Skip to main content
Log in

POISIDD: privacy-preserving outsourced image sharing scheme with illegal distributor detection in cloud computing

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Privacy-preserving outsourced image sharing schemes can help relieve the local storage of image owners and protect images’ privacy by sending encrypted images to receivers, but they cannot prevent the decrypted image from being illegally distributed by illegal distributors. To cope with this issue, we propose a privacy-preserving image sharing scheme with illegal distributor detection (POISIDD). POISIDD embeds the authentication information of image receiver in the encrypted form based on discrete cosine transform (DCT) and privacy-preserving outsourced calculation on floating point numbers (POCF) . Moreover, in order to prevent all operations from being carried out by the single cloud which may lead to privacy disclosure, we adopt two platforms (Storage Center and Authentication Center) to achieve the embedding of authentication information(AI) by the communications between them. Furthermore, in order to better defend against attackers, we generate random vectors based on the original AI and use them instead of the AI as the embedded data. The aim of identifying illegal distributor will be achieved with the help of Authentication Center. The scheme is secure under the defined attack model, and its robustness under different attacks has been shown by experiments.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Ahmed NN, Natarajan T, Rao KR (1974) Discrete cosine transform. IEEE Transactions on Computers C–23(1):90–93

    Article  MathSciNet  Google Scholar 

  2. Amato F, Moscato V, Picariello A, Piccialli F (2017) Sos: a multimedia recommender system for online social networks. Future Generation Computer Systems 93:914–923

    Article  Google Scholar 

  3. Cheng B, Zhuo L, Bai Y, Peng Y, Zhang J (2014) Secure index construction for privacy-preserving large-scale image retrieval. In: 2014 IEEE fourth international conference on big data and cloud computing. IEEE Computer Society, pp 116–120

  4. Gull S, Loan N, Parah S, Sheikh J, Bhat G (2018) An efficient watermarking technique for tamper detection and localization of medical images. Journal of Ambient Intelligence and Humanized Computing 11:1799–1808

    Article  Google Scholar 

  5. He J, Liu B, Kong D, Bao X, Wang N, Jin H, Kesidis G (2016) PUPPIES: transformation-supported personalized privacy preserving partial image sharing. In: 46th annual IEEE/IFIP international conference on dependable systems and networks. IEEE Computer Society, pp 359–370

  6. Ilia P, Polakis I, Athanasopoulos E, Maggi F, Ioannidis S (2015) Face/off: preventing privacy leakage from photos in social networks. In: Proceedings of the 22nd ACM SIGSAC conference on computer and communications security. ACM, pp 781–792

  7. Khan A, Siddiqa A, Munib S, Malik SA (2014) A recent survey of reversible watermarking techniques. Information Sciences 279:251–272

    Article  Google Scholar 

  8. Khosravi MR, Samadi S (2019) Efficient payload communications for iot-enabled visar vehicles using discrete cosine transform-based quasi-sparse bit injection. EURASIP J Wirel Commun Netw 2019:262

    Article  Google Scholar 

  9. Khosravi MR, Samadi S (2020) Reliable data aggregation in internet of visar vehicles using chained dual-phase adaptive interpolation and data embedding. IEEE Internet Things J 7(4):2603–2610

    Article  Google Scholar 

  10. Liu X, Deng RH, Ding W, Lu R, Qin B (2016) Privacy-preserving outsourced calculation on floating point numbers. IEEE Transactions on Information Forensics and Security 11(11):2513–2527

    Article  Google Scholar 

  11. Meng S, Huang W, Yin X, Khosravi MR, Li Q, Wan S, Qi L (2021) Security-aware dynamic scheduling for real-time optimization in cloud-based industrial applications. IEEE Trans Ind Informatics 17(6):4219–4228

    Article  Google Scholar 

  12. Mondal M, Yilmaz GS, Hirsch N, Khan MT, Tang M, Tran C, Kanich C, Ur B, Zheleva E (2019) Moving beyond set-it-and-forget-it privacy settings on social media. In: Proceedings of the 2019 ACM SIGSAC conference on computer and communications security. ACM, pp 991–1008

  13. Mukherjee D, Das R, Majumdar S, Ghosh S, Thepade SD, Basu A (2019) Energy efficient face recognition in mobile-fog environment. Procedia Computer Science 152:274–281

    Article  Google Scholar 

  14. Narasimman A, Wang Q, Li F, Lee D, Luo B (2019) Arcana: enabling private posts on public microblog platforms. In: ICT systems security and privacy protection, vol 562. Springer, pp 271–285

  15. Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. In: Advances in cryptology - EUROCRYPT ’99, vol 1592. Springer, pp 223–238

  16. Puteaux P, Puech W (2018) An efficient msb prediction-based method for high-capacity reversible data hiding in encrypted images. IEEE Transactions on Information Forensics and Security 13(7):1670–1681

    Article  Google Scholar 

  17. Qian Z, Zhang X (2016) Reversible data hiding in encrypted images with distributed source encoding. IEEE Transactions on Circuits and Systems for Video Technology 26(4):636–646

    Article  Google Scholar 

  18. Qu X, Kim HJ (2015) Pixel-based pixel value ordering predictor for high-fidelity reversible data hiding. Signal Processing 111(C):249–260

    Article  Google Scholar 

  19. Singh AK (2017) Improved hybrid algorithm for robust and imperceptible multiple watermarking using digital images. Multimed Tools Applic 76(6):8881–8900

    Article  Google Scholar 

  20. Singh D, Singh SK (2017) DWT-SVD and DCT based robust and blind watermarking scheme for copyright protection. Multimedia Tools and Applications 76(11):13001–13024

    Article  Google Scholar 

  21. Tierney M, Spiro I, Bregler C, Subramanian L (2013) Cryptagram: photo privacy for online social media. In: Proceedings of the first ACM conference on online social networks. Association for Computing Machinery, pp 75–88

  22. Wu H, Huang J, Shi Y (2015) A reversible data hiding method with contrast enhancement for medical images. Journal of Visual Communication and Image Representation 31:146–153

    Article  Google Scholar 

  23. Xia Z, Wang X, Zhang L, Qin Z, Sun X, Ren K (2016) A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Transactions on Information Forensics and Security 11(11):2594–2608

    Article  Google Scholar 

  24. Xie S, Kirillov A, Girshick RB, He K (2019) Exploring randomly wired neural networks for image recognition. In: 2019 IEEE/CVF international conference on computer vision. IEEE, pp 1284–1293

  25. Xu X, Mo R, Yin X, Khosravi MR, Aghaei F, Chang V, Li G (2021) Pdm: privacy-aware deployment of machine-learning applications for industrial cyber-physical cloud systems. IEEE Transactions on Industrial Informatics 17(8):5819–5828

    Article  Google Scholar 

  26. Yang Y, Zheng X, Guo W, Liu X, Chang V (2019) Privacy-preserving smart iot-based healthcare big data storage and self-adaptive access control system. Information Sciences 479:567–592

    Article  Google Scholar 

  27. Yuan L, Korshunov P, Ebrahimi T (2015) Privacy-preserving photo sharing based on a secure JPEG. In: 2015 IEEE conference on computer communications workshops. IEEE, pp 185–190

  28. Zear A, Singh AK, Kumar P (2018) A proposed secure multiple watermarking technique based on dwt, DCT and SVD for application in medicine. Multimed Tools Applic 77(4):4863–4882

    Article  Google Scholar 

  29. Zhang X (2011) Reversible data hiding in encrypted image. IEEE Signal Processing Letters 18(4):255–258

    Article  Google Scholar 

  30. Zhang X, Long J, Wang Z, Cheng H (2016) Lossless and reversible data hiding in encrypted images with public-key cryptography. IEEE Transactions on Circuits and Systems for Video Technology 26(9):1622–1631

    Article  Google Scholar 

Download references

Acknowledgements

This work is supported by the National Natural Science Foundation of China (No.61872090, No.61872086).

Author information

Authors and Affiliations

Authors

Ethics declarations

Conflicts of interest

We declare that we do not have any commercial or associative interest that represents a conflict of interest in connection with the work submitted.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Deng, T., Li, X., Xiong, J. et al. POISIDD: privacy-preserving outsourced image sharing scheme with illegal distributor detection in cloud computing. Multimed Tools Appl 81, 3693–3714 (2022). https://doi.org/10.1007/s11042-021-11737-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-021-11737-8

Keywords

Navigation