Image Processing in Encrypted Domain for Distributed Storage in Cloud

被引:0
作者
Deepthi, S. [1 ]
Lakshmi, V. S. [1 ]
Deepthi, P. P. [1 ]
机构
[1] NIT Calicut, ECE Dept, Kozhikode, India
来源
2017 2ND IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET) | 2017年
关键词
Image processing in encrypted domain; Shamir's secret sharing; homomorphic encryption; cloud computing;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The advancements in the area of Signal processing in encrypted domain aka s.p.e.d are extremely useful for cloud computing and other distributed storage applications. Even though cloud computing provides solution for storage and processing of bulk data, it raises severe security concerns, especially when the data contain sensitive personal information. This necessitates the need for devising methods for processing the data in encrypted domain. Image processing techniques in encrypted domain either suffer from complex data processing operations or restricted distribution requirements. This paper attempts to resolve security issues in distribution of computationally efficient Shamir's secret sharing scheme. Also, two important image processing operations viz., image interpolation and 2D DCT are implemented in encrypted domain over cloud. Analysis show that quality of the processing operations is at par with that of the corresponding operations in plain domain
引用
收藏
页码:1478 / 1482
页数:5
相关论文
共 11 条
[1]  
Bianchi T., 2009, EURASIP J. Inf. Security, DOI DOI 10.1155/2009/716357
[2]   On the Implementation of the Discrete Fourier Transform in the Encrypted Domain [J].
Bianchi, Tiziano ;
Piva, Alessandro ;
Barni, Mauro .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2009, 4 (01) :86-97
[3]  
Cheraghi A, 2014, INT J NONLINEAR ANAL, V5, P60
[4]   Image Enhancement in Encrypted Domain over Cloud [J].
Lathey, Ankita ;
Atrey, Pradeep K. .
ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2015, 11 (03)
[5]  
Mohammadi M., 2013, Iranian Conference on Electrical Engineering (ICEE), P1, DOI DOI 10.1109/PESMG.2013.6672514
[6]  
Mohanty M., 2012, Proceedings of the 20th ACM international conference on Multimedia, P1105
[7]  
Peijia Zheng, 2013, Information Hiding. 14th International Conference, IH 2012 Revised Selected Papers, P240, DOI 10.1007/978-3-642-36373-3_16
[8]  
SaghaianNejadEsfahani SM, 2012, IEEE IMAGE PROC, P253, DOI 10.1109/ICIP.2012.6466843
[9]   HOW TO SHARE A SECRET [J].
SHAMIR, A .
COMMUNICATIONS OF THE ACM, 1979, 22 (11) :612-613
[10]   Discrete Wavelet Transform and Data Expansion Reduction in Homomorphic Encrypted Domain [J].
Zheng, Peijia ;
Huang, Jiwu .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2013, 22 (06) :2455-2468