Secure Cloud-Based Image Tampering Detection and Localization Using POB Number System

The benefits of high-end computation infrastructure facilities provided by cloud-based multimedia systems are attracting people all around the globe. However, such cloud-based systems possess security issues as third party servers become involved in them. Rendering data in an unreadable form so that no information is revealed to the cloud data centers will serve as the best solution to these security issues. One such image encryption scheme based on a Permutation Ordered Binary Number System has been proposed in this work. It distributes the image information in totally random shares, which can be stored at the cloud data centers. Further, the proposed scheme authenticates the shares at the pixel level. If any tampering is done at the cloud servers, the scheme can accurately identify the altered pixels via authentication bits and localizes the tampered area. The tampered portion is also reflected back in the reconstructed image that is obtained at the authentic user end. The experimental results validate the efficacy of the proposed scheme against various kinds of possible attacks, tested with a variety of images. The tamper detection accuracy has been computed on a pixel basis and found to be satisfactorily high for most of the tampering scenarios.

[1]  Suneeta Agarwal,et al.  An effective pixel-wise fragile watermarking scheme based on ARA bits , 2011, ICCCS '11.

[2]  G. R. BLAKLEY Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[3]  Nasir D. Memon,et al.  Cryptanalysis of the Yeung - Mintzer fragile watermarking technique , 2002, J. Electronic Imaging.

[4]  Maurice Mignotte,et al.  How to Share a Secret? , 1982, EUROCRYPT.

[5]  Kianoosh Mokhtarian,et al.  Authentication schemes for multimedia streams: Quantitative analysis and comparison , 2010, TOMCCAP.

[6]  Pradeep K. Atrey,et al.  Secure randomized image watermarking based on singular value decomposition , 2013, ACM Trans. Multim. Comput. Commun. Appl..

[7]  O. KuyoroS.,et al.  Cloud computing security issues and challenges , 2011 .

[8]  Rajat Subhra Chakraborty,et al.  A generalized tamper localization approach for reversible watermarking algorithms , 2013, TOMCCAP.

[9]  H.R. Sheikh,et al.  Blind quality assessment for JPEG2000 compressed images , 2002, Conference Record of the Thirty-Sixth Asilomar Conference on Signals, Systems and Computers, 2002..

[10]  Pradeep K. Atrey,et al.  Image Enhancement in Encrypted Domain over Cloud , 2015, ACM Trans. Multim. Comput. Commun. Appl..

[11]  John Bloom,et al.  A modular approach to key safeguarding , 1983, IEEE Trans. Inf. Theory.

[12]  Pradeep K. Atrey,et al.  Secret sharing approach for securing cloud-based pre-classification volume ray-casting , 2015, Multimedia Tools and Applications.

[13]  Pradeep K. Atrey,et al.  Scale me, crop me, knowme not: Supporting scaling and cropping in secret image sharing , 2013, 2013 IEEE International Conference on Multimedia and Expo (ICME).

[14]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[15]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[16]  V. P. Binu,et al.  Generalized Secret Sharing using Permutation Ordered Binary System , 2014, ArXiv.

[17]  Dimitrios Zissis,et al.  Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..

[18]  Athanasios V. Vasilakos,et al.  Security in cloud computing: Opportunities and challenges , 2015, Inf. Sci..

[19]  Mohamed Rida,et al.  A survey of intrusion detection systems for cloud computing environment , 2016, 2016 International Conference on Engineering & MIS (ICEMIS).

[20]  Robert H. Deng,et al.  A study of content authentication in proxy-enabled multimedia delivery systems: Model, techniques, and applications , 2009, TOMCCAP.

[21]  Marco Botta,et al.  Protecting the Content Integrity of Digital Imagery with Fidelity Preservation: An Improved Version , 2014, TOMCCAP.

[22]  P DeepikaM,et al.  A Novel Secret Sharing Scheme Using POB Number System and CRT , 2016 .

[23]  Chin-Chen Chang,et al.  Protecting the content integrity of digital imagery with fidelity preservation , 2011, TOMCCAP.

[24]  Suneeta Agarwal,et al.  An efficient fragile watermarking scheme with multilevel tamper detection and recovery based on dynamic domain selection , 2015, Multimedia Tools and Applications.

[25]  Alan C. Bovik,et al.  Image quality assessment using natural scene statistics , 2004 .

[26]  Balasubramanian Raman,et al.  A chaotic system based fragile watermarking scheme for image tamper detection , 2011 .