skip to main content
research-article

Secure Nonlocal Denoising in Outsourced Images

Published: 08 March 2016 Publication History

Abstract

Signal processing in the encrypted domain becomes a desired technique to protect privacy of outsourced data in cloud. In this article, we propose a double-cipher scheme to implement nonlocal means (NLM) denoising in encrypted images. In this scheme, one ciphertext is generated by the Paillier scheme, which enables the mean filter, and the other is obtained by a privacy-preserving transform, which enables the nonlocal search. By the privacy-preserving transform, the cloud server can search the similar pixel blocks in the ciphertexts with the same speed as in the plaintexts; thus, the proposed method can be executed fast. To enhance the security, we randomly permutate both ciphertexts. To reduce the denoising complexity caused by random permutation, a random NLM method is exploited in the encrypted domain. The experimental results show that the quality of denoised images in the encrypted domain is comparable to that obtained in the plain domain.

References

[1]
Carlos Aguilar-Melchor, Simon Fau, Caroline Fontaine, Guy Gogniat, and Renaud Sirdey. 2013. Recent advances in homomorphic encryption: A possible future for signal processing in the encrypted domain. IEEE Signal Processing Magazine 30, 2, 108--117.
[2]
Josh Cohen Benaloh. 1987. Secret sharing homomorphisms: Keeping shares of a secret secret. In Advances in Cryptology (CRYPTO’86). Springer, 251--260.
[3]
Tiziano Bianchi, Alessandro Piva, and Mauro Barni. 2009a. Encrypted domain DCT based on homomorphic cryptosystems. EURASIP Journal on Information Security, 1.
[4]
Tiziano Bianchi, Alessandro Piva, and Mauro Barni. 2009b. On the implementation of the discrete Fourier transform in the encrypted domain. IEEE Transactions on Information Forensics and Security 4, 1, 86--97.
[5]
Tiziano Bianchi, Alessandro Piva, and Mauro Barni. 2010. Composite signal representation for fast and storage-efficient processing of encrypted signals. IEEE Transactions on Information Forensics and Security 5, 1, 180--187.
[6]
George Robert Blakley and others. 1979. Safeguarding cryptographic keys. In Proceedings of the National Computer Conference, Vol. 48. 313--317.
[7]
Zvika Brakerski, Craig Gentry, and Vinod Vaikuntanathan. 2012. (Leveled) fully homomorphic encryption without bootstrapping. In Proceedings of the 3rd Innovations in Theoretical Computer Science Conference. ACM, New York, NY, 309--325.
[8]
Antoni Buades, Bartomeu Coll, and Jean Michel Morel. 2004. On image denoising methods. CMLA Preprint 5.
[9]
Antoni Buades, Bartomeu Coll, and Jean-Michel Morel. 2005. A review of image denoising algorithms, with a new one. Multiscale Modeling & Simulation 4, 2, 490--530.
[10]
Stanley H. Chan, Todd Zickler, and Yue M. Lu. 2014. Monte Carlo non-local means: Random sampling for large-scale image filtering. IEEE Transactions on Image Processing 23, 8, 3711--3725.
[11]
Ronald Cramer, Ivan Damgård, and Jesper B. Nielsen. 2001. Multiparty Computation from Threshold Homomorphic Encryption. Springer, New York, NY.
[12]
Ivan Damgård and Mads Jurik. 2001. A generalisation, a simplication and some applications of Paillier’s probabilistic public-key system. In Public Key Cryptography, Hideki Imai and Yuliang Zheng (Eds.). Springer, 119--136.
[13]
Robert Huijie Deng, Xuhua Ding, Yongdong Wu, and Zhuo Wei. 2014. Efficient block-based transparent encryption for H. 264/SVC bitstreams. Multimedia Systems 20, 2, 165--178.
[14]
Cunsheng Ding. 1996. Chinese Remainder Theorem. World Scientific, Singapore.
[15]
Taher ElGamal. 1985. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory 31, 4, 469--472.
[16]
Craig Gentry. 2009. A Fully Homomorphic Encryption Scheme. Ph.D. Dissertation. Stanford University, Stanford, CA.
[17]
Oded Goldreich, Silvio Micali, and Avi Wigderson. 1987. How to play any mental game. In Proceedings of the 19th Annual ACM Symposium on Theory of Computing. ACM, New York, NY, 218--229.
[18]
Shafi Goldwasser and Silvio Micali. 1984. Probabilistic encryption. Journal of Computer and System Sciences 28, 2, 270--299.
[19]
Xianjun Hu, Weiming Zhang, Honggang Hu, and Nenghai Yu. 2014. Non-local denoising in encrypted images. In Internet of Vehicles--Technologies and Services. Springer, New York, NY, 386--395.
[20]
Piotr Indyk and Rajeev Motwani. 1998. Approximate nearest neighbors: Towards removing the curse of dimensionality. In Proceedings of the 30th Annual ACM Symposium on Theory of Computing. ACM, New York, NY, 604--613.
[21]
William B. Johnson and Joram Lindenstrauss. 1984. Extensions of Lipschitz mappings into a Hilbert space. Contemporary Mathematics 26, 1, 189--206.
[22]
Christine Jost, Ha Lam, Alexander Maximov, and Ben Smeets. 2015. Encryption performance improvements of the Paillier cryptosystem. Retrieved February 8, 2016 from https://eprint.iacr.org/2015/864.pdf.
[23]
Jonathan Katz and Yehuda Lindell. 2007. Introduction to Modern Cryptography. Chapman & Hall/CRC Cryptography and Network Security Series, Boca Raton, FL.
[24]
Krishnaram Kenthapadi, Aleksandra Korolova, Ilya Mironov, and Nina Mishra. 2012. Privacy via the Johnson-Lindenstrauss transform. arXiv preprint arXiv:1204.2606.
[25]
Reginald L. Lagendijk, Zekeriya Erkin, and Mauro Barni. 2013. Encrypted signal processing for privacy protection: Conveying the utility of homomorphic encryption and multiparty computation. IEEE Signal Processing Magazine 30, 1, 82--105.
[26]
Ankita Lathey and Pradeep K. Atrey. 2015. Image enhancement in encrypted domain over cloud. ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM’15) 11, 3, 38.
[27]
Ankita Lathey, Pradeep K. Atrey, and Nishant Joshi. 2013. Homomorphic low pass filtering on encrypted multimedia over cloud. In Proceedings of the IEEE 7th International Conference on Semantic Computing (ICSC’13). IEEE, 310--313.
[28]
Peter Mell and Tim Grance. 2009. Draft NIST working definition of cloud computing. Referenced on June. 3rd, 2009 Online at http://csrc.nist.gov/groups/SNS/cloud-computing/index.html.
[29]
Claudio Orlandi. 2011. Is multiparty computation any good in practice? In Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP’11). IEEE, 5848--5851.
[30]
Pascal Paillier. 1999. Public-key cryptosystems based on composite degree residuosity classes. In Advances in cryptology (EUROCRYPT’99). Springer, 223--238.
[31]
Kui Ren, Cong Wang, Qian Wang, and others. 2012. Security challenges for the public cloud. IEEE Internet Computing 16, 1, 69--73.
[32]
Ronald L. Rivest, Len Adleman, and Michael L. Dertouzos. 1978. On data banks and privacy homomorphisms. Foundations of Secure Computation 32, 4, 169--178.
[33]
Sayed M. Saghaian, Nejad Esfahani, Ying Luo, and S.-C. S. Cheung. 2012. Privacy protected image denoising with secret shares. In Proceedings of the 2012 19th IEEE International Conference on Image Processing (ICIP’12). IEEE, 253--256.
[34]
Adi Shamir. 1979. How to share a secret. Communications of the ACM 22, 11, 612--613.
[35]
Andrew Chi-Chih Yao. 1982. Protocols for secure computations. In FOCS, Vol. 82. 160--164.
[36]
Peijia Zheng and Jiwu Huang. 2011. Implementation of the discrete wavelet transform and multiresolution analysis in the encrypted domain. In Proceedings of the 19th ACM International Conference on Multimedia. ACM, New York, NY, 413--422.
[37]
Peijia Zheng and Jiwu Huang. 2013a. Discrete wavelet transform and data expansion reduction in homomorphic encrypted domain. IEEE Transactions on Image Processing 22, 6, 2455--2468.
[38]
Peijia Zheng and Jiwu Huang. 2013b. Walsh-Hadamard transform in the homomorphic encrypted domain and its application in image watermarking. In Information Hiding, Jessica Fridrich (Ed.). Springer, 240--254.
[39]
Hongchao Zhou and Gregory Wornell. 2014. Efficient homomorphic encryption on integer vectors and its applications. In Proceedings of the Information Theory and Applications Workshop (ITA’14). IEEE, 1--9.

Cited By

View all
  • (2023)Dual-Lens HDR using Guided 3D Exposure CNN and Guided Denoising TransformerACM Transactions on Multimedia Computing, Communications, and Applications10.1145/357916719:5(1-20)Online publication date: 16-Mar-2023
  • (2022)Efficient and Secure Outsourced Image Watermarking in Cloud ComputingArtificial Intelligence and Security10.1007/978-3-031-06788-4_44(526-537)Online publication date: 15-Jul-2022
  • (2021)Denoising Signals on the Graph for Distributed Systems by Secure Outsourced Computation2021 IEEE 7th World Forum on Internet of Things (WF-IoT)10.1109/WF-IoT51360.2021.9595245(524-529)Online publication date: 14-Jun-2021
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Multimedia Computing, Communications, and Applications
ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 12, Issue 3
June 2016
227 pages
ISSN:1551-6857
EISSN:1551-6865
DOI:10.1145/2901366
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 08 March 2016
Accepted: 01 December 2015
Revised: 01 November 2015
Received: 01 August 2015
Published in TOMM Volume 12, Issue 3

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Image denoising
  2. Johnson-Lindenstrauss transform
  3. Paillier homomorphic encryption
  4. nonlocal means

Qualifiers

  • Research-article
  • Research
  • Refereed

Funding Sources

  • 100 Talents Program of Chinese Academy of Sciences
  • Fundamental Research Funds for the Central Universities in China
  • Strategic Priority Research Program through the Chinese Academy of Sciences
  • National Natural Science Foundation of China

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)0
Reflects downloads up to 15 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2023)Dual-Lens HDR using Guided 3D Exposure CNN and Guided Denoising TransformerACM Transactions on Multimedia Computing, Communications, and Applications10.1145/357916719:5(1-20)Online publication date: 16-Mar-2023
  • (2022)Efficient and Secure Outsourced Image Watermarking in Cloud ComputingArtificial Intelligence and Security10.1007/978-3-031-06788-4_44(526-537)Online publication date: 15-Jul-2022
  • (2021)Denoising Signals on the Graph for Distributed Systems by Secure Outsourced Computation2021 IEEE 7th World Forum on Internet of Things (WF-IoT)10.1109/WF-IoT51360.2021.9595245(524-529)Online publication date: 14-Jun-2021
  • (2021)Robust Privacy-Preserving Motion Detection and Object Tracking in Encrypted Streaming VideoIEEE Transactions on Information Forensics and Security10.1109/TIFS.2021.312881716(5381-5396)Online publication date: 2021
  • (2021)Privacy-Protected Denoising for Signals on Graphs from Distributed Systems2021 IEEE International Symposium on Circuits and Systems (ISCAS)10.1109/ISCAS51556.2021.9401233(1-5)Online publication date: May-2021
  • (2019)A Robust Watermarking Scheme for Encrypted JPEG Bitstreams with Format-Compliant Encryption2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)10.1109/TrustCom/BigDataSE.2019.00060(397-403)Online publication date: Aug-2019
  • (2019)Denoising in the Dark: Privacy-Preserving Deep Neural Network Based Image DenoisingIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2019.2907081(1-1)Online publication date: 2019
  • (2018)Efficient Encrypted Images Filtering and Transform Coding With Walsh-Hadamard Transform and ParallelizationIEEE Transactions on Image Processing10.1109/TIP.2018.280219927:5(2541-2556)Online publication date: May-2018
  • (2018)Edge Detection and Image Segmentation on Encrypted Image with Homomorphic Encryption and Garbled Circuit2018 IEEE International Conference on Multimedia and Expo (ICME)10.1109/ICME.2018.8486551(1-6)Online publication date: Jul-2018
  • (2018)Toward Secure Image Denoising: A Machine Learning Based Realization2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)10.1109/ICASSP.2018.8462073(6936-6940)Online publication date: Apr-2018
  • Show More Cited By

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media