Outsourcing chaotic selective image encryption to the cloud with steganography

被引:26
作者
Xiang, Tao [1 ,2 ]
Hu, Jia [2 ]
Sun, Jianglin [2 ]
机构
[1] Chongqing Univ, Minist Educ, Key Lab Dependable Serv Comp Cyber Phys Soc, Chongqing 400044, Peoples R China
[2] Chongqing Univ, Coll Comp Sci, Chongqing 400044, Peoples R China
关键词
Selective encryption; Outsourcing; Cloud computing; Chaos; Steganography; ONLY MULTIMEDIA CIPHERS; QUANTITATIVE CRYPTANALYSIS; PRIVACY; SECURE;
D O I
10.1016/j.dsp.2015.05.006
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper considers the problem where resource-limited client such as a smartphone wants to outsource chaotic selective image encryption to the cloud; meanwhile the client does not want to reveal the plain image to the cloud. A general solution is proposed with the help of steganography. The client first selects the important data to be selectively encrypted, embeds it into a cover image, and sends the stego image to the cloud for outsourced encryption; after receiving the encrypted stego image from the cloud, the client can extract the secret data in its encrypted form and get the selectively encrypted image. Theoretical analysis and extensive experiments are conducted to validate the correctness, security, and performance of the proposed scheme. It is shown that the client can fulfill the task of selective image encryption securely and save much overhead at the same time. (C) 2015 Elsevier Inc. All rights reserved.
引用
收藏
页码:28 / 37
页数:10
相关论文
共 43 条
[1]  
[Anonymous], IEEE NORD SIGN PROC
[2]  
[Anonymous], IEEE INT S SIGN PROC
[3]   A View of Cloud Computing [J].
Armbrust, Michael ;
Fox, Armando ;
Griffith, Rean ;
Joseph, Anthony D. ;
Katz, Randy ;
Konwinski, Andy ;
Lee, Gunho ;
Patterson, David ;
Rabkin, Ariel ;
Stoica, Ion ;
Zaharia, Matei .
COMMUNICATIONS OF THE ACM, 2010, 53 (04) :50-58
[4]  
Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
[5]   Privacy-Preserving Biometric Identification Using Secure Multiparty Computation [J].
Bringer, Julien ;
Chabanne, Herve ;
Patey, Alain .
IEEE SIGNAL PROCESSING MAGAZINE, 2013, 30 (02) :42-52
[6]   Hiding data in images by simple LSB substitution [J].
Chan, CK ;
Cheng, LM .
PATTERN RECOGNITION, 2004, 37 (03) :469-474
[7]   A high payload frequency-based reversible image hiding method [J].
Chang, Chin-Chen ;
Pai, Pei-Yan ;
Yeh, Chia-Ming ;
Chan, Yung-Kuan .
INFORMATION SCIENCES, 2010, 180 (11) :2286-2298
[8]   A symmetric image encryption scheme based on 3D chaotic cat maps [J].
Chen, GR ;
Mao, YB ;
Chui, CK .
CHAOS SOLITONS & FRACTALS, 2004, 21 (03) :749-761
[9]   Partial encryption of compressed images and videos [J].
Cheng, H ;
Li, XB .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2000, 48 (08) :2439-2451
[10]  
Daneshkhah A., 2011, Proceedings of the 2011 2nd International Conference on Intelligent Systems, Modelling and Simulation (ISMS 2011), P189, DOI 10.1109/ISMS.2011.39