Skip to main content

Compressive Sensing-Based Image Encryption and Authentication in Edge-Clouds

  • Conference paper
  • First Online:
MultiMedia Modeling (MMM 2022)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13142))

Included in the following conference series:

  • 2016 Accesses

Abstract

Compressive sensing (CS) is often utilized to encrypt data on resource constrained terminals due to its lightweight and confidentiality. However, due to its low security level, it cannot meet the security requirements when interacting with the cloud in a complex cloud environment. Therefore, the more complex and higher security encryption computing is migrated to the edge device, and CS is combined as a new image data security transmission framework. In terms of image data confidentiality, lightweight encryption based on CS is implemented on the terminal, and then the data is clustered into central data and residual data by the proposed clustering algorithm at the edge, and the central data is further encrypted with high strength. In terms of image data integrity, hash algorithm based on CS is used to verify the correctness of the reconstructed data, and the redundancy of Reed-solomon code (RS) is used to improve the tampering recovery capability of data transmitted between edge devices and cloud. Simulation results and analysis verify the security and applicability of our transmission framework.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mell, P., Grance, T.: The NIST definition of cloud computing. Commun. ACM 53, 1–23 (2011)

    Google Scholar 

  2. Dillon, T., Wu, C., Chang, E.: Cloud computing: issues and challenges. In: IEEE International Conference on Advanced Information Networking and Applications, pp. 27–33. IEEE (2010)

    Google Scholar 

  3. Tayade, D.: Mobile cloud computing: issues, security, advantages, trends. Int. J. Comput. Sci. Inf. Technol. 5(5), 6635–6639 (2014)

    Google Scholar 

  4. Shi, W., Cao, J., Zhang, Q.: Edge computing: vision and challenges. IEEE Internet Things J. 3(5), 637–646 (2016)

    Article  Google Scholar 

  5. Chen, D., Zhao, H.: Data security and privacy protection issues in cloud computing. In: 2012 International Conference on Computer Science and Electronics Engineering, pp. 647–651. Hangzhou (2012)

    Google Scholar 

  6. Carcary, M., Doherty, E., Conway, G.: The adoption of cloud computing by Irish SMEs-an exploratory study. Electr. J. Inf. Syst. Evaluat. 17, 3–14 (2014)

    Google Scholar 

  7. Wang, T., Zhou, J., Chen, X.: A three-layer privacy preserving cloud storage scheme based on computational intelligence in fog computing. IEEE Trans. Emerg. Top. Comput. Intell. 2(1), 3–12 (2018)

    Article  Google Scholar 

  8. Wang, T., Mei, Y., Jia, W.: Edge-based differential privacy computing for sensor–cloud systems. J. Parall. Distrib. Comput. 136, 75–85 (2020)

    Article  Google Scholar 

  9. Donoho, D.: Compressed sensing. IEEE Trans. Inf. Theory 52(4), 1289–1306 (2006)

    Article  MathSciNet  Google Scholar 

  10. Candès, E., Wakin, M.: An introduction to compressive sampling. IEEE Signal Process. Mag. 25(2), 21–30 (2008)

    Article  Google Scholar 

  11. Baraniuk, R., Davenport, M., Devore, R.R.: A simple proof of the restricted isometry property for random matrices. Construct. Approx. 28(3), 253–263 (2008)

    Article  MathSciNet  Google Scholar 

  12. Candes, E.J., Tao, T.: Near-optimal signal recovery from random projections: universal encoding strategies? IEEE Trans. Inf. Theory 52(12), 5406–5425 (2006)

    Article  MathSciNet  Google Scholar 

  13. Bianchi, T., Bioglio, V., Magli, E.: Analysis of one-time random projections for privacy preserving compressed sensing. IEEE Trans. Inf. Forensics Secur. 11(2), 313–327 (2016)

    Article  Google Scholar 

  14. Chen, J., Zhang, Y., Qi, L.: Exploiting chaos-based compressed sensing and cryptographic algorithm for image encryption and compression. Opt. Laser Technol. 99, 238–248 (2018)

    Article  Google Scholar 

  15. Gong, L., Qiu, K., Deng, C.: An image compression and encryption algorithm based on chaotic system and compressive sensing. Opt. Laser Technol. 115, 257–267 (2019)

    Article  Google Scholar 

  16. Chai, X., Fu, X., Gan, Z., Zhang, Y., Lu, Y., Chen, Y.: An efficient chaos-based image compression and encryption scheme using block compressive sensing and elementary cellular automata. Neural Comput. Appl. 32(9), 4961–4988 (2018)

    Article  Google Scholar 

  17. Xie, D., Chen, F., Luo, Y.: One-to-many image encryption with privacy-preserving homomorphic outsourced decryption based on compressed sensing. Digit. Signal Process. 95, 1051–2004 (2019)

    Article  Google Scholar 

  18. Zhang, Y., Xiang, Y., Zhang, L.: Efficiently and securely outsourcing compressed sensing reconstruction to a cloud. Inf. Sci. 496, 150–160 (2019)

    Article  Google Scholar 

  19. Zhang, Y., Wang, P., Fang, L.: Secure transmission of compressed sampling data using edge clouds. IEEE Trans. Industr. Inf. 16(10), 6641–6651 (2020)

    Article  Google Scholar 

  20. Zhou, Y., Hua, Z., Pun, C.M.: Cascade chaotic system with applications. IEEE Trans. Cybern. 99, 2168–2267 (2014)

    Google Scholar 

  21. Plank, J.S.: T1: erasure codes for storage applications. In: Proceedings of the 4th USENIX Conference on File and Storage Technologies, San Francisco, CA, pp. 1–74 (2005)

    Google Scholar 

  22. Pak, C., Huang, L.: A new color image encryption using combination of the 1D chaotic map. Signal Process. 138, 129–137 (2017)

    Article  Google Scholar 

Download references

Acknowledgment

The work was supported by the National Key R&D Program of China (Grant No. 2020YFB1805400) and the National Natural Science Foundation of China (Grant No. 62072063).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Di Xiao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zheng, H., Huang, Y., Li, L., Xiao, D. (2022). Compressive Sensing-Based Image Encryption and Authentication in Edge-Clouds. In: Þór Jónsson, B., et al. MultiMedia Modeling. MMM 2022. Lecture Notes in Computer Science, vol 13142. Springer, Cham. https://doi.org/10.1007/978-3-030-98355-0_32

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-98355-0_32

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-98354-3

  • Online ISBN: 978-3-030-98355-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics