CryptoImg: Privacy preserving processing over encrypted images

Cloud computing services provide a scalable solution for the storage and processing of images and multimedia files. However, concerns about privacy risks prevent users from sharing their personal images with third-party services. In this paper, we describe the design and implementation of CryptoImg, a library of modular privacy preserving image processing operations over encrypted images. By using homomorphic encryption, CryptoImg allows the users to delegate their image processing operations to remote servers without any privacy concerns. Currently, CryptoImg supports a subset of the most frequently used image processing operations such as image adjustment, spatial filtering, edge sharpening, histogram equalization and others. We implemented our library as an extension to the popular computer vision library OpenCV. CryptoImg can be used from either mobile or desktop clients. Our experimental results demonstrate that CryptoImg is efficient while performing operations over encrypted images with negligible error and reasonable time overheads on the supported platforms.

[1]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[2]  Paul Scheunders,et al.  Advanced Concepts for Intelligent Vision Systems , 2018, Lecture Notes in Computer Science.

[3]  Shafi Goldwasser,et al.  Machine Learning Classification over Encrypted Data , 2015, NDSS.

[4]  Xiaohui Yuan,et al.  Ensure privacy and security in the process of medical image analysis , 2013, 2013 IEEE International Conference on Granular Computing (GrC).

[5]  Craig Gentry,et al.  A fully homomorphic encryption scheme , 2009 .

[6]  Yan Zhang,et al.  A secure image retrieval method based on homomorphic encryption for cloud computing , 2014, 2014 19th International Conference on Digital Signal Processing.

[7]  Ali Shokoufandeh,et al.  Secure Signal Processing Using Fully Homomorphic Encryption , 2015, ACIVS.

[8]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[9]  Weiming Zhang,et al.  Secure Nonlocal Denoising in Outsourced Images , 2016, ACM Trans. Multim. Comput. Commun. Appl..

[10]  Pierangela Samarati Security and Privacy in the Cloud , 2016, CLOSER.

[11]  Milan Sonka,et al.  Image pre-processing , 1993 .

[12]  Wilhelm Burger,et al.  Digital Image Processing - An Algorithmic Introduction using Java , 2008, Texts in Computer Science.

[13]  Soo-Chang Pei,et al.  Image Feature Extraction in Encrypted Domain With Privacy-Preserving SIFT , 2012, IEEE Transactions on Image Processing.

[14]  Nan Hu,et al.  Secure Image Filtering , 2006, 2006 International Conference on Image Processing.

[15]  Jean-Michel Morel,et al.  A Review of Image Denoising Algorithms, with a New One , 2005, Multiscale Model. Simul..

[16]  Pradeep K. Atrey,et al.  Image Enhancement in Encrypted Domain over Cloud , 2015, ACM Trans. Multim. Comput. Commun. Appl..