Degradation and encryption for outsourced PNG images in cloud storage

In cloud storage environment, users frequently store images and retrieve them by personal device, including mobile phones. However, the content of outsourced images will be leaked to the cloud server, which is not trusted by users. To protect the privacy of sensitive images, this paper proposes format-compliant degradation and encryption method for Portable Network Graphics PNG. More specifically, for PNG degradation, improved prefix method and noise generation methods are developed. Furthermore, for PNG encryption, a modified generalised-Feistel method is developed. Finally, our security analysis demonstrates that the proposed scheme is secure. Our experiment results also show that the scheme is efficient and practical.

[1]  Fatos Xhafa,et al.  L-EncDB: A lightweight framework for privacy-preserving data queries in cloud computing , 2015, Knowl. Based Syst..

[2]  Jin Li,et al.  TMDS: Thin-Model Data Sharing Scheme Supporting Keyword Search in Cloud Storage , 2014, ACISP.

[3]  Jingwei Li,et al.  Cycle-walking revisited: consistency, security, and efficiency , 2013, Secur. Commun. Networks.

[4]  Thomas Stütz,et al.  A Survey of H.264 AVC/SVC Encryption , 2012, IEEE Transactions on Circuits and Systems for Video Technology.

[5]  Thomas Stütz,et al.  On Format-Compliant Iterative Encryption of JPEG2000 , 2006, Eighth IEEE International Symposium on Multimedia (ISM'06).

[6]  John Black,et al.  Ciphers with Arbitrary Finite Domains , 2002, CT-RSA.

[7]  Jingwei Li,et al.  Format-preserving encryption for DateTime , 2010, 2010 IEEE International Conference on Intelligent Computing and Intelligent Systems.

[8]  Thomas Stütz,et al.  Efficient Format-Compliant Encryption of Regular Languages: Block-Based Cycle-Walking , 2010, Communications and Multimedia Security.

[9]  Информатика Portable Network Graphics , 2010 .

[10]  Robert H. Deng,et al.  A scalable and format-compliant encryption scheme for H.264/SVC bitstreams , 2012, Signal Process. Image Commun..

[11]  Ilsun You,et al.  New order preserving encryption model for outsourced databases in cloud environments , 2016, J. Netw. Comput. Appl..

[12]  G A Sathish Kumar,et al.  A secure triple level encryption method using cryptography and steganography , 2011, Proceedings of 2011 International Conference on Computer Science and Network Technology.

[13]  Gerardo Pelosi,et al.  Supporting concurrency and multiple indexes in private access to outsourced data , 2013, J. Comput. Secur..

[14]  Robert H. Deng,et al.  Compliant encryption of JPEG2000 codestreams , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[15]  Anand Gupta,et al.  A Novel Scheme to Hide Identity Information in Mobile Captured Images , 2012, SOCO 2012.

[16]  Thomas Stütz,et al.  Format-Compliant JPEG2000 Encryption in JPSEC: Security, Applicability, and the Impact of Compression Parameters , 2007, EURASIP J. Inf. Secur..