Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Image Operations in Encrypted Domains

Author : Sanjana Prasad 1 Dr.H.S. Jayanna 2

Date of Publication :15th June 2017

Abstract: The advancement of cloud or distributed computing and a drastic increment in the size of the digital images are reasons to outsource the image into the cloud. Despite of the fact that this outsourcing has many advantages, guaranteeing data confidentiality and the security in the cloud is one of the fundamental concerns. The encryption schemes for images guarantee the confidentiality in the cloud, but this scheme doesn’t permit cloud data centers to perform operations over encrypted images. In this paper, this problem is addressed by proposing a modified Pailier cryptosystem based image scaling and cropping scheme for multiclient settings to scale and crop an image in the encrypted domain on cloud data centers.

Reference :

    1. T. Bianchi, A. Piva, and M. Barni, “Encrypted domain DCT based on homomorphic cryptosystems,” EURASIP J. Multimedia Inf. Security, vol. 2009, pp. 1:1–1:12, Jan. 2009. [Online].Available:http://jis.eurasipjournals.springeropen.co m/article s/10.1155/2009/716357
    2. X. Sun and S. Bo, “A blind digital watermarking for color medical images based on PCA,” in Proc. IEEE Int. Conf. Wireless Commun., Netw. Inf. Security, Beijing, China, Jun. 2010, pp. 421–427.
    3. J. Yuan, S. Yu, and L. Guo, “SEISA: Secure and efficient encrypted image search with access control,” in Proc. IEEE Conf. Comput. Commun., Apr./May 2015, pp. 2083–2091
    4. P. Paillier, “Public-key cryptosystems based on composite degree residuosity classes,” in Advances in Cryptology, vol. 1592. Springer, 1999, pp. 223–238
    5. S. Goldwasser and S. Micali, “Probabilistic encryption,” J. Comput. Syst. Sci., vol. 28, no. 2, pp. 270–299, Apr. 1984
    6. J. Benaloh and D. Tuinstra, “Receipt-free secret-ballot elections (extended abstract),” in Proc. 26th Annu. ACM Symp. Theory Comput., 1994, pp. 544–553.
    7. R. L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Commun. ACM, vol. 21, no. 2, pp. 120–126, Feb. 1978.
    8. T. El Gamal, “A public key cryptosystem and a signature scheme based on discrete logarithms,” in Advances in Cryptology (Lecture Notes in Computer Science), vol. 196. Berlin, Germany: Springer-Verlag, 1984,pp. 10–18.
    9. D. X. Song, D. Wagner, and A. Perrig, “Practical techniques for searches on encrypted data,” in Proc. IEEE Symp. Security Privacy, May 2000, pp. 44–55.
    10. D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano, “Public key encryption with keyword search,” in Advances in Cryptology, vol. 3027. Springer, 2004, pp. 506–522.
    11. P. Golle, J. Staddon, and B. Waters, “Secure conjunctive keyword search over encrypted data,” in Applied Cryptography and Network Security, vol. 3089. Springer, 2004, pp. 31–45.
    12. M. Mohanty, W. T. Ooi, and P. K. Atrey, “Scale me, crop me, know me not: Supporting scaling and cropping in secret image sharing,” in Proc. IEEE Int. Conf. Multimedia Expo, San Jose, CA, USA, Jul. 2013, pp. 1–6.
    13. K. Kansal, M. Mohanty, and P. K. Atrey, “Scaling and cropping of wavelet-based compressed images in hidden domain,” in MultiMedia Modeling (Lecture Notes in Computer Science), vol. 8935. Springer, 2015, pp. 430– 441.
    14. M. Mohanty, M. R. Asghar and G. Russello, " 2DCrypt : Image Scaling and Cropping in Encrypted Domains," in IEEE Transactions on Information Forensics and Security, vol. 11, no. 11, pp. 2542-2555, Nov. 2016.
    15. Mrs. Jadhav Rohini , Prof. S. A. Kahate , “A Survey on: A Modified Paillier Cryptosystem-Based Image Scaling and Cropping Scheme”, IJARIIE-ISSN(O)-2395-4396 3225 www, Vol-2 Issue-5 2016
    16. Md. Alam Hossain, Md. Biddut Hossain, Md. Shafin Uddin, Shariar Md. Imtiaz, “Performance Analysis of Different Cryptography Algorithms”, ISSN: 2277 128X, Volume 6, Issue 3, March 2016.

Recent Article