Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

access icon free SVD-based image compression, encryption, and identity authentication algorithm on cloud

Based on singular value decomposition (SVD), an image compression, encryption, and identity authentication scheme is proposed here. This scheme can not only encrypt image data which would store in the cloud but also implement identity authentication. The authors use the SVD to decompose the image data into three parts: the left singular value matrix, the right singular value matrix, and the singular value matrix. The left singular value matrix and right singular value matrix are not as important as the singular value matrix. They propose a logistic-tent-sine chaotic system to encrypt them. In this scheme, they proposed a novel authentication value calculation algorithm, which can calculate the authentication value according to related data. According to the authentication value calculated from the ciphertext, the algorithm has the perfect authentication performance, so as in the scenarios if the image is cropped or added noisy. Theoretical analysis and empirical evaluations show that the proposed system can achieve better compression performance, satisfactory security performance, and low computational complexity.

References

    1. 1)
      • 22. Guo, Q., Zhang, C., Zhang, Y.: ‘An efficient SVD-based method for image denoising’, IEEE Trans. Circ. Syst. Video Tech., 2016, 26, (5), pp. 868880.
    2. 2)
      • 15. Guiqiang, H., Xiao, D, Xiang, T, et al: ‘A compressive sensing based privacy preserving outsourcing of image storage and identity authentication service in cloud’, Inf. Sci., 2017, 387, pp. 132145.
    3. 3)
      • 31. Available at http://host.robots.ox.ac.uk/pascal/VOC/voc2007/VOCtrainval_06-Nov-2007.tar.
    4. 4)
      • 9. Hsu, C., Lu, C., Pei, S.: ‘Homomorphic encryption-based secure SIFT for privacy-preserving feature extraction’, Proc. SPIE, 2011, 7880, p. 788005.
    5. 5)
      • 3. Lu, W., Avinash, L., Ashwin, S., et al: ‘Secure image retrieval through feature protection’. 2009 IEEE Int. Conf. on Acoustics, Speech and Signal Processing (ICASSP), Taipei, Taiwan, 2009, pp. 15331536.
    6. 6)
      • 13. Tharaud, J., Wohlgemuth, S., Echizen, I., et al: ‘Privacy by data provenance with digital watermarking’. Proc. of Sixth Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), Darmstadt, Germany, 2010, pp. 510513.
    7. 7)
      • 29. Prasantha, H.S., Shashidhara, H.L., Murthy, K.N.B.: ‘Image compression using SVD’. Proc. Int. Conf. Computational Intelligence and Multimedia Applications, IEEE Computer Society, Sivakasi, Tamil Nadu, India, December 2007, pp. 143145.
    8. 8)
      • 26. Hua, Z., Zhou, Y., Pun, C.M.: ‘Image encryption using 2D logistic-sine chaotic map’. IEEE Int. Conf. on Systems, Man and Cybernetics, San Diego, CA, USA, October 2014, pp. 32293234.
    9. 9)
      • 12. Wang, C., Wang, Q., Ren, K.: ‘Privacy-preserving public auditing for data storage security in cloud computing’. Proc. Int. Conf. Computer Communications, San Diego, USA, 2010, pp. 1419.
    10. 10)
      • 21. Andrews, H.C., Patterson, C.I.: ‘Singular value decomposition (SVD) image coding’, IEEE Trans. Commun., 1976, 24, (4), pp. 425432.
    11. 11)
      • 8. Xia, Z., Wang, X., Zhang, L., et al: ‘A privacy preserving and copy-deterrence content-based image retrieval scheme in cloud computing’, IEEE Trans. Inf. Forensics Sec., 2016, 11, (11), pp. 25942608.
    12. 12)
      • 33. Gu, K., Li, L., Lu, H., et al: ‘A fast reliable image quality predictor by fusing micro- and macro-structures’, IEEE Trans. Ind. Electron., 2017, 64, (5), pp. 39033912.
    13. 13)
      • 18. Satendra, P., Gaurav, B.: ‘A new robust watermarking system in integer DCT domain’, J. Vis. Commun. Image R., 2018, 53, pp. 86101.
    14. 14)
      • 24. Zhu, H., Li, L.: ‘Improving for chaotic image encryption algorithm based on logistic map’. Proc. Int. Conf. Environmental Science and Information Application Technology, Wuhan, China, July 2010, pp. 211214.
    15. 15)
      • 1. Mbarek, M., Ali, K., Hassan, O.: ‘A framework to secure medical image storage in cloud computing environment’, J. Electron. Commer. Organ., 2018, 16, (1), pp. 116.
    16. 16)
      • 11. Parakh, A., Kak, S.: ‘Space efficient secret sharing for implicit data security’, Inf. Sci., 2011, 181, (2), pp. 335341.
    17. 17)
      • 23. Skretting, K., Engan, K.: ‘Image compression using learned dictionaries by RLS-DLA and compared with K-SVD’. IEEE Int. Conf. on Acoustics, Speech and Signal Processing, Prague, Czech Republic, 2011, pp. 15171520.
    18. 18)
      • 10. Naehrig, M., Lauter, K., Vaikuntanathan, V.: ‘Can homomorphic encryption be practical?’. Proc. 3rd ACM Workshop Cloud Computing Security (CCSW), Chicago, USA, 2011, pp. 113124.
    19. 19)
      • 28. Zhou, Y., Bao, L., Chen, C.L.P.: ‘A new 1D chaotic system for image encryption’, Signal Process., 2014, 97, pp. 172182.
    20. 20)
      • 6. David, C.: ‘Cloud computing risk and audit issues’, Comput. Stand. Interfaces, 2015, 42, (11), pp. 137142.
    21. 21)
      • 25. Li, Y., Wang, C., Chen, H.: ‘A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation’, Opt. Lasers Eng., 2017, 90, (3), pp. 238246.
    22. 22)
      • 32. Zhang, L., Zhang, L., Mou, X., et al: ‘FSIM: a feature similarity index for image qualtiy assessment’, IEEE Trans. Image Proc., 2011, 20, (8), pp. 23782386.
    23. 23)
      • 30. Available at http://www.vision.caltech.edu/Image_Datasets/Caltech256/256_ObjectCategories.tar.
    24. 24)
      • 4. Hsu, C.: ‘Image feature extraction in encrypted domain with privacy-preserving SIFT’, IEEE Trans. Image Proc., 2012, 21, (11), pp. 45934607.
    25. 25)
      • 27. Arroyo, D., Diaz, J., Rodriguez, F.B.: ‘Cryptanalysis of a one round chaos-based substitution permutation network’, Signal Process., 2013, 93, (5), pp. 13581364.
    26. 26)
      • 5. Divekar, A., Ersoy, O.: ‘Compact storage of correlated data for content-based retrieval’. Conf. Record of the Forty-Third Asilomar Conf. on Signals, Systems and Computers, Pacific Grove, USA, 2009.
    27. 27)
      • 14. Itani, W., Kayssi, A., Chehab, A.: ‘Privacy as a service: privacy-aware data storage and processing in cloud computing architectures’. Proc. Int. Conf. Dependable, Autonomic and Secure Computing, Chengdu, China, 2009, pp. 711716.
    28. 28)
      • 17. Wu, W, Lin, Z.: ‘SVD-based self-embedding image authentication scheme using quick response code features’, J. Vis. Commun. Image R., 2016, 38, pp. 1828.
    29. 29)
      • 7. Casas, I., Taheri, J., Ranjan, R., et al: ‘GA-ETI: an enhanced genetic algorithm for the scheduling of scientific workflows in cloud environments’, J. Comput. Sci., 2018, 26, (5), pp. 318331.
    30. 30)
      • 19. Khalid, M.H., Yasmeen, M.K., Walid, I.K., et al: ‘Robust image hashing using exact Gaussian–Hermite moments’, IET Image Process., 2018, 12, (12), pp. 21782185.
    31. 31)
      • 16. Haouzia, A., Noumeir, R.: ‘Methods for image authentication: a survey’, Multimedia Tools Appl., 2008, 39, (1), pp. 146.
    32. 32)
      • 20. Tang, N., Chen, L., Zhang, X., et al: ‘Robust image hashing with tensor decomposition’, IEEE Trans. Knowl. Data Eng., 2019, 31, (3), pp. 549560.
    33. 33)
      • 2. Yu, C., Chen, C., Chao, C.: ‘Proof of ownership in deduplicated cloud storage with mobile device efficiency’, IEEE Netw., 2015, 29, (2), pp. 5155.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ipr.2018.5912
Loading

Related content

content/journals/10.1049/iet-ipr.2018.5912
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address