Outsourcing chaotic selective image encryption to the cloud with steganography

This paper considers the problem where resource-limited client such as a smartphone wants to outsource chaotic selective image encryption to the cloud; meanwhile the client does not want to reveal the plain image to the cloud. A general solution is proposed with the help of steganography. The client first selects the important data to be selectively encrypted, embeds it into a cover image, and sends the stego image to the cloud for outsourced encryption; after receiving the encrypted stego image from the cloud, the client can extract the secret data in its encrypted form and get the selectively encrypted image. Theoretical analysis and extensive experiments are conducted to validate the correctness, security, and performance of the proposed scheme. It is shown that the client can fulfill the task of selective image encryption securely and save much overhead at the same time. We propose a scheme to source chaotic selective image encryption to the cloud.The plain image is encrypted by the cloud but not exposed to it by steganography.The client can extract the embedded secret data directly in its encrypted form.The scheme saves significantly computations and communication cost for the client.

[1]  Enrico Magli,et al.  Multimedia Selective Encryption by Means of Randomized Arithmetic Coding , 2006, IEEE Transactions on Multimedia.

[2]  A. Yao,et al.  Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.

[3]  Kazuki Murakami,et al.  Improvement of security in cloud systems based on steganography , 2013, 2013 International Joint Conference on Awareness Science and Technology & Ubi-Media Computing (iCAST 2013 & UMEDIA 2013).

[4]  Chunhe Song,et al.  Secure and effective image storage for cloud based e-healthcare systems , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).

[5]  Niels Provos,et al.  Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..

[6]  Rima Assaf,et al.  Efficient neural chaotic generator for image encryption , 2014, Digit. Signal Process..

[7]  Bharat K. Bhargava,et al.  A Survey of Computation Offloading for Mobile Systems , 2012, Mobile Networks and Applications.

[8]  Andreas Uhl,et al.  SELECTIVE BITPLANE ENCRYPTION FOR SECURE TRANSMISSION OF IMAGE DATA IN MOBILE ENVIRONMENTS , 2002 .

[9]  Zhifeng Xiao,et al.  Security and Privacy in Cloud Computing , 2013, IEEE Communications Surveys & Tutorials.

[10]  Julien Bringer,et al.  Privacy-Preserving Biometric Identification Using Secure Multiparty Computation: An Overview and Recent Trends , 2013, IEEE Signal Processing Magazine.

[11]  J. Fridrich Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .

[12]  Matt Blaze,et al.  Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.

[13]  Nan Hu,et al.  Secure Image Filtering , 2006, 2006 International Conference on Image Processing.

[14]  Omed Khalind,et al.  Single-mismatch 2LSB embedding steganography , 2013, IEEE International Symposium on Signal Processing and Information Technology.

[15]  Andrew D. Ker Improved Detection of LSB Steganography in Grayscale Images , 2004, Information Hiding.

[16]  Tao Zhang,et al.  Reliable detection of LSB steganography based on the difference image histogram , 2003, 2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03)..

[17]  Toby Sharp,et al.  An Implementation of Key-Based Digital Signal Steganography , 2001, Information Hiding.

[18]  Andrew D. Ker Steganalysis of Embedding in Two Least-Significant Bits , 2007, IEEE Transactions on Information Forensics and Security.

[19]  Gail-Joon Ahn,et al.  Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.

[20]  C. Chui,et al.  A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .

[21]  Andrew Chi-Chih Yao,et al.  Protocols for secure computations , 1982, FOCS 1982.

[22]  Min-Shiang Hwang,et al.  A Study of Attribute-based Proxy Re-encryption Scheme in Cloud Environments , 2014, Int. J. Netw. Secur..

[23]  Randy H. Katz,et al.  A view of cloud computing , 2010, CACM.

[24]  Lin Teng,et al.  A novel colour image encryption algorithm based on chaos , 2012, Signal Process..

[25]  Chin-Chen Chang,et al.  A high payload frequency-based reversible image hiding method , 2010, Inf. Sci..

[26]  Nikolaos G. Bourbakis,et al.  A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks , 2008, Signal Process. Image Commun..

[27]  Laurent Nana,et al.  A Novel Cryptographic Encryption Technique for Securing Digital Images in the Cloud Using AES and RGB Pixel Displacement , 2013, 2013 European Modelling Symposium.

[28]  X. Liao,et al.  Selective image encryption using a spatiotemporal chaotic system. , 2007, Chaos.

[29]  Petros Boufounos,et al.  Privacy-preserving nearest neighbor methods: comparing signals without revealing them , 2013, IEEE Signal Processing Magazine.

[30]  Lee-Ming Cheng,et al.  Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..

[31]  Andreas Pfitzmann,et al.  Attacks on Steganographic Systems , 1999, Information Hiding.

[32]  Zhihua Xia,et al.  Steganalysis of two least significant bits embedding based on least square method , 2009, 2009 ISECS International Colloquium on Computing, Communication, Control, and Management.

[33]  Ajaz Hussain Mir,et al.  Classification of steganalysis techniques: A study , 2010, Digit. Signal Process..

[34]  G. Manoj Someswar,et al.  Time-Based Proxy Re-encryption Scheme for Secure Data Sharing in a Cloud Environment , 2015 .

[35]  Kee-Young Yoo,et al.  A New Steganography Scheme Based on an Index-Color Image , 2009, 2009 Sixth International Conference on Information Technology: New Generations.

[36]  Craig Gentry,et al.  Fully homomorphic encryption using ideal lattices , 2009, STOC '09.

[37]  Xiaohui Yuan,et al.  Ensure privacy and security in the process of medical image analysis , 2013, 2013 IEEE International Conference on Granular Computing (GrC).

[38]  Xiaobo Li,et al.  Partial encryption of compressed images and videos , 2000, IEEE Trans. Signal Process..

[39]  Ross J. Anderson,et al.  Evaluation of copyright marking systems , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.

[40]  Craig Gentry,et al.  Computing arbitrary functions of encrypted data , 2010, CACM.

[41]  Muthucumaru Maheswaran,et al.  Privacy aware image template matching in clouds using ambient data , 2013, The Journal of Supercomputing.

[42]  Kwok-Tung Lo,et al.  Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks , 2011, Signal Process..

[43]  Hassan Aghaeinia,et al.  A More Secure Steganography Method in Spatial Domain , 2011, 2011 Second International Conference on Intelligent Systems, Modelling and Simulation.