., Atrey, P.K.: Secure cloud-based volume ray-casting. CloudCom 1, 531–538 (2013)

    Google Scholar 

  20. Naehrig, M., Lauter, K., Vaikuntanathan, V.: Can homomorphic encryption be practical? In: Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop, CCSW ’11, pp. 113–124 (2011)

  21. Pitman, J.: Probability. Springer (texts in statistics) (1993)

  22. Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)

    Article  MathSciNet  MATH  Google Scholar 

  23. Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 10(5), 557–570 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  24. Wu, Y., Guan, X., Kankanhalli, M.S., Huang, Z.: Robust invisible watermarking of volume data using the 3D DCT. In: Computer Graphics International 2001, CGI ’01, pp. 359–362 (2001)

  25. Yao, A.C.: Protocols for secure computations. In: Proceedings of the 23rd Annual Symposium on Foundations of Computer Science, SFCS ’82, pp. 160–164 (1982)

  26. Younes, M.A.B., Jantan, A.: An image encryption approach using a combination of permutation technique followed by encryption. Int. J. Comput. Sci. Netw. Secur. 8(4), 191–197 (2008)

    Google Scholar 

Download references

Acknowledgments

This paper is partially sponsored by the Ministry of Science and Technology, Taiwan (Grant Number: 104-2917-I-564-068 and 101-2221-E-011-150-MY3). The authors thank the anonymous reviewers for providing helpful comments to make this paper better presented. The authors would also like to thank professor Kwan-Liu Ma and his research team at UC Davis for providing the volume rendering toolkit to help the authors have a good head start. Thanks Nick Leaf and Hendrik Schroots for proof-reading the paper. In addition, the authors also thank professor Ing-Tsung Hsiao from Chang Gung University for providing his expertise to help us conduct and verify the case study.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jia-Kai Chou.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Funding

This study is partially funded by the Ministry of Science and Technology, Taiwan (grant number 104-2917-I-564-068 and 101-2221-E-011-150-MY3).

Electronic supplementary material

Below is the link to the electronic supplementary material.

Supplementary material 1 (pdf 6930 KB)

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chou, JK., Yang, CK. Obfuscated volume rendering. Vis Comput 32, 1593–1604 (2016). https://doi.org/10.1007/s00371-015-1143-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00371-015-1143-6

Keywords

Navigation