Skip to main content
Log in

Privacy aware image template matching in clouds using ambient data

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Cloud computing is ideal for image storage and processing because it provides enormously scalable storage and processing resources at low cost. One of the major drawbacks of cloud computing, however, is the lack of robust mechanisms for the users to control the privacy of the data they farm out to the clouds. In this paper, we develop an image encoding scheme that enhances the privacy of image data that is outsourced to the clouds for processing. Unlike previously proposed image encryption schemes, our encoding scheme allows different forms of pixel-level image processing to take place in the clouds while the actual image is not revealed to the cloud provider. Our encoding scheme uses a chaotic map to transform the image after it is masked with an arbitrarily chosen ambient image. We use template matching as a common image processing task to demonstrate the ability of our scheme to perform computations on privacy enhanced images. A simplified prototype of the image processing system was implemented and the experimental results are presented in this paper.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Algorithm 1
Fig. 4
Algorithm 2
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurc Chaos Appl Sci Eng 16:2129–2151

    Article  MathSciNet  MATH  Google Scholar 

  2. Arnol’d VI, Avez A (1968) Ergodic problems of classical mechanics. Benjamin, Elmsford

    MATH  Google Scholar 

  3. Bai F, Zhang J, Zheng J (2011) Similarity analysis of dna sequences based on the emd method. Appl Math Lett 24:232–237

    Article  MathSciNet  MATH  Google Scholar 

  4. Boneh D, Crescenzo GD, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In: EUROCRYPT, pp 506–522

    Google Scholar 

  5. Cachin C, Camenisch J (2004) Advances in cryptology. In: EUROCRYPT, vol 3027, pp 1–638

    Google Scholar 

  6. Canetti R, Dakdouk RR (2008) Extractable perfectly one-way functions. In: ICALP, pp 449–460

    Google Scholar 

  7. Dong L, Yun-Jian G, Xue-Yong Z (2010) On-line signature verification based on template matching approach and support vector data description. In: Computer application and system modeling (ICCASM), vol 12, pp V12-681–V12-685

    Google Scholar 

  8. Erkin Z, Piva A, Katzenbeisser S, Lagendijk RL, Shokrollahi J, Neven G, Barni M (2007) Protection and retrieval of encrypted multimedia content: when cryptography meets signal processing. EURASIP J Multimed Inf Secur, 17:1–17:20

    Google Scholar 

  9. Ertas G, Doran S, Leach MO (2011) Computerized detection of breast lesions in multi-centre and multi-instrument dce-mr data using 3d principal component maps and template matching. Phys Med Biol 56:7795–7819

    Article  Google Scholar 

  10. Gao T, Chen Z (2008) A new image encryption algorithm based on hyper-chaos. Phys Lett A 372:394–400

    Article  MATH  Google Scholar 

  11. Gennaro R, Gentry C, Parno B (2010) Non-interactive verifiable computing: outsourcing computation to untrusted workers. In: Proceedings of the 30th annual conference on advances in cryptology (CRYPTO’10), pp 465–482

    Google Scholar 

  12. Gentry C (2009) Fully homomorphic encryption using ideal lattices. In: Proceedings of the 41st annual ACM symposium on theory of computing, pp 169–178

    Chapter  Google Scholar 

  13. Goh E, Shacham H, Modadugu N, Boneh D (2003) Sirius: securing remote untrusted storage. In: Proceedings of network and distributed systems security (NDSS) symposium, pp 131–145

    Google Scholar 

  14. Goodson GR, Wylie JJ, Ganger GR, Reiter MK (2004) Efficient byzantine-tolerant erasure-coded storage. In: Proceedings of the international conference on dependable systems and networks, pp 135–145

    Google Scholar 

  15. Guan Z, Huang F, Guan W (2005) Chaos-based image encryption algorithm. Phys Lett A 346:153–157

    Article  MATH  Google Scholar 

  16. Hsu C-Y, Lu C-S, Pei S-C (2012) Image feature extraction in encrypted domain with privacy-preserving sift. IEEE Trans Image Process 21(11):4593–4607

    Article  MathSciNet  Google Scholar 

  17. Imagej. Available: http://rsbweb.nih.gov/ij/ (online)

  18. Kallahalla M, Riedel E, Swaminathan R, Wang Q, Fu K (2003) Plutus: scalable secure file sharing on untrusted storage. In: Proceedings of the 2nd USENIX conference on file and storage technologies, pp 29–42

    Google Scholar 

  19. Levada A, Correa D, Salvadeo D, Saito J, Mascarenhas N (2008) Novel approaches for face recognition: template-matching using dynamic time warping and LSTM neural network supervised classification. In: Systems, signals and image processing, pp 241–244

    Google Scholar 

  20. Li S, Li C, Chen G, Mou X (2004) Cryptanalysis of the RCES/RSES image encryption scheme. IEEE Trans Image Process 10

  21. Liang Zhu Z, Zhang W, Wo Wong K, Yu H (2011) A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf Sci 181(6):1171–1186

    Article  Google Scholar 

  22. Lu W, Varna AL, Wu M (2010) Security analysis for privacy preserving search of multimedia. In: Proceeding of ICIP’10, pp 2093–2096

    Google Scholar 

  23. Naehrig M, Lauter K, Vaikuntanathan V (2011) Can homomorphic encryption be practical? In: Proceedings of the 3rd ACM workshop on cloud computing security workshop, CCSW’11, pp 113–124

    Chapter  Google Scholar 

  24. Naor M, Shamir A (1994) Visual cryptography. In: EUROCRYPT, pp 1–12

    Google Scholar 

  25. Nourian A, Maheswaran M (2011) Privacy and security requirements of data intensive computing in clouds. In: Handbook of data intensive computing. Springer, New York, pp 501–518

    Chapter  Google Scholar 

  26. Provos N, Honeyman P (2003) Hide and seek: an introduction to steganography. IEEE Secur Priv 1:32–44

    Article  Google Scholar 

  27. Schonberg D, Yeo C, Draper S, Ramchandran K (2007) On compression of encrypted video. In: Data compression conference (DCC’07), pp 173–182

    Google Scholar 

  28. Shamir A (1979) How to share a secret. Commun ACM 22:612–613

    Article  MathSciNet  MATH  Google Scholar 

  29. Survey by IEEE and cloud security alliance details importance and urgency of cloud computing security standards. Available: http://standards.ieee.org/news/2010/cloudcomp.html (online)

  30. Xie S, Yang Z, Fu Y (2008) Nonnegative matrix factorization applied to nonlinear speech and image cryptosystems. IEEE Trans Circuits Syst I, Regul Pap 55:2356–2367

    Article  MathSciNet  Google Scholar 

  31. Xijing S, Shoukui S, Shurong T (2011) The image hiding algorithm based on the mask matrix and dct transform. In: Artificial intelligence, management science and electronic commerce (AIMSEC), pp 765–767

    Google Scholar 

  32. Yoon JW, Kim H (2010) An image encryption scheme with a pseudorandom permutation based on chaotic maps. Commun Nonlinear Sci Numer Simul 15(12):3998–4006

    Article  MathSciNet  MATH  Google Scholar 

  33. Yu S, Wang C, Ren K, Lou W (2010) Achieving secure, scalable, and fine-grained data access control in cloud computing. In: Proceedings of the 29th conference on information communications (INFOCOM’10), pp 534–542

    Google Scholar 

  34. Zhu C (2012) A novel image encryption scheme based on improved hyperchaotic sequences. Opt Commun 285(1):29–37

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Arash Nourian.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Nourian, A., Maheswaran, M. Privacy aware image template matching in clouds using ambient data. J Supercomput 66, 1049–1070 (2013). https://doi.org/10.1007/s11227-013-0976-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-013-0976-x

Keywords

Navigation