skip to main content
10.1145/2756601.2756618acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
research-article

Thumbnail-Preserving Encryption for JPEG

Published:17 June 2015Publication History

ABSTRACT

With more and more data being stored in the cloud, securing multimedia data is becoming increasingly important. Use of existing encryption methods with cloud services is possible, but makes many web-based applications difficult or impossible to use. In this paper, we propose a new image encryption scheme specially designed to protect JPEG images in cloud photo storage services. Our technique allows efficient reconstruction of an accurate low-resolution thumbnail from the ciphertext image, but aims to prevent the extraction of any more detailed information. This will allow efficient storage and retrieval of image data in the cloud but protect its contents from outside hackers or snooping cloud administrators. Experiments of the proposed approach using an online selfie database show that it can achieve a good balance of privacy, utility, image quality, and file size.

References

  1. Simon Baker and Takeo Kanade. Limits on super-resolution and how to break them. IEEE Transactions on Pattern Analysis and Machine Intelligence, 24(9):1167--1183, September 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Doug Beaver, Sanjeev Kumar, Harry C Li, Jason Sobel, Peter Vajgel, et al. Finding a needle in haystack: Facebook's photo storage. In OSDI, volume 10, pages 1--8, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. H. Cheng and Xiaobo Li. Partial encryption of compressed images and videos. Signal Processing, IEEE Transactions on, 48(8):2439--2451, Aug 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Jeff Erickson. Lower bounds for linear satisfiability problems. In Proceedings of the Sixth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA '95, pages 388--395, Philadelphia, PA, USA, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Ronald Aylmer Fisher and Frank Yates. Statistical tables for biological, agricultural and medical research. 3rd edition, 1949.Google ScholarGoogle Scholar
  6. William T Freeman, Egon C Pasztor, and Owen T Carmichael. Learning low-level vision. International Journal of Computer Vision, 40(1):25--47, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Andy Greenberg. The police tool that pervs use to steal nude pics from Apple's iCloud. Wired, September 2014.Google ScholarGoogle Scholar
  8. Lala Krikor, Sami Baba, Thawar Arif, and Zyad Shaaban. Image encryption using DCT and stream cipher. European Journal of Scientific Research, 32(1):47--57, 2009.Google ScholarGoogle Scholar
  9. Moses Liskov, Ronald L Rivest, and David Wagner. Tweakable block ciphers. In Advances in Cryptology--CRYPTO 2002, pages 31--46. Springer, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Benoit M Macq and Jean-Jacques Quisquater. Cryptology for digital TV broadcasting. Proceedings of the IEEE, 83(6), 1995.Google ScholarGoogle ScholarCross RefCross Ref
  11. Niels Provos and David Mazieres. A future-adaptable password scheme. In USENIX Annual Technical Conference, FREENIX Track, pages 81--91, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Moo-Ryong Ra, Ramesh Govindan, and Antonio Ortega. P3: Toward privacy-preserving photo sharing. In NSDI, pages 515--528, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Somini Sengupta and Kevin J. O'Brien. Facebook can ID faces, but using them grows tricky. The New York Times, September 2012.Google ScholarGoogle Scholar
  14. Changgui Shi and Bharat Bhargava. An efficient mpeg video encryption algorithm. In Reliable Distributed Systems, 1998. Proceedings. Seventeenth IEEE Symposium on, pages 381--386. IEEE, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Thomas Stütz and Andreas Uhl. On efficient transparent JPEG2000 encryption. In Proceedings of the 9th ACM Workshop on Multimedia & Security, pages 97--108. ACM, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Lei Tang. Methods for encrypting and decrypting mpeg video data efficiently. In Proceedings of the Fourth ACM International Conference on Multimedia, MULTIMEDIA '96, pages 219--229, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Matt Tierney, Ian Spiro, Christoph Bregler, and Lakshminarayanan Subramanian. Cryptagram: Photo privacy for online social media. In Proceedings of the First ACM Conference on Online Social Networks, COSN '13, pages 75--88. ACM, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Alise Tifentale and Lev Manovich. Selfiecity: Exploring Photography and Self-Fashioning in Social Media. Palgrave Macmillan, Forthcoming.Google ScholarGoogle Scholar
  19. Andreas Unterweger and Andreas Uhl. Length-preserving bit-stream-based jpeg encryption. In Proceedings of the 14th ACM Workshop on Multimedia and security, pages 85--90. ACM, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Marc Van Droogenbroeck. Partial encryption of images for real-time applications. Fourth IEEE Benelux Signal Processing, pages 11--15, 2004.Google ScholarGoogle Scholar
  21. Qiang Wang, Xiaoou Tang, and Harry Shum. Patch based blind image super resolution. In Tenth IEEE International Conference on Computer Vision, volume 1, pages 709--716. IEEE, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Thumbnail-Preserving Encryption for JPEG

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            IH&MMSec '15: Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security
            June 2015
            182 pages
            ISBN:9781450335874
            DOI:10.1145/2756601

            Copyright © 2015 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 17 June 2015

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

            Acceptance Rates

            IH&MMSec '15 Paper Acceptance Rate20of45submissions,44%Overall Acceptance Rate128of318submissions,40%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader