Abstract
Cloud computing is a major blooming technology which has numerous applications in today’s market and is rightly so hyped. Images are a major part of today’s internet data traffic, especially due to widespread social media, and hence, its security is crucial. However, in the present scenario, the images in cloud are a major issue in terms of security. Since the user who has uploaded the image has no control over the security of images, the cloud provider has to ensure maximum security in terms of authentication and prevention from attacks. The main objective of this paper is to provide a method to enhance the safety of images on cloud. This paper presents an idea of securing images on cloud platform using biometric authentication. Different steps involved in biometric authentication and secure upload and access of images are explained, and integration of all the steps is done at the end as a case study which puts light on the whole process in which methods are best-regarding results and compatibility. The proposed algorithm in this paper presents the idea of authentication of images in two basic steps of image compression using standard discrete wavelet transform method followed by image encryption using the hybrid method of SHA and blowfish. This image is then stored into the database of cloud and accessed whenever the user requests it. A structured and comprehensive view of encryption methods, types of biometrics and to secure data as well as images is provided in this paper.
Similar content being viewed by others
References
Abdullah AM, Aziz RHH (2016) New approaches to encrypt and decrypt data in image using cryptography and steganography algorithm. Int J Comput Appl 143(4):11–17
Al-hamami AH, Al-juneidi JY (2015) Secure mobile cloud computing based-on fingerprint. World Comput Sci Inform Technol J 5(2):23–27
Alsaadi IM (2015) Physiological biometric authentication systems, advantages, disadvantages and future development: a review. Int J Sci Technol Res 4(12):285–289
Archer J, Cullinane D, Puhlmann N, Boehme A, Kurtz P, Reavis J (2010) Top Threats to cloud computing V1.0. Cloud Security Alliance. pp 1–14
Bala Y, Malik A (2018) Biometric inspired homomorphic encryption algorithm for secured cloud computing. In: Panigrahi B, Hoda M, Sharma V, Goel S (eds) Nature inspired computing. Advances in intelligent systems and computing, vol 652. Springer, Singapore, pp 13–21
Batool R, Naveed G, Khan A (2015) Biometric authentication in cloud computing. Int J Comput Appl 129(11):6–9
Bhansali A, Barot H, Masrani K, Shah S, Chheda V (2013) Encrypting watermarked images: a transparent approach. Int J Future Comput Commun 2(6):665–667
Bhattacharyya D, Ranjan R, Alisherov F, Choi M (2009) Biometric authentication: a review. Int J u- and e- Serv Sci Technol 2(3):13–28
Bothe S, Jadhao RM, Shinde S (2012) Cloud computing based image processing applications for agro informatics using ‘self learning system’ approach. In: Proceedings of AIPA, pp 1–4
Cabeen K, Gent P (2019) Image compression and the discrete cosine transform. Math 45, pp 1–11 (unpublished report)
Chen D, Zhao H (2012) Data security and privacy protection issues in cloud computing. In: Proceeding of the International Conference on Computer Science and Electronics Engineering, pp 647–651
Chnag CC, Hwang MS, Chen TS (2001) A new encryption algorithm for image cryptosystems. J Syst Softw 58:83–91
Chowdhury MMH, Khatun A (2012) Image compression using discrete wavelet transform. Int J Comput Sci 9(4):327–330
Deen AETE, El-Badawy ESA, Gobran SN (2014) Digital image encryption based on RSA algorithm. IOSR J Electron Commun Eng 9(1):69–73
Delac K, Grgic M (2004) A survey of biometric recognition methods. In: 46th International Symposium Electronics in Marine, pp 184–193
Deshpande SD (2015) Advances in computational research review paper on introduction of various biometric areas. Adv Comput Res 7(1):212–214
Deshpande NT, Ravishankar S (2017) Face detection and recognition using Viola-Jones algorithm and fusion of PCA and ANN. Adv Comput Sci Technol 10(5):1173–1189
Dongare AS, Alvi AS, Tarbani NM (2017) An efficient technique for image encryption and decryption for secured multimedia application. Int Res J Eng Technol 4(4):3186–3190
Duarte T, Piementao JP, Sousa P, Onofre S (2016) Biometric access control systems: a review on technologies to improve their efficiency. In: Power Electronics and Motion Control Conference (PEMC), IEEE, pp 795–800
Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurc Chaos 8(6):125901284
Ghoradkar S, Shinde A (2015) Review on image encryption and decryption using AES algorithm. Int J Comput Appl 11–13
Gore A, Meena SS, Purohit P (2016) Hybrid cryptosystem using modified blowfish algorithm and SHA algorithm on public cloud. Int J Comput Appl 155(3):6–10
Guan ZH, Huang FJ, Guan WJ (2005) Chaos-based image encryption algorithm. Phys Lett A 346(1–3):153–157
Gupta D, Choubey S (2015) Discrete wavelet transform for image processing. Int J Emerg Technol Adv Eng 4(3):598–602
Hsu CY, Lu CS, Pei SC (2011) Homomorphic encryption-based secure SIFT for privacy-preserving feature extraction. SPIE-IS&T/ 7880:1–17
Huang D, Shan C, Ardabilian M, Wang Y, Chen L (2011) Local binary patterns and its application to facial image analysis: a survey. IEEE Trans Syst Man Cyberns Part C Appl Rev 41(6):765–781
Kalyani C (2017) Various biometric authentication techniques: a review. J Biom Biostat 8(5):1–5
Katharotiya A, Patel S, Goyani M (2011) Comparative analysis between DCT & DWT techniques of image compression. J Inform Eng Appl 1(2):9–18
Kaware PC, Yadav DM (2016) Iris recognition for mobile security. Int Res J Eng Technol 3(6):2000–2005
Kim MG, Moon HM, Chung Y, Pan SB (2012) A survey and proposed framework on the soft biometrics technique for human identification in intelligent video surveillance system. J Biomed Biotechnol 2012:1–7
Kisku DR, Rana S (2016) Multithread face recognition in cloud. J Sens. https://doi.org/10.1155/2016/2575904
Madhu B, Holi G, Murthy SK (2016) An overview of image security techniques. Int J Comp Appl 154(6):37–46
Mahalakshmi J, Kuppusamy K (2016) An efficient image encryption method based on improved cipher block chaining in cloud computing as a security service. Aust J Basic Appl Sci 10(2):297–306
Mannapur SJ, Raj S, Kumar S, Kiran B (2018) IoT based home security through image processing algorithms. Int J Adv Res Ideas Innov Technol 4(3):1598–1602
Maraghy ME, Hesham S, Ghany MAAE (2013) Real-time efficient FPGA implementation of AES algorithm. In: IEEE International SOC Conference (SOCC), pp 203–208
Monrose F, Rubin AD (2000) Keystroke dynamics as a biometric for authentication. Future Gener Comput Syst 16:351–359
Murty MS, Veeraiah D, Rao AS (2011) Digital signature and watermark methods for image authentication using cryptography analysis. Signal Image Process 2(2):170–179
Pandey A, Tugnayat RM, Tiwari AK (2013) Data security framework for cloud computing networks. Int J Comput Eng Technol 4(1):178–181
Parmar PV, Padhar SB, Patel SN, Bhatt NI, Jhaveri RH (2014) Survey of various homomorphic encryption algorithms and schemes. Int J Comput Appl 91(8):26–32
Patil RA, Renke AL (2016) Keystroke dynamics for user authentication and identification by using typing rhythm. Int J Comput Appl 144(9):27–33
Patterson DA, Hennessy JL (1994) Computer organization and design: the hardware/software interface. Morgan Kaufmann Inc, San Francisco
Pawle AA, Pawar VP (2013) Face recognition system (FRS) on cloud computing for user authentication. Int J Soft Comput Eng 3(4):189–193
Potisepp K (2013) Large-scale image processing using MapReduce. M.Sc. Thesis, Tartu University, Faculty of Mathematics and Computer Science, Institute of Computer Science, pp 1–56
Rajput AS, Sharma V (2015) Survey and analysis of chaotic image encryption schemes. Int J Commun Syst Netw Technol 4(1):24–27
Rani D, Ranjan RK (2014) A comparative study of SaaS, PaaS and IaaS in cloud computing. Int J Adv Res Comput Sci Softw Eng 4(6):458–461
Rathi P, Dubey S (2013) Hand geometry recognition system using feature extraction. Int J Adv Res Comput Eng Technol 2(6):2064–2067
Rathi R, Choudhary M, Chandra B (2012) An application of face recognition system using image processing and neural networks. Int J Comp Tech 3(1):45–49
Reza MS, Khan MSA, Alam MGR, Islam S (2012) An approach of digital image copyright protection by using watermarking technology. Cornell University Library, Cornell, pp 1–7
Shelly Bawa RK (2015) Secure image transmission for cloud storage system using hybrid scheme. Int J Eng Res Dev 11(9):18–26
Shubh T, Sharma S (2016) Man-in-the-middle-attack prevention using HTTPS and SSL. Int J Comput Sci Mobile Comput 5(6):569–579
Singh RK, Kumar B, Shaw DK, Khan DA (2018) Level by level image compression-encryption algorithm based on quantum chaos map. J King Saud Univ Comput Inform Sci. https://doi.org/10.1016/j.jksuci.2018.05.012
Suryani D, Irwansyah E, Chindra R (2017) Offline signature recognition and verification system using efficient fuzzy kohonen clustering network (EFKCN) algorithm. Procedia Comput Sci 116:621–628. https://doi.org/10.1016/j.procs.2017.10.025
Teh PS, Teoh ABJ, Yue S (2013) A survey on keystroke dynamics and biometrics. Sci World J. https://doi.org/10.1155/2013/408280
Thieling L, Schuer A, Hartung G, Buchel G (2014) Embedded image processing system for cloud-based applications. In: International Conference on ssytems, signals and image processing, pp 1–4
Tiwari P, Saklani A (2013) Role of biometric cryptography in cloud computing. Int J Comput Appl 7(9):34–38
Valmik NK, Kshirsagar VK (2014) Blowfish algorithm. IOSR J Comput Eng 16(2):80–83
Varsha D, Wadhwa A, Gupta S (2015) Study of security issues in cloud computing. Int J Comput Sci Mobile Comput 4(6):230–234
Vaudenay S (1996) On the weak keys in blowsh. In: Gollmann D (ed) Fast software encryption. International workshop on fast software encryption, FSE 1996. Lecture notes in computer science, vol 1039. Springer, Berlin, Heidelberg, pp 27–32
Wang P, Wang J, Chen Y, Ni G (2013a) Rapid processing of remote sensing images based on cloud computing. Future Gener Comp Syst 29(8):1963–1968
Wang S, Nassar M, Atallah M, Malluhi Q (2013b) Secure and private outsourcing of shape-based feature extraction. In: International conference on information and communications security, pp 90–99
Wangsuk K, Amornkul TA (2013) Trajectory mining for keystroke dynamics authentication. In: 17th Asia Pacific Symposium on Intelligent and Evolutionary Systems. vol 24, pp 175–183
Xia Z, Ma X, Shen Z, Sun X, Xiong NN, Jeon B (2018) Secure image LBP feature extraction in cloud-based smart campus. IEEE Access 6:30392–30401
Yang P, Gui X, An J, Tian F (2017) An efficient secret key homomorphic encryption used in image processing service. Secur Commun Netw. https://doi.org/10.1155/2017/7695751
Yassin AA, Yao J, Han S (2016a) Strong authentication scheme based on hand geometry and smart card factors. Computers 5:15
Yassin AA, Yao J, Han S (2016b) Strong authentication scheme based on hand geometry and smart card factors. Computers 5:1–17
Zefreh EZ, Rajaee R, Farivary M (2011) Image security system using recursive cellular automata substitution and its parallelization. In: IEEE, pp 77–86
Zhang L, Shen P, Song J, Dong L, Wang G, Cai Y (2014) An image processing system based on heterogeneous embedded multicore processors. In: 2014 Second International Conference on Advanced Cloud and Big Data, pp 1–6
Acknowledgements
The authors are grateful to School of Technology, Pandit Deendayal Petroleum University and Vishwakarma Government Engineering College for the permission to publish this research.
Funding
All relevant data and material are presented in the main paper.
Author information
Authors and Affiliations
Contributions
All the authors make substantial contribution in this manuscript. VK, MP and MS participated in drafting the manuscript. VK and MP wrote the main manuscript, all the authors discussed the results and implication on the manuscript at all stages.
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no competing interests.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Kakkad, V., Patel, M. & Shah, M. Biometric authentication and image encryption for image security in cloud framework. Multiscale and Multidiscip. Model. Exp. and Des. 2, 233–248 (2019). https://doi.org/10.1007/s41939-019-00049-y
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s41939-019-00049-y