Abstract
Privacy-preserving outsourced image sharing schemes can help relieve the local storage of image owners and protect images’ privacy by sending encrypted images to receivers, but they cannot prevent the decrypted image from being illegally distributed by illegal distributors. To cope with this issue, we propose a privacy-preserving image sharing scheme with illegal distributor detection (POISIDD). POISIDD embeds the authentication information of image receiver in the encrypted form based on discrete cosine transform (DCT) and privacy-preserving outsourced calculation on floating point numbers (POCF) . Moreover, in order to prevent all operations from being carried out by the single cloud which may lead to privacy disclosure, we adopt two platforms (Storage Center and Authentication Center) to achieve the embedding of authentication information(AI) by the communications between them. Furthermore, in order to better defend against attackers, we generate random vectors based on the original AI and use them instead of the AI as the embedded data. The aim of identifying illegal distributor will be achieved with the help of Authentication Center. The scheme is secure under the defined attack model, and its robustness under different attacks has been shown by experiments.
Similar content being viewed by others
References
Ahmed NN, Natarajan T, Rao KR (1974) Discrete cosine transform. IEEE Transactions on Computers C–23(1):90–93
Amato F, Moscato V, Picariello A, Piccialli F (2017) Sos: a multimedia recommender system for online social networks. Future Generation Computer Systems 93:914–923
Cheng B, Zhuo L, Bai Y, Peng Y, Zhang J (2014) Secure index construction for privacy-preserving large-scale image retrieval. In: 2014 IEEE fourth international conference on big data and cloud computing. IEEE Computer Society, pp 116–120
Gull S, Loan N, Parah S, Sheikh J, Bhat G (2018) An efficient watermarking technique for tamper detection and localization of medical images. Journal of Ambient Intelligence and Humanized Computing 11:1799–1808
He J, Liu B, Kong D, Bao X, Wang N, Jin H, Kesidis G (2016) PUPPIES: transformation-supported personalized privacy preserving partial image sharing. In: 46th annual IEEE/IFIP international conference on dependable systems and networks. IEEE Computer Society, pp 359–370
Ilia P, Polakis I, Athanasopoulos E, Maggi F, Ioannidis S (2015) Face/off: preventing privacy leakage from photos in social networks. In: Proceedings of the 22nd ACM SIGSAC conference on computer and communications security. ACM, pp 781–792
Khan A, Siddiqa A, Munib S, Malik SA (2014) A recent survey of reversible watermarking techniques. Information Sciences 279:251–272
Khosravi MR, Samadi S (2019) Efficient payload communications for iot-enabled visar vehicles using discrete cosine transform-based quasi-sparse bit injection. EURASIP J Wirel Commun Netw 2019:262
Khosravi MR, Samadi S (2020) Reliable data aggregation in internet of visar vehicles using chained dual-phase adaptive interpolation and data embedding. IEEE Internet Things J 7(4):2603–2610
Liu X, Deng RH, Ding W, Lu R, Qin B (2016) Privacy-preserving outsourced calculation on floating point numbers. IEEE Transactions on Information Forensics and Security 11(11):2513–2527
Meng S, Huang W, Yin X, Khosravi MR, Li Q, Wan S, Qi L (2021) Security-aware dynamic scheduling for real-time optimization in cloud-based industrial applications. IEEE Trans Ind Informatics 17(6):4219–4228
Mondal M, Yilmaz GS, Hirsch N, Khan MT, Tang M, Tran C, Kanich C, Ur B, Zheleva E (2019) Moving beyond set-it-and-forget-it privacy settings on social media. In: Proceedings of the 2019 ACM SIGSAC conference on computer and communications security. ACM, pp 991–1008
Mukherjee D, Das R, Majumdar S, Ghosh S, Thepade SD, Basu A (2019) Energy efficient face recognition in mobile-fog environment. Procedia Computer Science 152:274–281
Narasimman A, Wang Q, Li F, Lee D, Luo B (2019) Arcana: enabling private posts on public microblog platforms. In: ICT systems security and privacy protection, vol 562. Springer, pp 271–285
Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. In: Advances in cryptology - EUROCRYPT ’99, vol 1592. Springer, pp 223–238
Puteaux P, Puech W (2018) An efficient msb prediction-based method for high-capacity reversible data hiding in encrypted images. IEEE Transactions on Information Forensics and Security 13(7):1670–1681
Qian Z, Zhang X (2016) Reversible data hiding in encrypted images with distributed source encoding. IEEE Transactions on Circuits and Systems for Video Technology 26(4):636–646
Qu X, Kim HJ (2015) Pixel-based pixel value ordering predictor for high-fidelity reversible data hiding. Signal Processing 111(C):249–260
Singh AK (2017) Improved hybrid algorithm for robust and imperceptible multiple watermarking using digital images. Multimed Tools Applic 76(6):8881–8900
Singh D, Singh SK (2017) DWT-SVD and DCT based robust and blind watermarking scheme for copyright protection. Multimedia Tools and Applications 76(11):13001–13024
Tierney M, Spiro I, Bregler C, Subramanian L (2013) Cryptagram: photo privacy for online social media. In: Proceedings of the first ACM conference on online social networks. Association for Computing Machinery, pp 75–88
Wu H, Huang J, Shi Y (2015) A reversible data hiding method with contrast enhancement for medical images. Journal of Visual Communication and Image Representation 31:146–153
Xia Z, Wang X, Zhang L, Qin Z, Sun X, Ren K (2016) A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Transactions on Information Forensics and Security 11(11):2594–2608
Xie S, Kirillov A, Girshick RB, He K (2019) Exploring randomly wired neural networks for image recognition. In: 2019 IEEE/CVF international conference on computer vision. IEEE, pp 1284–1293
Xu X, Mo R, Yin X, Khosravi MR, Aghaei F, Chang V, Li G (2021) Pdm: privacy-aware deployment of machine-learning applications for industrial cyber-physical cloud systems. IEEE Transactions on Industrial Informatics 17(8):5819–5828
Yang Y, Zheng X, Guo W, Liu X, Chang V (2019) Privacy-preserving smart iot-based healthcare big data storage and self-adaptive access control system. Information Sciences 479:567–592
Yuan L, Korshunov P, Ebrahimi T (2015) Privacy-preserving photo sharing based on a secure JPEG. In: 2015 IEEE conference on computer communications workshops. IEEE, pp 185–190
Zear A, Singh AK, Kumar P (2018) A proposed secure multiple watermarking technique based on dwt, DCT and SVD for application in medicine. Multimed Tools Applic 77(4):4863–4882
Zhang X (2011) Reversible data hiding in encrypted image. IEEE Signal Processing Letters 18(4):255–258
Zhang X, Long J, Wang Z, Cheng H (2016) Lossless and reversible data hiding in encrypted images with public-key cryptography. IEEE Transactions on Circuits and Systems for Video Technology 26(9):1622–1631
Acknowledgements
This work is supported by the National Natural Science Foundation of China (No.61872090, No.61872086).
Author information
Authors and Affiliations
Ethics declarations
Conflicts of interest
We declare that we do not have any commercial or associative interest that represents a conflict of interest in connection with the work submitted.
Rights and permissions
About this article
Cite this article
Deng, T., Li, X., Xiong, J. et al. POISIDD: privacy-preserving outsourced image sharing scheme with illegal distributor detection in cloud computing. Multimed Tools Appl 81, 3693–3714 (2022). https://doi.org/10.1007/s11042-021-11737-8
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-021-11737-8