2DInpaint: A novel privacy-preserving scheme for image inpainting in an encrypted domain over the cloud

被引:3
作者
Tanwar, Vishesh Kumar [1 ,3 ]
Raman, Balasubramanian [2 ,4 ]
Rajput, Amitesh Singh [2 ,4 ]
Bhargava, Rama [1 ,5 ]
机构
[1] Dept Math, Roorkee, Uttarakhand, India
[2] Dept Comp Sci & Engn, Roorkee, Uttarakhand, India
[3] Indian Inst Technol Roorkee, Dept Comp Sci & Engn, Dept Math, Roorkee, Uttarakhand, India
[4] Indian Inst Technol Roorkee, Dept Comp Sci & Engn, Roorkee, Uttarakhand, India
[5] Indian Inst Technol Roorkee, Dept Math, Roorkee, Uttarakhand, India
关键词
Privacy-preserving; Visual cryptography; Bicubic interpolation; Object removal; Ramp secret sharing; SYSTEM;
D O I
10.1016/j.image.2020.115931
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The low cost, agility, and mobility of cloud services for processing and storage data have attracted user's attention today. Untrusted third parties support these services, and users are always concerned about utilizing them for personal data. Addressing these data-privacy issues for image inpainting over the cloud infrastructure(s), we propose a model, 2DInpaint, to perform image inpainting by protecting image information from an eavesdropping adversary. Inpainting is a technique for modifying an image in an undetectable manner with applications ranging from restoration of damaged photographs to object-removal and replacement of lost blocks in image coding and transmission. It can be accomplished by propagating the information in the isophotes direction of the desired region(s) from the neighborhood. Performing this propagation when the image is in the encrypted domain (ED) is a challenging dilemma. The challenge is addressed by employing a modified version of 2D-bicubic interpolation over the region to be inpainted in ED. The ramp secret sharing scheme is utilized to secure image information and to reduce storage overhead over the cloud server. 2DInpaint is proved to be information-theoretical secure in a probabilistic viewpoint and through various cryptographic attacks. The qualitative and quantitative results of 2DInpaint are analyzed under the scenarios of classical image inpainting, object-removal, and text-removal, and compared with the schemes in the plain domain. Moreover, no limitations related to the topology of the region to be inpainted are required using our approach. To the best of our knowledge, 2DInpaint is the first move towards image inpainting in the ED.
引用
收藏
页数:25
相关论文
共 50 条
[1]  
Alassaf N., 2003, ARABIA
[2]  
Ardis Paul A., 2009, VISUAL COMMUNICATION, V7257
[3]   A Variational Framework for Exemplar-Based Image Inpainting [J].
Arias, Pablo ;
Facciolo, Gabriele ;
Caselles, Vicent ;
Sapiro, Guillermo .
INTERNATIONAL JOURNAL OF COMPUTER VISION, 2011, 93 (03) :319-347
[4]   Image inpainting [J].
Bertalmio, M ;
Sapiro, G ;
Caselles, V ;
Ballester, C .
SIGGRAPH 2000 CONFERENCE PROCEEDINGS, 2000, :417-424
[5]  
BERTALMIO M, 2001, IEEE COMP SOC C COMP, V1
[6]  
Brakerski Zvika, 2014, ACM Transactions on Computation Theory, V6, DOI 10.1145/2633600
[7]   Mathematical models for local nontexture inpaintings [J].
Chan, TF ;
Shen, JH .
SIAM JOURNAL ON APPLIED MATHEMATICS, 2002, 62 (03) :1019-1043
[8]   A symmetric image encryption scheme based on 3D chaotic cat maps [J].
Chen, GR ;
Mao, YB ;
Chui, CK .
CHAOS SOLITONS & FRACTALS, 2004, 21 (03) :749-761
[9]  
Chu K.-Y., 2013, Proceedings of the 21st ACM international conference on Multimedia, P597
[10]  
Corniaux Christian L. F., 2014, 2014 International Conference on Information Science, Electronics and Electrical Engineering (ISEEE), P46, DOI 10.1109/InfoSEEE.2014.6948065