Abstract
Current trend toward cloud computing coupled with emerging technologies such as high definition images/videos and 360-degree videos, has led the requirement of performing color transfer remotely by third party servers. However, users are always concerned about storing and processing their personal images over the cloud. Addressing this problem, we propose CryptoCT, a novel approach for privacy preserving color transfer and storage over third party cloud infrastructures. Paillier cryptosystem is employed in a manner that secret images can be processed for color transfer without revealing any information. Unlike the previous methods which involve multiple cloud servers, we use a single cloud server to accomplish the task of encrypted domain color transfer. We show that same color transfer effects as of the existing methods in plain domain are achieved in encrypted domain using our approach. To the best of our knowledge, CryptoCT is among the first known ventures to perform the task of color transfer in encrypted domain. Experimental results and security analysis validates the correctness of our approach.
Similar content being viewed by others
References
Accelerate your business with fast, engaging images. imgix. https://www.imgix.com. Accessed 24 Nov 2017
Aljawarneh S (2011) A web engineering security methodology for e-learning systems. Netw Secur 2011(3):12–15
Aljawarneh SA, Yassein MOB (2016) A conceptual security framework for cloud computing issues. Int J Intell Inf Technol (IJIIT) 12(2):12–24
Aljawarneh SA, Moftah RA, Maatuk AM (2016) Investigations of automatic methods for detecting the polymorphic worms signatures. Futur Gener Comput Syst 60:67–77
Aljawarneh SA, Alawneh A, Jaradat R (2017) Cloud security engineering: early stages of sdlc. Futur Gener Comput Syst 74:385–392
Aljawarneh S, Yassein MB et al (2017) A resource-efficient encryption algorithm for multimedia big data. Multimedia Tools and Applications 76(21):22703–22724
Ayoup AM, Hussein AH, Attia MA (2016) Efficient selective image encryption. Multimedia Tools and Applications 75(24):17,171–17,186
Benaloh JC (1988) Verifiable secret-ballot elections. PhD Thesis, Yale University
Chu KY, Kuo YH, Hsu WH (2013) Real-time privacy-preserving moving object detection in the cloud. In: Proceedings of the 21st ACM international conference on multimedia. ACM, pp 597–600
Finlayson GD, Mackiewicz M, Hurlbert A (2015) Color correction using root-polynomial regression. IEEE Trans Image Process 24(5):1460–1470
Guesmi R, Farah M, Kachouri A, Samet M (2016) A novel chaos-based image encryption using dna sequence operation and secure hash algorithm sha-2. Nonlinear Dynamics 83(3):1123–1136
Guesmi R, Farah MAB, Kachouri A, Samet M (2016) Hash key-based image encryption using crossover operator and chaos. Multimedia Tools and Applications 75 (8):4753–4769
Hu X, Zhang W, Li K, Hu H, Yu N (2016) Secure nonlocal denoising in outsourced images. ACM Trans Multimed Comput Commun Appl (TOMM) 12(3):40
Hwang Y, Lee JY, So Kweon I, Joo Kim S (2014) Color transfer using probabilistic moving least squares. In: Proceedings of the IEEE conference on computer vision and pattern recognition (CVPR), pp 3342–3349
I. Skiljan.irfanview. http://www.irfanview.com. Accessed 26 April 2017
Image and video management in the cloud. cloudinary. https://cloudinary.com/. Accessed 24 Nov 2017
Image processing service for developers. blitline. https://www.blitline.com/v3/home. Accessed 24 Nov 2017
Karim MSA, Wong K (2014) Universal data embedding in encrypted domain. Signal Process 94:174–182
Lathey A, Atrey PK (2015) Image enhancement in encrypted domain over cloud. ACM Trans Multimed Comput Commun Appl (TOMM) 11(3):38
Martin D, Fowlkes C, Tal D, Malik J (2001) A database of human segmented natural images and its application to evaluating segmentation algorithms and measuring ecological statistics. In: Proceedings of eighth IEEE international conference on computer vision (ICCV), vol 2. IEEE, pp 416–423
Mohanty M, Ooi WT, Atrey PK (2013) Scale me, crop me, knowme not: supporting scaling and cropping in secret image sharing. In: IEEE International conference on multimedia and expo (ICME). IEEE, pp 1–6
Mohanty M, Ooi WT, Atrey PK (2016) Secret sharing approach for securing cloud-based pre-classification volume ray-casting. Multimedia Tools and Applications 75(11):6207–6235
Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. In: International conference on the theory and applications of cryptographic techniques. Springer, pp 223–238
Parvin Z, Seyedarabi H, Shamsi M (2016) A new secure and sensitive image encryption scheme based on new substitution with chaotic function. Multimedia Tools and Applications 75(17):10,631–10,648
Rabin J, Ferradans S, Papadakis N (2014) Adaptive color transfer with relaxed optimal transport. In: International conference on image processing (ICIP). IEEE, pp 4852–4856
Rajput AS, Raman B (2017) Color me, store me, know me not: supporting image color transfer and storage in encrypted domain over cloud. In: International conference on multimedia & expo workshops (ICMEW). IEEE, pp 291–296
Reinhard E, Adhikhmin M, Gooch B, Shirley P (2001) Color transfer between images. IEEE Comput Graph Appl 21(5):34–41
Rezai A, Keshavarzi P (2011) High-performance modular exponentiation algorithm by using a new modified modular multiplication algorithm and common-multiplicand-multiplication method. In: World congress on internet security (worldCIS). IEEE, pp 192–197
Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613
Song ZC, Liu SG (2017) Sufficient image appearance transfer combining color and texture. IEEE Transactions on Multimedia 19(4):702–711
Soumya T, Thampi SM (2015) Day color transfer based night video enhancement for surveillance system. In: IEEE international conference on signal processing, informatics, communication and energy systems (SPICES). IEEE, pp 1–5
Strecha C, Von Hansen W, Van Gool L, Fua P, Thoennessen U (2008) On benchmarking camera calibration and multi-view stereo for high resolution imagery. In: IEEE conference on computer vision and pattern recognition (CVPR). IEEE, pp 1–8
Teng L, Wang X (2012) A bit-level image encryption algorithm based on spatiotemporal chaotic system and self-adaptive. Opt Commun 285(20):4048–4054
The dangers of trusting cloud computing over personal storage. forbes. https://www.forbes.com/sites/ewanspence/2015/06/01/the-dangers-of-trusting-cloud-computing-over-personal-storage/72ad475b4cd9. Accessed 24 Nov 2017
Wang X, Jin C (2012) Image encryption using game of life permutation and pwlcm chaotic system. Opt Commun 285(4):412–417
We handle files, so you don’t have to. uploadcare. https://uploadcare.com/. Accessed 24 Nov 2017
We optimize your images and accelerate your websites. kraken. https://kraken.io/. Accessed 24 Nov 2017
Wong WK, Cheung DWl, Kao B, Mamoulis N (2009) Secure knn computation on encrypted databases. In: Proceedings of the 2009 ACM SIGMOD international conference on management of data. ACM, pp 139–152
Xiao Y, Wan L, Leung CS, Lai YK, Wong TT (2013) Example-based color transfer for gradient meshes. IEEE Transactions on Multimedia 15(3):549–560
Xu W, Mulligan J (2010) Performance evaluation of color correction approaches for automatic multi-view image and video stitching. In: Conference on computer vision and pattern recognition (CVPR). IEEE, pp 263–270
Zhang S, Gao T (2016) An image encryption scheme based on dna coding and permutation of hyper-image. Multimedia Tools and Applications 75(24):17,157–17,170
Acknowledgements
This work was supported by Information Security Education and Awareness (ISEA) Project (phase II), Deity, Government of INDIA.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interests
All authors declare that they have no conflicts of interest regarding the publication of this manuscript.
Rights and permissions
About this article
Cite this article
Rajput, A.S., Raman, B. CryptoCT: towards privacy preserving color transfer and storage over cloud. Multimed Tools Appl 77, 24223–24245 (2018). https://doi.org/10.1007/s11042-018-5729-7
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-018-5729-7