Abstract
In contemporary society, people can easily use any smart device at hand to capture images of scenery and upload them to cloud storage. Cloud storage is widely used for storing user generated multimedia content. However, the risk of potential private data leakage exists because cloud storage is normally in a public domain. To protect the privacy information of images on cloud storage, we propose an integrated scheme involving invisible watermarking, masking and secret sharing methods. The histogram modification-based scheme can achieve reversible data hiding to ensure the integrity and confidentiality of image data. Additionally, a secret sharing scheme was used to further improve the security of data access. The evaluation results show that the proposed system may prevent malicious users from accessing private images.
Similar content being viewed by others
Change history
22 November 2017
In the original publication, figure labels a and b of Fig. 11 were missing. The original article has been corrected.
References
Bender W, Gruhl D, Morimoto N, Lu A (1996) Techniques for data hiding. IBM Syst J 35(3.4):313–336
Gracia-Tinedo R, Artigas MS, Moreno-Martinez A, Cotes C, and Lopez PG, (2013) “Actively measuring personal cloud storage,” in 2013 I.E. Sixth International Conference on Cloud Computing, pp. 301-308
Hamzaoui R and Saupe D, (2006) Fractal image compression. CRC Press, pp. 168-169
Huynh-Thu Q, Ghanbari M (2008) Scope of validity of psnr in image/video quality assessment. Electron Lett 44(13):800–801
Lee SK, Suh YH, and Ho YS, (2006) “Reversiblee image authentication based on watermarking,” in 2006 I.E. International Conference on Multimedia and Expo, pp. 1321-1324
Liu D, Liu W, and Zhang G, (2008) “An adaptive watermarking scheme based on nonsubsampled contourlet transform for color image authentication,” in 2008 The 9th International Conference for Young Computer Scientists, pp. 748-752
Ni Z, Shi Y.-Q, Ansari N, and Su W, “Reversible data hiding,” IEEE Trans Cir and Sys for Video Technol, vol. 16, no. 3, pp. 354-362, 2006
Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613
Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circ Syst Video Technol 13(8):890–896
Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612
Wang C, Zhang B, Ren K, Roveda JM (2013) Privacy-assured outsourcing of image reconstruction service in cloud. IEEE Trans Emerg Topics Comput 1(1):166–177
Wang H, Wu S, Chen M, Wang W (2014) Security protection between users and the mobile media cloud. IEEE Commun Mag 52(3):73–79
Wu HT, Dugelay JL, Shi YQ (2015) Reversible image data hiding with contrast enhancement. IEEE Signal Process Lett 22(1):81–85
Zhang L, Jung T, Liu C, Ding X, Li XY, and Liu Y, (2015) “Pop: Privacy-preserving outsourced photo sharing and searching for mobile devices,” in 2015 I.E. 35th International Conference on Distributed Computing Systems, pp. 308-317
Zhou L, Wu D, Zheng B, Guizani M (2014) Joint physical-application layer security for wireless multimedia delivery. IEEE Commun Mag 52(3):66–72
Author information
Authors and Affiliations
Corresponding author
Additional information
The original version of this article was revised: Figure labels a and b of Fig. 11 were missing.
Rights and permissions
About this article
Cite this article
Wu, MY., Yu, MC., Leu, JS. et al. Enhancing security and privacy of images on cloud by histogram shifting and secret sharing. Multimed Tools Appl 77, 17285–17305 (2018). https://doi.org/10.1007/s11042-017-5306-5
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-017-5306-5