Abstract
Cloud computing is ideal for image storage and processing because it provides enormously scalable storage and processing resources at low cost. One of the major drawbacks of cloud computing, however, is the lack of robust mechanisms for the users to control the privacy of the data they farm out to the clouds. In this paper, we develop an image encoding scheme that enhances the privacy of image data that is outsourced to the clouds for processing. Unlike previously proposed image encryption schemes, our encoding scheme allows different forms of pixel-level image processing to take place in the clouds while the actual image is not revealed to the cloud provider. Our encoding scheme uses a chaotic map to transform the image after it is masked with an arbitrarily chosen ambient image. We use template matching as a common image processing task to demonstrate the ability of our scheme to perform computations on privacy enhanced images. A simplified prototype of the image processing system was implemented and the experimental results are presented in this paper.
Similar content being viewed by others
References
Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurc Chaos Appl Sci Eng 16:2129–2151
Arnol’d VI, Avez A (1968) Ergodic problems of classical mechanics. Benjamin, Elmsford
Bai F, Zhang J, Zheng J (2011) Similarity analysis of dna sequences based on the emd method. Appl Math Lett 24:232–237
Boneh D, Crescenzo GD, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In: EUROCRYPT, pp 506–522
Cachin C, Camenisch J (2004) Advances in cryptology. In: EUROCRYPT, vol 3027, pp 1–638
Canetti R, Dakdouk RR (2008) Extractable perfectly one-way functions. In: ICALP, pp 449–460
Dong L, Yun-Jian G, Xue-Yong Z (2010) On-line signature verification based on template matching approach and support vector data description. In: Computer application and system modeling (ICCASM), vol 12, pp V12-681–V12-685
Erkin Z, Piva A, Katzenbeisser S, Lagendijk RL, Shokrollahi J, Neven G, Barni M (2007) Protection and retrieval of encrypted multimedia content: when cryptography meets signal processing. EURASIP J Multimed Inf Secur, 17:1–17:20
Ertas G, Doran S, Leach MO (2011) Computerized detection of breast lesions in multi-centre and multi-instrument dce-mr data using 3d principal component maps and template matching. Phys Med Biol 56:7795–7819
Gao T, Chen Z (2008) A new image encryption algorithm based on hyper-chaos. Phys Lett A 372:394–400
Gennaro R, Gentry C, Parno B (2010) Non-interactive verifiable computing: outsourcing computation to untrusted workers. In: Proceedings of the 30th annual conference on advances in cryptology (CRYPTO’10), pp 465–482
Gentry C (2009) Fully homomorphic encryption using ideal lattices. In: Proceedings of the 41st annual ACM symposium on theory of computing, pp 169–178
Goh E, Shacham H, Modadugu N, Boneh D (2003) Sirius: securing remote untrusted storage. In: Proceedings of network and distributed systems security (NDSS) symposium, pp 131–145
Goodson GR, Wylie JJ, Ganger GR, Reiter MK (2004) Efficient byzantine-tolerant erasure-coded storage. In: Proceedings of the international conference on dependable systems and networks, pp 135–145
Guan Z, Huang F, Guan W (2005) Chaos-based image encryption algorithm. Phys Lett A 346:153–157
Hsu C-Y, Lu C-S, Pei S-C (2012) Image feature extraction in encrypted domain with privacy-preserving sift. IEEE Trans Image Process 21(11):4593–4607
Imagej. Available: http://rsbweb.nih.gov/ij/ (online)
Kallahalla M, Riedel E, Swaminathan R, Wang Q, Fu K (2003) Plutus: scalable secure file sharing on untrusted storage. In: Proceedings of the 2nd USENIX conference on file and storage technologies, pp 29–42
Levada A, Correa D, Salvadeo D, Saito J, Mascarenhas N (2008) Novel approaches for face recognition: template-matching using dynamic time warping and LSTM neural network supervised classification. In: Systems, signals and image processing, pp 241–244
Li S, Li C, Chen G, Mou X (2004) Cryptanalysis of the RCES/RSES image encryption scheme. IEEE Trans Image Process 10
Liang Zhu Z, Zhang W, Wo Wong K, Yu H (2011) A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf Sci 181(6):1171–1186
Lu W, Varna AL, Wu M (2010) Security analysis for privacy preserving search of multimedia. In: Proceeding of ICIP’10, pp 2093–2096
Naehrig M, Lauter K, Vaikuntanathan V (2011) Can homomorphic encryption be practical? In: Proceedings of the 3rd ACM workshop on cloud computing security workshop, CCSW’11, pp 113–124
Naor M, Shamir A (1994) Visual cryptography. In: EUROCRYPT, pp 1–12
Nourian A, Maheswaran M (2011) Privacy and security requirements of data intensive computing in clouds. In: Handbook of data intensive computing. Springer, New York, pp 501–518
Provos N, Honeyman P (2003) Hide and seek: an introduction to steganography. IEEE Secur Priv 1:32–44
Schonberg D, Yeo C, Draper S, Ramchandran K (2007) On compression of encrypted video. In: Data compression conference (DCC’07), pp 173–182
Shamir A (1979) How to share a secret. Commun ACM 22:612–613
Survey by IEEE and cloud security alliance details importance and urgency of cloud computing security standards. Available: http://standards.ieee.org/news/2010/cloudcomp.html (online)
Xie S, Yang Z, Fu Y (2008) Nonnegative matrix factorization applied to nonlinear speech and image cryptosystems. IEEE Trans Circuits Syst I, Regul Pap 55:2356–2367
Xijing S, Shoukui S, Shurong T (2011) The image hiding algorithm based on the mask matrix and dct transform. In: Artificial intelligence, management science and electronic commerce (AIMSEC), pp 765–767
Yoon JW, Kim H (2010) An image encryption scheme with a pseudorandom permutation based on chaotic maps. Commun Nonlinear Sci Numer Simul 15(12):3998–4006
Yu S, Wang C, Ren K, Lou W (2010) Achieving secure, scalable, and fine-grained data access control in cloud computing. In: Proceedings of the 29th conference on information communications (INFOCOM’10), pp 534–542
Zhu C (2012) A novel image encryption scheme based on improved hyperchaotic sequences. Opt Commun 285(1):29–37
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Nourian, A., Maheswaran, M. Privacy aware image template matching in clouds using ambient data. J Supercomput 66, 1049–1070 (2013). https://doi.org/10.1007/s11227-013-0976-x
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-013-0976-x