A Reversible Framework for Efficient and Secure Visual Privacy Protection

被引:15
作者
Zhang, Yushu [1 ,2 ]
Ye, Xi [1 ,2 ]
Xiao, Xiangli [1 ,2 ]
Xiang, Tao [3 ]
Li, Hongwei [4 ]
Cao, Xiaochun [5 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 211106, Peoples R China
[2] Zhengzhou Xinda Inst Adv Technol, Zhengzhou 450001, Peoples R China
[3] Chongqing Univ, Coll Comp Sci, Chongqing 400044, Peoples R China
[4] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 610054, Peoples R China
[5] Sun Yat sen Univ, Sch Cyber Sci & Technol, Shenzhen Campus, Shenzhen 518107, Peoples R China
基金
中国国家自然科学基金;
关键词
Encryption; Privacy; Usability; Security; Visualization; Image restoration; Image filtering; Visual privacy protection; thumbnail preserving; reversible data hiding; ENCRYPTED IMAGES; PIXELATION;
D O I
10.1109/TIFS.2023.3280341
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The number of images produced by people everyday is rapidly increasing in recent years and their local storage space may be not big enough for storing all these images. As a result, people are currently accustomed to uploading images to cloud platforms, which raises privacy concerns. Traditional image encryption is a way to protect image privacy without preserving visual usability, so that image owners fail to conveniently browse and manage their images stored in the cloud. Hence some visual privacy protection schemes were proposed to balance image privacy and usability, while many of them are irreversible. Recently, a novel reversible technology, called Thumbnail-Preserving Encryption (TPE), has been a hot topic. However, existing TPE schemes are either inefficient, or cannot perfectly restore the original image and meanwhile achieve Nonce-Respecting (NR) security. In view of this, we propose a reversible framework for efficient and secure visual privacy protection, which tunably preserves image visual usability for image owners with the idea of data hiding. In the framework, the original image is firstly divided into several regions by our proposed region division methods and one of the regions is vacated by data hiding. Then, the vacated region is utilized to preserve the original thumbnail by pixel adjustment after image encryption. Finally, pixels in each sub block are permuted for security. According to our theoretical analysis, the above processes are completely reversible and the processed image achieves NR security. Furthermore, we conduct extensive experiments, including recognition by various application programming interfaces, user surveys, and efficiency comparison, to demonstrate that our framework is efficient and strikes a good balance between privacy and usability.
引用
收藏
页码:3334 / 3349
页数:16
相关论文
共 50 条
[21]   Privacy contracts incorporated in a privacy protection framework [J].
Oberholzer, HJG ;
Olivier, MS .
COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2006, 21 (01) :5-16
[22]   An efficient and secure searchable public key encryption scheme with privacy protection for cloud storage [J].
Libing Wu ;
Biwen Chen ;
Sherali Zeadally ;
Debiao He .
Soft Computing, 2018, 22 :7685-7696
[23]   An efficient and secure searchable public key encryption scheme with privacy protection for cloud storage [J].
Wu, Libing ;
Chen, Biwen ;
Zeadally, Sherali ;
He, Debiao .
SOFT COMPUTING, 2018, 22 (23) :7685-7696
[24]   Privacy protected surveillance using secure visual object coding [J].
Martin, Karl ;
Plataniotis, Konstantinos N. .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2008, 18 (08) :1152-1162
[25]   A Secure Client-Side Framework for Protecting the Privacy of Health Data Stored on the Cloud [J].
Sakr, Ali ;
Yaacoub, Elias ;
Noura, Hassan ;
Al-Husseini, Mohammed ;
Abualsaud, Khalid ;
Khattab, Tamer ;
Guizani, Mohsen .
2018 IEEE MIDDLE EAST AND NORTH AFRICA COMMUNICATIONS CONFERENCE (MENACOMM), 2018, :13-18
[26]   Visual Quality Optimization for Privacy Protection Bar-based Secure Image Display Technique [J].
Park, Sanghyun ;
Kang, Sang-ug .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (07) :3664-3677
[27]   E-TPE: Efficient Thumbnail-Preserving Encryption for Privacy Protection in Visual Sensor Networks [J].
Zhao, Ruoyu ;
Zhang, Yushu ;
Wen, Wenying ;
Lan, Rushi ;
Xiang, Yong .
ACM TRANSACTIONS ON SENSOR NETWORKS, 2024, 20 (04)
[28]   A Privacy-Preserving and Secure Framework for Opportunistic Routing in DTNs [J].
Zhang, Lei ;
Song, Jun ;
Pan, Jianping .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2016, 65 (09) :7684-7697
[29]   A Framework for Privacy-aware and Secure Decentralized Data Storage [J].
Aslam, Sidra ;
Mrissa, Michael .
COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2023, 20 (03) :1235-1261
[30]   Privacy Issues and Protection in Secure Data Outsourcing [J].
Khodadadi, Touraj ;
Islam, A. K. M. Muzahidul ;
Baharun, Sabariah ;
Komaki, Shozo .
JURNAL TEKNOLOGI-SCIENCES & ENGINEERING, 2014, 69 (06)