Skip to main content
Log in

Cloud based image color transfer and storage in encrypted domain

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Cloud infrastructures are developed and maintained by third parties and users are always concerned about processing and storing their data over the cloud. Recent technologies such as high definition and 360-degree images/videos require efficient color processing, and current trend towards the cloud computing has initiated a necessity of performing color transfer remotely by untrusted third party servers. Nowadays, this field is emerging fast due to its inherent potential and research work in this direction is highly demanded. To address this necessity, we present a system that addresses the challenge of performing privacy preserving color transfer over third party servers. We use a one-dimensional chaotic logistic map coupled with ramp secret sharing scheme in a manner that secret images can be stored and processed for color transfer in the encrypted domain. Experimental results and security analysis demonstrate effectiveness of the approach against existing techniques of color transfer as well as image encryption.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

References

  1. I. Skiljan.irfanview http://www.irfanview.com. Accessed: 2017-04-26

  2. Iitr-tennis court dataset https://sites.google.com/site/amiteshrajput/. Accessed: 2017-05-09

  3. Inria person dataset http://pascal.inrialpes.fr/data/human/. Accessed: 2017-05-11

  4. Al-Otaibi NA, Gutub AA (2014) 2-leyer security system for hiding sensitive text data on personal computers. Lect NoteS Inform Theory 2:151–157

  5. Al-Otaibi NA, Gutub AA (2014) Flexible stego-system for hiding text in images of personal computers based on user security priority. In: International conference on advanced engineering technologies (AET-2014), pp 250–256

  6. Alassaf N, Alkazemi B, Gutub A (2003) Applicable light-weight cryptography to secure medical data in iot systems. Arabia

  7. Alotaibi N, Gutub A, Khan E (2015) Stego-system for hiding text in images of personal computers. In: The 12th learning and technology conference: Wearable tech/wearable learning

  8. Amini A, Jamil N, Ahmad A, Z’aba M (2015) Threat modeling approaches for securing cloud computing. J Appl Sci 15(7):953

    Article  Google Scholar 

  9. Finlayson GD, Mackiewicz M, Hurlbert A (2015) Color correction using root-polynomial regression. IEEE Trans Image Process 24(5):1460–1470

    Article  MathSciNet  Google Scholar 

  10. Fu C, Chen JJ, Zou H, Meng WH, Zhan YF, Yu YW (2012) A chaos-based digital image encryption scheme with an improved diffusion strategy. Optics Express 20(3):2363–2378

    Article  Google Scholar 

  11. Gutub AAA et al (2010) Pixel indicator technique for rgb image steganography. Journal of Emerging Technologies in Web Intelligence 2(1):56–64

    Google Scholar 

  12. Gutub AAA, Khan FAA (2012) Hybrid crypto hardware utilizing symmetric-key and public-key cryptosystems. In: International conference on advanced computer science applications and technologies (ACSAT), pp 116–121. IEEE

  13. Gutub A, Ankeer M, Abu-Ghalioun M, Shaheen A, Alvi A (2008) Pixel indicator high capacity technique for rgb image based steganography. In: International conference on advanced computer science applications and technologies (ACSAT)

  14. Hsu CY, Lu CS, Pei SC (2012) Image feature extraction in encrypted domain with privacy-preserving sift. IEEE Trans Image Process 21(11):4593–4607

    Article  MathSciNet  MATH  Google Scholar 

  15. Khan F, Gutub AAA (2007) Message concealment techniques using image based steganography. IEEEGCC 2007

  16. Lathey A, Atrey PK (2015) Image enhancement in encrypted domain over cloud. ACM Trans Multimed Comput Commun Appl (TOMM) 11(3):38

    Google Scholar 

  17. Lu H, Li Y, Serikawa S (2013) Underwater image enhancement using guided trigonometric bilateral filter and fast automatic color correction. In: 20Th IEEE international conference on image processing (ICIP), pp 3412–3416. IEEE

  18. Ly DS, Beucher S, Bilodeau M (2014) Color correction through region matching leveraged by point correspondences. In: IEEE International conference on image processing (ICIP), pp 640–644 . IEEE

  19. Martin D, Fowlkes C, Tal D, Malik J (2001) A database of human segmented natural images and its application to evaluating segmentation algorithms and measuring ecological statistics. In: 8th IEEE international conference on computer vision, 2001 (ICCV), vol 2, pp 416–423. IEEE

  20. Mohanty M, Ooi WT, Atrey PK (2013) Scale me, crop me, knowme not: Supporting scaling and cropping in secret image sharing. In: IEEE international conference on multimedia and expo (ICME), pp 1–6. IEEE

  21. Nanda H, Cutler R (2001) Practical calibrations for a real-time digital omnidirectional camera. CVPR Technical Sketch 20:1–4. IEEE

  22. Pareek NK, Patidar V, Sud KK (2013) Diffusion–substitution based gray image encryption scheme. Digital signal processing 23(3):894–901

    Article  MathSciNet  Google Scholar 

  23. Pitié F, Kokaram AC, Dahyot R (2007) Automated colour grading using colour distribution transfer. Comput Vis Image Underst 107(1):123–137

    Article  Google Scholar 

  24. Rahulamathavan Y, Phan RCW, Chambers JA, Parish DJ (2013) Facial expression recognition in the encrypted domain based on local fisher discriminant analysis. IEEE Trans Affect Comput 4(1):83– 92

    Article  Google Scholar 

  25. Rajput AS, Raman B (2017) Color me, store me, know me not: Supporting image color transfer and storage in encrypted domain over cloud. In: IEEE International conference on multimedia & expo workshops (ICMEW), pp 291–296. IEEE

  26. Reinhard E, Adhikhmin M, Gooch B, Shirley P (2001) Color transfer between images. IEEE Comput Graph Appl 21(5):34–41

    Article  Google Scholar 

  27. Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613

    Article  MathSciNet  MATH  Google Scholar 

  28. Soares LF, Fernandes DA, Freire MM, Inácio PR (2013) Secure user authentication in cloud computing management interfaces. In: 32nd IEEE international performance computing and communications conference (IPCCC), pp 1–2. IEEE

  29. Tai YW, Jia J, Tang CK (2005) Local color transfer via probabilistic segmentation by expectation-maximization. In: IEEE computer society conference on computer vision and pattern recognition (CVPR), vol 1, pp 747–754. IEEE

  30. Teng L, Wang X (2012) A bit-level image encryption algorithm based on spatiotemporal chaotic system and self-adaptive. Opt Commun 285(20):4048–4054

    Article  Google Scholar 

  31. Thien CC, Lin JC (2002) Secret image sharing. Comput Graph 26(5):765–770

    Article  Google Scholar 

  32. Uyttendaele M, Eden A, Skeliski R (2001) Eliminating ghosting and exposure artifacts in image mosaics. In: IEEE Computer society conference on computer vision and pattern recognition (CVPR), vol 2, pp II–II. IEEE

  33. Wang X, Jin C (2012) Image encryption using game of life permutation and pwlcm chaotic system. Opt Commun 285(4):412–417

    Article  Google Scholar 

  34. Wu Y, Yang G, Jin H, Noonan JP (2012) Image encryption using the two-dimensional logistic chaotic map. Journal of Electronic Imaging 21(1):013,014–1

    Article  Google Scholar 

  35. Xiang Y, Zou B, Li H (2009) Selective color transfer with multi-source images. Pattern Recogn Lett 30(7):682–689

    Article  Google Scholar 

  36. Xu W, Mulligan J (2010) Performance evaluation of color correction approaches for automatic multi-view image and video stitching. In: IEEE conference on computer vision and pattern recognition (CVPR), pp 263–270. IEEE

  37. Yan WQ, Kankanhalli MS (2015) Face search in encrypted domain. In: Pacific-rim symposium on image and video technology, pp 775–790. Springer

  38. Zafar F, Khan A, Malik SUR, Ahmed M, Anjum A, Khan MI, Javed N, Alam M, Jamil F (2017) A survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trends. Computers & Security 65:29–49

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by Information Security Education and Awareness (ISEA) Project (phase II), Deity, Government of INDIA.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Amitesh Singh Rajput.

Ethics declarations

Conflict of interests

All authors declare that they have no conflicts of interest regarding the publication of this manuscript.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Rajput, A.S., Raman, B. Cloud based image color transfer and storage in encrypted domain. Multimed Tools Appl 77, 21509–21537 (2018). https://doi.org/10.1007/s11042-017-5580-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-5580-2

Keywords

Navigation