skip to main content
research-article

Secure Cloud-Based Image Tampering Detection and Localization Using POB Number System

Published: 28 June 2017 Publication History

Abstract

The benefits of high-end computation infrastructure facilities provided by cloud-based multimedia systems are attracting people all around the globe. However, such cloud-based systems possess security issues as third party servers become involved in them. Rendering data in an unreadable form so that no information is revealed to the cloud data centers will serve as the best solution to these security issues. One such image encryption scheme based on a Permutation Ordered Binary Number System has been proposed in this work. It distributes the image information in totally random shares, which can be stored at the cloud data centers. Further, the proposed scheme authenticates the shares at the pixel level. If any tampering is done at the cloud servers, the scheme can accurately identify the altered pixels via authentication bits and localizes the tampered area. The tampered portion is also reflected back in the reconstructed image that is obtained at the authentic user end. The experimental results validate the efficacy of the proposed scheme against various kinds of possible attacks, tested with a variety of images. The tamper detection accuracy has been computed on a pixel basis and found to be satisfactorily high for most of the tampering scenarios.

References

[1]
Mazhar Ali, Samee U. Khan, and Athanasios V. Vasilakos. 2015. Security in cloud computing: Opportunities and challenges. Inf. Sci. 305 (2015), 357--383.
[2]
Charles Asmuth and John Bloom. 1983. A modular approach to key safeguarding. IEEE Transactions on Information Theory 29, 2 (1983), 208--210.
[3]
Gaurav Bhatnagar, Q. M. Jonathan Wu, and Pradeep K. Atrey. 2013. Secure randomized image watermarking based on singular value decomposition. ACM Trans. Multimedia Comput. Commun. Appl. 10, 1, Article 4 (Dec. 2013), 21 pages.
[4]
V. P. Binu and A. Sreekumar. 2014. Generalized secret sharing using permutation ordered binary system. CoRR abs/1407.3609 (2014). http://arxiv.org/abs/1407.3609.
[5]
George Robert Blakley. 1979. Safeguarding cryptographic keys. In Proceedings of the National Computer Conference. 313--317.
[6]
Dan Bogdanov. 2007. Foundations and properties of shamirs secret sharing scheme research seminar in cryptography. University of Tartu, Institute of Computer Science.
[7]
Marco Botta, Davide Cavagnino, and Victor Pomponiu. 2014. Protecting the content integrity of digital imagery with fidelity preservation: An improved version. ACM Trans. Multimedia Comput. Commun. Appl. 10, 3, Article 29 (April 2014), 5 pages.
[8]
Zouhair Chiba, Noureddine Abghour, Khalid Moussaid, Amina El Omri, and Mohamed Rida. 2016. A survey of intrusion detection systems for cloud computing environment. In Proceedings of the International Conference on Engineering 8 MIS (ICEMIS). IEEE, 1--13.
[9]
MP Deepika and A Sreekumar. 2016. A novel secret sharing scheme using POB number system and CRT. Int. J. Appl. Eng. Res. 11, 3 (2016), 2049--2054.
[10]
Robert H. Deng and Yanjiang Yang. 2009. A study of content authentication in proxy-enabled multimedia delivery systems: Model, techniques, and applications. ACM Trans. Multimedia Comput. Commun. Appl. 5, 4, Article 28 (Nov. 2009), 20 pages.
[11]
Jiri Fridrich and Miroslav Goljan. 1999. Protection of digital images using self embedding. In Symposium on Content Security and Data Hiding in Digital Media. Newark, NJ.
[12]
Jessica Fridrich, Miroslav Goljan, and Nasir Memon. 2002. Cryptanalysis of the Yeung--Mintzer fragile watermarking technique. Journal of Electronic Imaging 11, 2 (2002), 262--274.
[13]
Mohamed Hefeeda and Kianoosh Mokhtarian. 2010. Authentication schemes for multimedia streams: Quantitative analysis and comparison. ACM Trans. Multimedia Comput. Commun. Appl. 6, 1, Article 6 (Feb. 2010), 24 pages.
[14]
Ankita Lathey and Pradeep K. Atrey. 2015. Image enhancement in encrypted domain over cloud. ACM Trans. Multimedia Comput. Commun. Appl. 11, 3, Article 38 (Feb. 2015), 24 pages.
[15]
Pei-Yu Lin, Jung-San Lee, and Chin-Chen Chang. 2011. Protecting the content integrity of digital imagery with fidelity preservation. ACM Trans. Multimedia Comput. Commun. Appl. 7, 3, Article 15 (Sept. 2011), 20 pages.
[16]
Maurice Mignotte. 1983. How to share a secret. In Proceedings of the 1982 Conference on Cryptography. Springer-Verlag, Berlin, 371--375. http://dl.acm.org/citation.cfm?id=1756088.1756122.
[17]
Manoranjan Mohanty, Wei Tsang Ooi, and Pradeep K. Atrey. 2013. Scale me, crop me, know me not: Supporting scaling and cropping in secret image sharing. In ICME. IEEE Computer Society, 1--6. http://dblp.uni-trier.de/db/conf/icmcs/icme2013.html#MohantyOA13.
[18]
Manoranjan Mohanty, Wei Tsang Ooi, and Pradeep K. Atrey. 2016. Secret sharing approach for securing cloud-based pre-classification volume ray-casting. Multimedia Tools Appl. 75, 11 (2016), 6207--6235.
[19]
Ruchira Naskar and RajatSubhra Chakraborty. 2013. A generalized tamper localization approach for reversible watermarking algorithms. ACM Trans. Multimedia Comput. Commun. Appl. 9, 3, Article 19 (July 2013), 22 pages.
[20]
Krešimir Popović and Željko Hocenski. 2010. Cloud computing security issues and challenges. In Proceedings of the 33rd International Convention. IEEExplore, Opatija. 344--349.
[21]
Sanjay Rawat and Balasubramanian Raman. 2011. A chaotic system based fragile watermarking scheme for image tamper detection. AEU-International Journal of Electronics and Communications 65, 10 (2011), 840--847.
[22]
Adi Shamir. 1979. How to share a secret. Commun. ACM 22, 11 (Nov. 1979), 612--613.
[23]
Claude Elwood Shannon. 1949. Communication theory of secrecy systems. The Bell System Technical Journal 28, 4 (1949), 656--715.
[24]
Hamid R. Sheikh, Zhou Wang, Lawrence Cormack, and Alan C. Bovik. 2005. LIVE image quality assessment database release 2 (2005). (2005).
[25]
Shivendra Shivani, Anoop Kumar Patel, Sushila Kamble, and Suneeta Agarwal. 2011. An effective pixel-wise fragile watermarking scheme based on ARA bits. In Proceedings of the 2011 International Conference on Communication, Computing 8 Security. ACM, 221--226.
[26]
Priyanka Singh and Suneeta Agarwal. 2015. An efficient fragile watermarking scheme with multilevel tamper detection and recovery based on dynamic domain selection. Multimedia Tools and Applications (2015), 1--30.
[27]
Kuyoro So. 2011. Cloud computing security issues and challenges. Int. J. Comput. Networks 3, 5 (2011).
[28]
A Sreekumar and S Babu Sundar. 2009. An efficient secret sharing scheme for n out of n scheme using POB-number system. Hack. in 2009 (2009), 33.
[29]
Dimitrios Zissis and Dimitrios Lekkas. 2012. Addressing cloud computing security issues. Future Generation Computer Systems 28, 3 (2012), 583--592.

Cited By

View all
  • (2025)Research on Multimodal Image Tampering Detection and Counterfeit Image Recognition Techniques under Deep Learning FrameworkApplied Mathematics and Nonlinear Sciences10.2478/amns-2025-001810:1Online publication date: 3-Feb-2025
  • (2024)SwinShadow: Shifted Window for Ambiguous Adjacent Shadow DetectionACM Transactions on Multimedia Computing, Communications, and Applications10.1145/368880320:11(1-20)Online publication date: 27-Aug-2024
  • (2024)A distortion-free authentication method for color images with tampering localization and self-recoverySignal Processing: Image Communication10.1016/j.image.2024.117116124(117116)Online publication date: May-2024
  • Show More Cited By

Index Terms

  1. Secure Cloud-Based Image Tampering Detection and Localization Using POB Number System

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Transactions on Multimedia Computing, Communications, and Applications
      ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 13, Issue 3
      August 2017
      233 pages
      ISSN:1551-6857
      EISSN:1551-6865
      DOI:10.1145/3104033
      Issue’s Table of Contents
      © 2017 Association for Computing Machinery. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of a national government. As such, the Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 28 June 2017
      Accepted: 01 March 2017
      Revised: 01 February 2017
      Received: 01 September 2016
      Published in TOMM Volume 13, Issue 3

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Permutation ordered binary (POB) number system
      2. encrypted domain
      3. secret sharing

      Qualifiers

      • Research-article
      • Research
      • Refereed

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)3
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 28 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2025)Research on Multimodal Image Tampering Detection and Counterfeit Image Recognition Techniques under Deep Learning FrameworkApplied Mathematics and Nonlinear Sciences10.2478/amns-2025-001810:1Online publication date: 3-Feb-2025
      • (2024)SwinShadow: Shifted Window for Ambiguous Adjacent Shadow DetectionACM Transactions on Multimedia Computing, Communications, and Applications10.1145/368880320:11(1-20)Online publication date: 27-Aug-2024
      • (2024)A distortion-free authentication method for color images with tampering localization and self-recoverySignal Processing: Image Communication10.1016/j.image.2024.117116124(117116)Online publication date: May-2024
      • (2024)Convergent encryption enabled secure data deduplication algorithm for cloud environmentConcurrency and Computation: Practice and Experience10.1002/cpe.820536:21Online publication date: 21-Jun-2024
      • (2023)Security Analysis of Visual based Share Authentication and Algorithms for Invalid Shares Generation in Malicious ModelProceedings of the 2023 5th International Conference on Image Processing and Machine Vision10.1145/3582177.3582192(86-92)Online publication date: 13-Jan-2023
      • (2023)PRNU-based Image Forgery Localization with Deep Multi-scale FusionACM Transactions on Multimedia Computing, Communications, and Applications10.1145/354868919:2(1-20)Online publication date: 6-Feb-2023
      • (2023)Perceptual image hashing using rotation invariant uniform local binary patterns and color feature10.1016/bs.adcom.2022.12.001(163-205)Online publication date: 2023
      • (2023)Security enhancement of an (n, n) threshold non-expansible XOR-based visual cryptography with unique meaningful sharesMultimedia Tools and Applications10.1007/s11042-023-16657-383:10(28913-28926)Online publication date: 8-Sep-2023
      • (2022)A self-embedding secure fragile watermarking scheme with high quality recoveryJournal of Visual Communication and Image Representation10.1016/j.jvcir.2022.10343783:COnline publication date: 1-Feb-2022
      • (2022)Medical images lossless recovery based on POB number system and image compressionMultimedia Tools and Applications10.1007/s11042-022-12266-881:8(11415-11440)Online publication date: 17-Feb-2022
      • Show More Cited By

      View Options

      Login options

      Full Access

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media