Skip to main content
Log in

CryptoCT: towards privacy preserving color transfer and storage over cloud

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Current trend toward cloud computing coupled with emerging technologies such as high definition images/videos and 360-degree videos, has led the requirement of performing color transfer remotely by third party servers. However, users are always concerned about storing and processing their personal images over the cloud. Addressing this problem, we propose CryptoCT, a novel approach for privacy preserving color transfer and storage over third party cloud infrastructures. Paillier cryptosystem is employed in a manner that secret images can be processed for color transfer without revealing any information. Unlike the previous methods which involve multiple cloud servers, we use a single cloud server to accomplish the task of encrypted domain color transfer. We show that same color transfer effects as of the existing methods in plain domain are achieved in encrypted domain using our approach. To the best of our knowledge, CryptoCT is among the first known ventures to perform the task of color transfer in encrypted domain. Experimental results and security analysis validates the correctness of our approach.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  1. Accelerate your business with fast, engaging images. imgix. https://www.imgix.com. Accessed 24 Nov 2017

  2. Aljawarneh S (2011) A web engineering security methodology for e-learning systems. Netw Secur 2011(3):12–15

    Article  Google Scholar 

  3. Aljawarneh SA, Yassein MOB (2016) A conceptual security framework for cloud computing issues. Int J Intell Inf Technol (IJIIT) 12(2):12–24

    Article  Google Scholar 

  4. Aljawarneh SA, Moftah RA, Maatuk AM (2016) Investigations of automatic methods for detecting the polymorphic worms signatures. Futur Gener Comput Syst 60:67–77

    Article  Google Scholar 

  5. Aljawarneh SA, Alawneh A, Jaradat R (2017) Cloud security engineering: early stages of sdlc. Futur Gener Comput Syst 74:385–392

    Article  Google Scholar 

  6. Aljawarneh S, Yassein MB et al (2017) A resource-efficient encryption algorithm for multimedia big data. Multimedia Tools and Applications 76(21):22703–22724

    Article  Google Scholar 

  7. Ayoup AM, Hussein AH, Attia MA (2016) Efficient selective image encryption. Multimedia Tools and Applications 75(24):17,171–17,186

    Article  Google Scholar 

  8. Benaloh JC (1988) Verifiable secret-ballot elections. PhD Thesis, Yale University

  9. Chu KY, Kuo YH, Hsu WH (2013) Real-time privacy-preserving moving object detection in the cloud. In: Proceedings of the 21st ACM international conference on multimedia. ACM, pp 597–600

  10. Finlayson GD, Mackiewicz M, Hurlbert A (2015) Color correction using root-polynomial regression. IEEE Trans Image Process 24(5):1460–1470

    Article  MathSciNet  Google Scholar 

  11. Guesmi R, Farah M, Kachouri A, Samet M (2016) A novel chaos-based image encryption using dna sequence operation and secure hash algorithm sha-2. Nonlinear Dynamics 83(3):1123–1136

    Article  MathSciNet  MATH  Google Scholar 

  12. Guesmi R, Farah MAB, Kachouri A, Samet M (2016) Hash key-based image encryption using crossover operator and chaos. Multimedia Tools and Applications 75 (8):4753–4769

    Article  MATH  Google Scholar 

  13. Hu X, Zhang W, Li K, Hu H, Yu N (2016) Secure nonlocal denoising in outsourced images. ACM Trans Multimed Comput Commun Appl (TOMM) 12(3):40

    Google Scholar 

  14. Hwang Y, Lee JY, So Kweon I, Joo Kim S (2014) Color transfer using probabilistic moving least squares. In: Proceedings of the IEEE conference on computer vision and pattern recognition (CVPR), pp 3342–3349

  15. I. Skiljan.irfanview. http://www.irfanview.com. Accessed 26 April 2017

  16. Image and video management in the cloud. cloudinary. https://cloudinary.com/. Accessed 24 Nov 2017

  17. Image processing service for developers. blitline. https://www.blitline.com/v3/home. Accessed 24 Nov 2017

  18. Karim MSA, Wong K (2014) Universal data embedding in encrypted domain. Signal Process 94:174–182

    Article  Google Scholar 

  19. Lathey A, Atrey PK (2015) Image enhancement in encrypted domain over cloud. ACM Trans Multimed Comput Commun Appl (TOMM) 11(3):38

    Google Scholar 

  20. Martin D, Fowlkes C, Tal D, Malik J (2001) A database of human segmented natural images and its application to evaluating segmentation algorithms and measuring ecological statistics. In: Proceedings of eighth IEEE international conference on computer vision (ICCV), vol 2. IEEE, pp 416–423

  21. Mohanty M, Ooi WT, Atrey PK (2013) Scale me, crop me, knowme not: supporting scaling and cropping in secret image sharing. In: IEEE International conference on multimedia and expo (ICME). IEEE, pp 1–6

  22. Mohanty M, Ooi WT, Atrey PK (2016) Secret sharing approach for securing cloud-based pre-classification volume ray-casting. Multimedia Tools and Applications 75(11):6207–6235

    Article  Google Scholar 

  23. Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. In: International conference on the theory and applications of cryptographic techniques. Springer, pp 223–238

  24. Parvin Z, Seyedarabi H, Shamsi M (2016) A new secure and sensitive image encryption scheme based on new substitution with chaotic function. Multimedia Tools and Applications 75(17):10,631–10,648

    Article  Google Scholar 

  25. Rabin J, Ferradans S, Papadakis N (2014) Adaptive color transfer with relaxed optimal transport. In: International conference on image processing (ICIP). IEEE, pp 4852–4856

  26. Rajput AS, Raman B (2017) Color me, store me, know me not: supporting image color transfer and storage in encrypted domain over cloud. In: International conference on multimedia & expo workshops (ICMEW). IEEE, pp 291–296

  27. Reinhard E, Adhikhmin M, Gooch B, Shirley P (2001) Color transfer between images. IEEE Comput Graph Appl 21(5):34–41

    Article  Google Scholar 

  28. Rezai A, Keshavarzi P (2011) High-performance modular exponentiation algorithm by using a new modified modular multiplication algorithm and common-multiplicand-multiplication method. In: World congress on internet security (worldCIS). IEEE, pp 192–197

  29. Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613

    Article  MathSciNet  MATH  Google Scholar 

  30. Song ZC, Liu SG (2017) Sufficient image appearance transfer combining color and texture. IEEE Transactions on Multimedia 19(4):702–711

    Article  Google Scholar 

  31. Soumya T, Thampi SM (2015) Day color transfer based night video enhancement for surveillance system. In: IEEE international conference on signal processing, informatics, communication and energy systems (SPICES). IEEE, pp 1–5

  32. Strecha C, Von Hansen W, Van Gool L, Fua P, Thoennessen U (2008) On benchmarking camera calibration and multi-view stereo for high resolution imagery. In: IEEE conference on computer vision and pattern recognition (CVPR). IEEE, pp 1–8

  33. Teng L, Wang X (2012) A bit-level image encryption algorithm based on spatiotemporal chaotic system and self-adaptive. Opt Commun 285(20):4048–4054

    Article  Google Scholar 

  34. The dangers of trusting cloud computing over personal storage. forbes. https://www.forbes.com/sites/ewanspence/2015/06/01/the-dangers-of-trusting-cloud-computing-over-personal-storage/72ad475b4cd9. Accessed 24 Nov 2017

  35. Wang X, Jin C (2012) Image encryption using game of life permutation and pwlcm chaotic system. Opt Commun 285(4):412–417

    Article  Google Scholar 

  36. We handle files, so you don’t have to. uploadcare. https://uploadcare.com/. Accessed 24 Nov 2017

  37. We optimize your images and accelerate your websites. kraken. https://kraken.io/. Accessed 24 Nov 2017

  38. Wong WK, Cheung DWl, Kao B, Mamoulis N (2009) Secure knn computation on encrypted databases. In: Proceedings of the 2009 ACM SIGMOD international conference on management of data. ACM, pp 139–152

  39. Xiao Y, Wan L, Leung CS, Lai YK, Wong TT (2013) Example-based color transfer for gradient meshes. IEEE Transactions on Multimedia 15(3):549–560

    Article  Google Scholar 

  40. Xu W, Mulligan J (2010) Performance evaluation of color correction approaches for automatic multi-view image and video stitching. In: Conference on computer vision and pattern recognition (CVPR). IEEE, pp 263–270

  41. Zhang S, Gao T (2016) An image encryption scheme based on dna coding and permutation of hyper-image. Multimedia Tools and Applications 75(24):17,157–17,170

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by Information Security Education and Awareness (ISEA) Project (phase II), Deity, Government of INDIA.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Amitesh Singh Rajput.

Ethics declarations

Conflict of interests

All authors declare that they have no conflicts of interest regarding the publication of this manuscript.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Rajput, A.S., Raman, B. CryptoCT: towards privacy preserving color transfer and storage over cloud. Multimed Tools Appl 77, 24223–24245 (2018). https://doi.org/10.1007/s11042-018-5729-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-5729-7

Keywords

Navigation