Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Enhancing security and privacy of images on cloud by histogram shifting and secret sharing

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

A Correction to this article was published on 22 November 2017

This article has been updated

Abstract

In contemporary society, people can easily use any smart device at hand to capture images of scenery and upload them to cloud storage. Cloud storage is widely used for storing user generated multimedia content. However, the risk of potential private data leakage exists because cloud storage is normally in a public domain. To protect the privacy information of images on cloud storage, we propose an integrated scheme involving invisible watermarking, masking and secret sharing methods. The histogram modification-based scheme can achieve reversible data hiding to ensure the integrity and confidentiality of image data. Additionally, a secret sharing scheme was used to further improve the security of data access. The evaluation results show that the proposed system may prevent malicious users from accessing private images.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

Change history

  • 22 November 2017

    In the original publication, figure labels a and b of Fig. 11 were missing. The original article has been corrected.

References

  1. Bender W, Gruhl D, Morimoto N, Lu A (1996) Techniques for data hiding. IBM Syst J 35(3.4):313–336

    Article  Google Scholar 

  2. Gracia-Tinedo R, Artigas MS, Moreno-Martinez A, Cotes C, and Lopez PG, (2013) “Actively measuring personal cloud storage,” in 2013 I.E. Sixth International Conference on Cloud Computing, pp. 301-308

  3. Hamzaoui R and Saupe D, (2006) Fractal image compression. CRC Press, pp. 168-169

  4. Huynh-Thu Q, Ghanbari M (2008) Scope of validity of psnr in image/video quality assessment. Electron Lett 44(13):800–801

    Article  Google Scholar 

  5. Lee SK, Suh YH, and Ho YS, (2006) “Reversiblee image authentication based on watermarking,” in 2006 I.E. International Conference on Multimedia and Expo, pp. 1321-1324

  6. Liu D, Liu W, and Zhang G, (2008) “An adaptive watermarking scheme based on nonsubsampled contourlet transform for color image authentication,” in 2008 The 9th International Conference for Young Computer Scientists, pp. 748-752

  7. Ni Z, Shi Y.-Q, Ansari N, and Su W, “Reversible data hiding,” IEEE Trans Cir and Sys for Video Technol, vol. 16, no. 3, pp. 354-362, 2006

  8. Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613

    Article  MathSciNet  MATH  Google Scholar 

  9. Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circ Syst Video Technol 13(8):890–896

    Article  Google Scholar 

  10. Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612

    Article  Google Scholar 

  11. Wang C, Zhang B, Ren K, Roveda JM (2013) Privacy-assured outsourcing of image reconstruction service in cloud. IEEE Trans Emerg Topics Comput 1(1):166–177

    Article  Google Scholar 

  12. Wang H, Wu S, Chen M, Wang W (2014) Security protection between users and the mobile media cloud. IEEE Commun Mag 52(3):73–79

    Article  Google Scholar 

  13. Wu HT, Dugelay JL, Shi YQ (2015) Reversible image data hiding with contrast enhancement. IEEE Signal Process Lett 22(1):81–85

    Article  Google Scholar 

  14. Zhang L, Jung T, Liu C, Ding X, Li XY, and Liu Y, (2015) “Pop: Privacy-preserving outsourced photo sharing and searching for mobile devices,” in 2015 I.E. 35th International Conference on Distributed Computing Systems, pp. 308-317

  15. Zhou L, Wu D, Zheng B, Guizani M (2014) Joint physical-application layer security for wireless multimedia delivery. IEEE Commun Mag 52(3):66–72

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jenq-Shiou Leu.

Additional information

The original version of this article was revised: Figure labels a and b of Fig. 11 were missing.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wu, MY., Yu, MC., Leu, JS. et al. Enhancing security and privacy of images on cloud by histogram shifting and secret sharing. Multimed Tools Appl 77, 17285–17305 (2018). https://doi.org/10.1007/s11042-017-5306-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-5306-5

Keywords