skip to main content
research-article

Image Enhancement in Encrypted Domain over Cloud

Published: 05 February 2015 Publication History

Abstract

Cloud-based multimedia systems are becoming increasingly common. These systems offer not only storage facility, but also high-end computing infrastructure which can be used to process data for various analysis tasks ranging from low-level data quality enhancement to high-level activity and behavior identification operations. However, cloud data centers, being third party servers, are often prone to information leakage, raising security and privacy concerns. In this article, we present a Shamir's secret sharing based method to enhance the quality of encrypted image data over cloud. Using the proposed method we show that several image enhancement operations such as noise removal, antialiasing, edge and contrast enhancement, and dehazing can be performed in encrypted domain with near-zero loss in accuracy and minimal computation and data overhead. Moreover, the proposed method is proven to be information theoretically secure.

Supplementary Material

a38-lathey-apndx.pdf (lathey.zip)
Supplemental movie, appendix, image and software files for, Image Enhancement in Encrypted Domain over Cloud

References

[1]
M. Aguilar, C. Xlim, S. Fau, C. Fontaine, G. Gogniat, and R. Sirdey. 2013. Recent advances in homomorphic encryption: A possible future for signal processing in the encrypted domain. IEEE Signal Process. Mag. 30, 2.
[2]
M. Basu. 2002. Gaussian-based edge-detection methods-a survey. IEEE Trans. Syst. Man Cyber. Part C: Appl. Rev. 32, 3, 252--260.
[3]
J. Benaloh. 1987. Secret sharing homomorphisms: Keeping shares of a secret secret. In Advances in Cryptology, Lecture Notes in Computer Science, vol. 263, Springer, 251--260.
[4]
G. R. Blakley. 1979. Safeguarding cryptographic keys. In Proceedings of the IEEE National Computer Conference. 313.
[5]
A. Buades. 2006. Image and film denoising by non-local means. Ph.D. dissertation, Universitat de les Illes Balears, Palma, Spain.
[6]
A. Buades, B. Coll, and J.-M. Morel. 2005. A review of image denoising algorithms, with a new one. SIAM Multiscale Model. Simul. 4, 2, 490--530.
[7]
Y. Cai, K. Huang, T. Tan, and Y. Wang. 2006. Context enhancement of nighttime surveillance by image fusion. In Proceedings of the 18th IEEE International Conference on Pattern Recognition, Vol. 1, 980--983.
[8]
Y. Cha and S. Kim. 2006. Edge-forming methods for color image zooming. IEEE Trans. Image Process. 15, 8, 2315--2323.
[9]
C. C. Chang, C. C. Lin, C. H. Lin, and Y. H. Chen. 2008. A novel secret image sharing scheme in color images using small shadow images. Elsevier Info. Sci. 178, 11, 2433--2447.
[10]
K.-Y. Chu, Y.-H. Kuo, and W. H. Hsu. 2013. Real-time Privacy-preserving Moving Object Detection in the Cloud. In Proceedings of the 21st ACM International Conference on Multimedia. 597--600.
[11]
K. Dabov, A. Foi, V. Katkovnik, and K. Egiazarian. 2007. Image denoising by sparse 3 -- D transform-domain collaborative filtering. IEEE Trans. Image Process. 16, 8, 2080--2095.
[12]
N. Dalal. 2003. INRIA Person Dataset. (2003). http://pascal.inrialpes.fr/data/human.
[13]
L. S. Davis. 1975. A survey of edge detection techniques. Computer Graph. Image Process. 4, 3, 248--270.
[14]
R. Fattal. 2008. Single image dehazing. ACM Trans. Graph. 27, 72.
[15]
US Forest Service Air Quality Images. 2010. (2010). http://www.fsvisimages.com.
[16]
R. C. Gonzalez and R. E. Woods. 2002. Digital Image Processing. Prentice Hall.
[17]
K. He, J. Sun, and X. Tang. 2011. Single image haze removal using dark channel prior. IEEE Trans. Pattern Anal. Mach. Intell. 33, 12, 2341--2353.
[18]
M. D. Heath, S. Sarkar, T. Sanocki, and K. W. Bowyer. 1997. A robust visual method for assessing the relative performance of edge-detection algorithms. IEEE Trans. Pattern Anal. Mach. Intell. 19, 12, 1338--1359.
[19]
C. Y. Hsu, C. S. Lu, and S. C. Pei. 2009. Secure and robust SIFT. In Proceedings of the 17th ACM International Conference on Multimedia. 637--640.
[20]
N. Islam, W. Puech, and R. Brouzet. 2009. A homomorphic method for sharing secret images. In Digital Watermarking, Springer, 121--135.
[21]
N. Joshi and M. F. Cohen. 2010. Seeing Mt. Rainier: Lucky imaging for multi-image denoising, sharpening, and haze removal. In Proceedings of the IEEE International Conference on Computational Photography. 1--8.
[22]
Z. Kalafati. 2003. License plate detection, recognition and automated storage. University of Zagreb. http://www.zemris.fer.hr/projects/LicensePlates/english/results.shtml.
[23]
M. S. Kankanhalli. 2012. Introduction to special issue on multimedia security. ACM Trans. Multimedia Comput. Commun. Appl. 8, 2S, 31:1--31:2.
[24]
Eric C. Larson and Damon M. Chandler. 2010. Most apparent distortion: full-reference image quality assessment and the role of strategy. J. Electron. Imaging 19, 1, 011006.
[25]
A. Lathey, P. K. Atrey, and N. Joshi. 2013. Homomorphic Low Pass Filtering Over Cloud. In Proceedings of the 7th IEEE International Conference on Semantic Computing. 310--313.
[26]
M. Mohanty, P. K. Atrey, and W.-T. Tsang. 2012. Secure medical data visualization over cloud. In Proceedings of the ACM International Conference on Multimedia. 1105--1108.
[27]
M. Mohanty, W.-T. Tsang, and P. K. Atrey. 2013. Scale me, crop me, know me not: Supporting scaling and cropping in secret image sharing. In Proceedings of the IEEE International Conference on Multimedia and Expo. 1--6.
[28]
S. G. Narasimhan and S. K. Nayar. 2003. Interactive (de) weathering of an image using physical models. In Proceedings of the IEEE Workshop on Color and Photometric Methods in Computer Vision. Vol. 6. 1.
[29]
Y. Rao, W. Lin, and L. Chen. 2010. Image-based fusion for video enhancement of night-time surveillance. Optical Eng. 49, 12, 120501--120501.
[30]
A. R. Sadeghi, T. Schneider, and I. Wehrenberg. 2010. Efficient privacy-preserving face recognition. In Proceedings of the 12th International Conference on Information Security and Cryptology. Springer, 229--244.
[31]
M. Sayed Y. Luo Saghaian, Nejad Esfahani, and S. C. Sen-ching. 2012. Privacy protected image denoising with secret shares. In Proceedings of the 19th IEEE International Conference on Image Processing. 253--256.
[32]
Y. Y. Schechner, S. G. Narasimhan, and S. K. Nayar. 2001. Instant dehazing of images using polarization. In Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, Vol. 1. 325--332.
[33]
A. Shamir. 1979. How to share a secret. Commun. ACM 22, 11, 612--613.
[34]
H. R. Sheikh, Z. Wang, L. Cormack, and A. C. Bovik. 2005. LIVE image quality assessment database release 2. (2005). http://live.ece.utexas.edu/research/quality.
[35]
Stephen M. Smith and J. Michael Brady. 1997. SUSAN: A new approach to low level image processing. Int. J. Comput. Vision 23, 1, 45--78.
[36]
K. Tan and J. P. Oakley. 2000. Enhancement of color images in poor visibility conditions. In Proceedings of the IEEE International Conference on Image Processing. Vol. 2, 788--791.
[37]
R. T. Tan. 2008. Visibility in bad weather from a single image. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 1--8.
[38]
M. Upmanyu, A. M. Namboodiri, K. Srinathan, and C. V. Jawahar. 2009. Efficient privacy preserving video surveillance. In Proceedings of the 12th IEEE International Conference on Computer Vision. 1639--1646.
[39]
R. Yogachandran, C.-W. P. Raphael, A. C. Jonathon, and J. P. David. 2012. Facial expression recognition in the encrypted domain based on local Fisher discriminant analysis. IEEE Trans. Affective Comput. 4, 1, 83--92.
[40]
L. Zhang and X. Wu. 2006. An edge-guided image interpolation algorithm via directional filtering and data fusion. IEEE Trans. Image Process. 15, 8, 2226--2238.

Cited By

View all
  • (2024)Secureimagesec: A privacy-preserving framework for outsourced picture representation with content-based image retrievalIntelligent Data Analysis10.3233/IDA-240265(1-22)Online publication date: 8-Jun-2024
  • (2023)An Applied Image Cryptosystem on Moore’s Automaton Operating on δ (q)/𝔽2ACM Transactions on Multimedia Computing, Communications, and Applications10.1145/361443320:2(1-20)Online publication date: 27-Sep-2023
  • (2023)Enhancement of Information Carrying and Decoding for Visual Cryptography with Error CorrectionACM Transactions on Multimedia Computing, Communications, and Applications10.1145/361292720:1(1-24)Online publication date: 18-Sep-2023
  • Show More Cited By

Index Terms

  1. Image Enhancement in Encrypted Domain over Cloud

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Transactions on Multimedia Computing, Communications, and Applications
      ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 11, Issue 3
      January 2015
      173 pages
      ISSN:1551-6857
      EISSN:1551-6865
      DOI:10.1145/2733235
      Issue’s Table of Contents
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 05 February 2015
      Accepted: 01 August 2014
      Revised: 01 June 2014
      Received: 01 February 2014
      Published in TOMM Volume 11, Issue 3

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Cloud computing
      2. encrypted domain processing
      3. image enhancement
      4. secret sharing

      Qualifiers

      • Research-article
      • Research
      • Refereed

      Funding Sources

      • Natural Sciences and Engineering Research Council of Canada, Discovery

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)6
      • Downloads (Last 6 weeks)1
      Reflects downloads up to 03 Mar 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Secureimagesec: A privacy-preserving framework for outsourced picture representation with content-based image retrievalIntelligent Data Analysis10.3233/IDA-240265(1-22)Online publication date: 8-Jun-2024
      • (2023)An Applied Image Cryptosystem on Moore’s Automaton Operating on δ (q)/𝔽2ACM Transactions on Multimedia Computing, Communications, and Applications10.1145/361443320:2(1-20)Online publication date: 27-Sep-2023
      • (2023)Enhancement of Information Carrying and Decoding for Visual Cryptography with Error CorrectionACM Transactions on Multimedia Computing, Communications, and Applications10.1145/361292720:1(1-24)Online publication date: 18-Sep-2023
      • (2023)PIRNet: Privacy-Preserving Image Restoration Network via Wavelet Lifting2023 IEEE/CVF International Conference on Computer Vision (ICCV)10.1109/ICCV51070.2023.02044(22311-22320)Online publication date: 1-Oct-2023
      • (2023)EyeEncrypt: A Cyber-Secured Framework for Retinal Image SegmentationApplications and Techniques in Information Security10.1007/978-981-99-2264-2_9(109-120)Online publication date: 12-May-2023
      • (2022)Linguistic Taboos and Euphemisms in NepaliACM Transactions on Asian and Low-Resource Language Information Processing10.1145/352411121:6(1-26)Online publication date: 12-Nov-2022
      • (2022)A survey on DE – Duplication schemes in cloud servers for secured data analysis in various applicationsMeasurement: Sensors10.1016/j.measen.2022.10046324(100463)Online publication date: Dec-2022
      • (2022) SecureDLJournal of Visual Communication and Image Representation10.1016/j.jvcir.2022.10350386:COnline publication date: 1-Jul-2022
      • (2022)Deep reinforcement learning-based algorithms selectors for the resource scheduling in hierarchical Cloud computingJournal of Network and Computer Applications10.1016/j.jnca.2022.103520208:COnline publication date: 1-Dec-2022
      • (2022)Design, implementation, and performance evaluation of an earliest-deadline-first packet scheduling scheme in P4 hardware switchesJournal of Network and Computer Applications10.1016/j.jnca.2022.103519208:COnline publication date: 1-Dec-2022
      • Show More Cited By

      View Options

      Login options

      Full Access

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media