ABSTRACT
With more and more data being stored in the cloud, securing multimedia data is becoming increasingly important. Use of existing encryption methods with cloud services is possible, but makes many web-based applications difficult or impossible to use. In this paper, we propose a new image encryption scheme specially designed to protect JPEG images in cloud photo storage services. Our technique allows efficient reconstruction of an accurate low-resolution thumbnail from the ciphertext image, but aims to prevent the extraction of any more detailed information. This will allow efficient storage and retrieval of image data in the cloud but protect its contents from outside hackers or snooping cloud administrators. Experiments of the proposed approach using an online selfie database show that it can achieve a good balance of privacy, utility, image quality, and file size.
- Simon Baker and Takeo Kanade. Limits on super-resolution and how to break them. IEEE Transactions on Pattern Analysis and Machine Intelligence, 24(9):1167--1183, September 2002. Google ScholarDigital Library
- Doug Beaver, Sanjeev Kumar, Harry C Li, Jason Sobel, Peter Vajgel, et al. Finding a needle in haystack: Facebook's photo storage. In OSDI, volume 10, pages 1--8, 2010. Google ScholarDigital Library
- H. Cheng and Xiaobo Li. Partial encryption of compressed images and videos. Signal Processing, IEEE Transactions on, 48(8):2439--2451, Aug 2000. Google ScholarDigital Library
- Jeff Erickson. Lower bounds for linear satisfiability problems. In Proceedings of the Sixth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA '95, pages 388--395, Philadelphia, PA, USA, 1995. Google ScholarDigital Library
- Ronald Aylmer Fisher and Frank Yates. Statistical tables for biological, agricultural and medical research. 3rd edition, 1949.Google Scholar
- William T Freeman, Egon C Pasztor, and Owen T Carmichael. Learning low-level vision. International Journal of Computer Vision, 40(1):25--47, 2000. Google ScholarDigital Library
- Andy Greenberg. The police tool that pervs use to steal nude pics from Apple's iCloud. Wired, September 2014.Google Scholar
- Lala Krikor, Sami Baba, Thawar Arif, and Zyad Shaaban. Image encryption using DCT and stream cipher. European Journal of Scientific Research, 32(1):47--57, 2009.Google Scholar
- Moses Liskov, Ronald L Rivest, and David Wagner. Tweakable block ciphers. In Advances in Cryptology--CRYPTO 2002, pages 31--46. Springer, 2002. Google ScholarDigital Library
- Benoit M Macq and Jean-Jacques Quisquater. Cryptology for digital TV broadcasting. Proceedings of the IEEE, 83(6), 1995.Google ScholarCross Ref
- Niels Provos and David Mazieres. A future-adaptable password scheme. In USENIX Annual Technical Conference, FREENIX Track, pages 81--91, 1999. Google ScholarDigital Library
- Moo-Ryong Ra, Ramesh Govindan, and Antonio Ortega. P3: Toward privacy-preserving photo sharing. In NSDI, pages 515--528, 2013. Google ScholarDigital Library
- Somini Sengupta and Kevin J. O'Brien. Facebook can ID faces, but using them grows tricky. The New York Times, September 2012.Google Scholar
- Changgui Shi and Bharat Bhargava. An efficient mpeg video encryption algorithm. In Reliable Distributed Systems, 1998. Proceedings. Seventeenth IEEE Symposium on, pages 381--386. IEEE, 1998. Google ScholarDigital Library
- Thomas Stütz and Andreas Uhl. On efficient transparent JPEG2000 encryption. In Proceedings of the 9th ACM Workshop on Multimedia & Security, pages 97--108. ACM, 2007. Google ScholarDigital Library
- Lei Tang. Methods for encrypting and decrypting mpeg video data efficiently. In Proceedings of the Fourth ACM International Conference on Multimedia, MULTIMEDIA '96, pages 219--229, 1996. Google ScholarDigital Library
- Matt Tierney, Ian Spiro, Christoph Bregler, and Lakshminarayanan Subramanian. Cryptagram: Photo privacy for online social media. In Proceedings of the First ACM Conference on Online Social Networks, COSN '13, pages 75--88. ACM, 2013. Google ScholarDigital Library
- Alise Tifentale and Lev Manovich. Selfiecity: Exploring Photography and Self-Fashioning in Social Media. Palgrave Macmillan, Forthcoming.Google Scholar
- Andreas Unterweger and Andreas Uhl. Length-preserving bit-stream-based jpeg encryption. In Proceedings of the 14th ACM Workshop on Multimedia and security, pages 85--90. ACM, 2012. Google ScholarDigital Library
- Marc Van Droogenbroeck. Partial encryption of images for real-time applications. Fourth IEEE Benelux Signal Processing, pages 11--15, 2004.Google Scholar
- Qiang Wang, Xiaoou Tang, and Harry Shum. Patch based blind image super resolution. In Tenth IEEE International Conference on Computer Vision, volume 1, pages 709--716. IEEE, 2005. Google ScholarDigital Library
Index Terms
- Thumbnail-Preserving Encryption for JPEG
Recommendations
Achieve Thumbnail Preserving Encryption by Sum Preserving Approaches for Images
ICFET '20: Proceedings of the 6th International Conference on Frontiers of Educational TechnologiesA large number of images are generated and uploaded to the cloud, due to the rapid development of IT and networking technologies. To prevent unauthorized access, image encryption is a way that can ensure the safety of images. However, the encrypted ...
Approximate Thumbnail Preserving Encryption
MPS '17: Proceedings of the 2017 on Multimedia Privacy and SecurityThumbnail preserving encryption (TPE) was suggested by Wright et al. [Information Hiding & Multimedia Security Workshop 2015] as a way to balance privacy and usability for online image sharing. The idea is to encrypt a plaintext image into a ciphertext ...
Privacy-preserving multireceiver ID-based encryption with provable security
Multireceiver identity ID based encryption and ID-based broadcast encryption allow a sender to use the public identities of multiple receivers to encrypt messages so that only the selected receivers or a privileged set of users can decrypt the messages. ...
Comments