A secure image sharing scheme based on SVD and Fractional Fourier Transform

Abstract Outsourcing multimedia contents to cloud servers without obscuring may lead to an increase in security breaches that might discourage the end users from exploiting the multiple facilities provided by the cloud-based architecture. To secure the content and still be capable enough to provide the cloud services, many homomorphic encryption based schemes are being proposed in the literature. In this article, secured image outsourcing and ownership verification service in a cloud environment on the basis of singular value decomposition (SVD) and Fractional Fourier Transform (FrFT) has been proposed. It disseminates the image information via Shamir secret sharing scheme to create multiple obfuscated shares that reveal no information about the image. To assert the ownership in the encrypted domain at the receiver end, an owner specific information is embedded into some of the shares based on the secret keys. The secret information can be extracted either directly from the cloud servers or obtained after recovery of the cover media. Different attack scenarios have been analyzed considering the possibilities of the attacks that may be attempted by intruders once the information is outsourced to the cloud servers. The proposed scheme was found to be robust against various attacks, hence proving its efficacy.

[1]  Gouenou Coatrieux,et al.  A crypto-watermarking system for ensuring reliability control and traceability of medical images , 2016, Signal Process. Image Commun..

[2]  Soo-Chang Pei,et al.  Image Feature Extraction in Encrypted Domain With Privacy-Preserving SIFT , 2012, IEEE Transactions on Image Processing.

[3]  Ahmad-Reza Sadeghi,et al.  Privacy-Preserving ECG Classification With Branching Programs and Neural Networks , 2011, IEEE Transactions on Information Forensics and Security.

[4]  Mauro Barni,et al.  On the Implementation of the Discrete Fourier Transform in the Encrypted Domain , 2009, IEEE Transactions on Information Forensics and Security.

[5]  Josh Benaloh,et al.  Secret Sharing Homomorphisms: Keeping Shares of A Secret Sharing , 1986, CRYPTO.

[6]  Jiasong Wu,et al.  Robust watermarking scheme for color image based on quaternion-type moment invariants and visual cryptography , 2016, Signal Process. Image Commun..

[8]  V. Namias The Fractional Order Fourier Transform and its Application to Quantum Mechanics , 1980 .

[9]  Nasir D. Memon,et al.  A buyer-seller watermarking protocol , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).

[10]  Xinpeng Zhang,et al.  Separable Reversible Data Hiding in Encrypted Image , 2012, IEEE Transactions on Information Forensics and Security.

[11]  Gaurav Bhatnagar,et al.  Discrete fractional wavelet transform and its application to multiple encryption , 2013, Inf. Sci..

[12]  Zhenxing Qian,et al.  Reversible visible watermark embedded in encrypted domain , 2015, 2015 IEEE China Summit and International Conference on Signal and Information Processing (ChinaSIP).

[13]  Xinpeng Zhang,et al.  Self-embedding fragile watermarking based on reference-data interleaving and adaptive selection of embedding mode , 2016, Inf. Sci..

[14]  Kwok-Wo Wong,et al.  Cryptanalyzing a class of image encryption schemes based on Chinese remainder theorem , 2013, Signal Process. Image Commun..

[15]  Peijia Zheng,et al.  Discrete Wavelet Transform and Data Expansion Reduction in Homomorphic Encrypted Domain , 2013, IEEE Transactions on Image Processing.

[16]  Vincenzo Piuri,et al.  A privacy-compliant fingerprint recognition system based on homomorphic encryption and Fingercode templates , 2010, 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[17]  Balasubramanian Raman,et al.  A chaotic system based fragile watermarking scheme for image tamper detection , 2011 .

[18]  Maurice Mignotte,et al.  How to Share a Secret? , 1982, EUROCRYPT.

[19]  Gaurav Bhatnagar,et al.  A new robust reference watermarking scheme based on DWT-SVD , 2009, Comput. Stand. Interfaces.

[20]  Christian Roux,et al.  A Joint Encryption/Watermarking System for Verifying the Reliability of Medical Images , 2012, IEEE Transactions on Information Technology in Biomedicine.

[21]  John Bloom,et al.  A modular approach to key safeguarding , 1983, IEEE Trans. Inf. Theory.

[22]  Mauro Barni,et al.  Composite Signal Representation for Fast and Storage-Efficient Processing of Encrypted Signals , 2010, IEEE Transactions on Information Forensics and Security.

[23]  Mauro Barni,et al.  Encrypted Domain DCT Based on Homomorphic Cryptosystems , 2009, EURASIP J. Inf. Secur..

[24]  Ying Luo,et al.  Privacy protected image denoising with secret shares , 2012, 2012 19th IEEE International Conference on Image Processing.

[25]  Shiguo Lian,et al.  Commutative Encryption and Watermarking in Video Compression , 2007, IEEE Transactions on Circuits and Systems for Video Technology.

[26]  Mohan S. Kankanhalli,et al.  Robust Watermarking of Compressed and Encrypted JPEG2000 Images , 2012, IEEE Transactions on Multimedia.

[27]  Jianting Guo,et al.  Secure watermarking scheme against watermark attacks in the encrypted domain , 2015, J. Vis. Commun. Image Represent..

[28]  Stefan Katzenbeisser,et al.  Privacy-Preserving Face Recognition , 2009, Privacy Enhancing Technologies.

[29]  Mauro Barni,et al.  eSketch: a privacy-preserving fuzzy commitment scheme for authentication using encrypted biometrics , 2010, MM&Sec '10.

[30]  KokSheik Wong,et al.  Fast watermarking scheme for real-time spatial scalable video coding , 2016, Signal Process. Image Commun..

[31]  Alessandro Neri,et al.  A commutative digital image watermarking and encryption method in the tree structured Haar transform domain , 2011, Signal Process. Image Commun..