Skip to main content

2024 | OriginalPaper | Buchkapitel

Privacy-Preserving Image Scaling Using Bicubic Interpolation and Homomorphic Encryption

verfasst von : Donger Mo, Peijia Zheng, Yufei Zhou, Jingyi Chen, Shan Huang, Weiqi Luo, Wei Lu, Chunfang Yang

Erschienen in: Digital Forensics and Watermarking

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With the advancement of cloud computing, outsourced image processing has become an attractive business model, but it also poses serious privacy risks. Existing privacy-preserving image scaling techniques often use secret sharing schemes or the Paillier cryptosystem to protect privacy. These methods require the collaboration of multiple servers or only support additive operations, which increases the difficulty of data storage and complicates image processing. To address these issues, this paper focuses on cloud-based privacy-preserving image scaling in the encrypted domain. We propose an image scaling scheme based on homomorphic encryption, which allows cloud servers to perform scaling operations on encrypted images using bicubic interpolation. To avoid the high storage and communication costs of per-pixel encryption, we introduce an efficient data encoding method where a single ciphertext contains the information of an entire image. This significantly reduces the storage space and communication overhead with the cloud server, while our scheme supports computational operations in this data format. Our experimental results validate the feasibility of the proposed scheme, which outperforms existing schemes in terms of storage overhead and operational efficiency.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Lagendijk, L., Erkin, Z., Barni, M.: Encrypted signal processing for privacy protection: conveying the utility of homomorphic encryption and multiparty computation. IEEE Signal Process. Mag. 30(1), 82–105 (2013)CrossRef Lagendijk, L., Erkin, Z., Barni, M.: Encrypted signal processing for privacy protection: conveying the utility of homomorphic encryption and multiparty computation. IEEE Signal Process. Mag. 30(1), 82–105 (2013)CrossRef
2.
Zurück zum Zitat Pedrouzo-Ulloa, A., Troncoso-Pastoriza, J., Pérez-González, F.: Image denoising in the encrypted domain. In: IEEE International Workshop on Information Forensics and Security (WIFS), pp. 1–6 (2016) Pedrouzo-Ulloa, A., Troncoso-Pastoriza, J., Pérez-González, F.: Image denoising in the encrypted domain. In: IEEE International Workshop on Information Forensics and Security (WIFS), pp. 1–6 (2016)
3.
Zurück zum Zitat Kiya, H., Fujiyoshi, M.: Signal and image processing in the encrypted domain. ECTI Trans. Comput. Inf. Technol. (ECTI-CIT) 6(1), 10–17 (2012)CrossRef Kiya, H., Fujiyoshi, M.: Signal and image processing in the encrypted domain. ECTI Trans. Comput. Inf. Technol. (ECTI-CIT) 6(1), 10–17 (2012)CrossRef
4.
Zurück zum Zitat Zheng, P., Huang, J.: Implementation of the discrete wavelet transform and multiresolution analysis in the encrypted domain. In: Proceedings of the 19th ACM International Conference on Multimedia, pp. 413–422 (2011) Zheng, P., Huang, J.: Implementation of the discrete wavelet transform and multiresolution analysis in the encrypted domain. In: Proceedings of the 19th ACM International Conference on Multimedia, pp. 413–422 (2011)
5.
Zurück zum Zitat Mohanty, M., Ooi, T., Atrey, K.:Scale me, crop me, knowme not: supporting scaling and cropping in secret image sharing. In: Proceedings of the 2013 IEEE International Conference on Multimedia and Expo (ICME), pp. 1–6. IEEE Computer Society, San Jose (2013) Mohanty, M., Ooi, T., Atrey, K.:Scale me, crop me, knowme not: supporting scaling and cropping in secret image sharing. In: Proceedings of the 2013 IEEE International Conference on Multimedia and Expo (ICME), pp. 1–6. IEEE Computer Society, San Jose (2013)
6.
Zurück zum Zitat Deepthi, S., Lakshmi, S., Deepthi, P.: Image processing in encrypted domain for distributed storage in cloud. In: International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), pp. 1478–1482 (2017). https://doi.org/10.1109/WiSPNET.2017.8 Deepthi, S., Lakshmi, S., Deepthi, P.: Image processing in encrypted domain for distributed storage in cloud. In: International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), pp. 1478–1482 (2017). https://​doi.​org/​10.​1109/​WiSPNET.​2017.​8
7.
Zurück zum Zitat Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Advances in Cryptology - EUROCRYPT ’99 International Conference on the Theory and Application of Cryptographic Techniques(1999) Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Advances in Cryptology - EUROCRYPT ’99 International Conference on the Theory and Application of Cryptographic Techniques(1999)
8.
Zurück zum Zitat Cheon, H., Han, K., Kim, A., Kim, M., Song, Y.: A full RNS variant of approximate homomorphic encryption. In: International Conference on Selected Areas in Cryptography (2018) Cheon, H., Han, K., Kim, A., Kim, M., Song, Y.: A full RNS variant of approximate homomorphic encryption. In: International Conference on Selected Areas in Cryptography (2018)
9.
Zurück zum Zitat Kim, A., Song, Y., Kim, M., Lee, K., Cheon, H.: Logistic regression model training based on the approximate homomorphic encryption. BMC Med. Genom. 11(4), 83 (2018)CrossRef Kim, A., Song, Y., Kim, M., Lee, K., Cheon, H.: Logistic regression model training based on the approximate homomorphic encryption. BMC Med. Genom. 11(4), 83 (2018)CrossRef
13.
Zurück zum Zitat Vadim, L., Chris, P., Oded, R.: On ideal lattices and learning with errors over rings. In: Henri, G. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 1–23. Springer, Heidelberg (2010)CrossRef Vadim, L., Chris, P., Oded, R.: On ideal lattices and learning with errors over rings. In: Henri, G. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 1–23. Springer, Heidelberg (2010)CrossRef
14.
Zurück zum Zitat Robert, K.: Cubic convolution interpolation for digital image processing. IEEE Trans. Acoust. Speech Signal Process. 29(6), 1153–1160 (1981)MathSciNetCrossRef Robert, K.: Cubic convolution interpolation for digital image processing. IEEE Trans. Acoust. Speech Signal Process. 29(6), 1153–1160 (1981)MathSciNetCrossRef
15.
Zurück zum Zitat Elmehdwi, Y., Samanthula, K., Jiang, W.: Secure k-nearest neighbor query over encrypted data in outsourced environments. IEEE (2013) Elmehdwi, Y., Samanthula, K., Jiang, W.: Secure k-nearest neighbor query over encrypted data in outsourced environments. IEEE (2013)
16.
Zurück zum Zitat Araki, T., Furukawa, J., Lindell, Y., Nof, A., Ohara, K.: High-throughput semi-honest secure three-party computation with an honest majority. In: ACM SIGSAC Conference on Computer & Communications Security (2016) Araki, T., Furukawa, J., Lindell, Y., Nof, A., Ohara, K.: High-throughput semi-honest secure three-party computation with an honest majority. In: ACM SIGSAC Conference on Computer & Communications Security (2016)
17.
Zurück zum Zitat Zhang, Y., Zheng, P., Luo, W.: Privacy-preserving outsourcing computation of QR decomposition in the encrypted domain. In: 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering (Trust-Com/BigDataSE) (2019) Zhang, Y., Zheng, P., Luo, W.: Privacy-preserving outsourcing computation of QR decomposition in the encrypted domain. In: 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering (Trust-Com/BigDataSE) (2019)
18.
Zurück zum Zitat Jung, C., Andrey, K., Miran, K., Yongsoo, S.: Homomorphic encryption for arithmetic of approximate numbers. In: International Conference on the Theory and Application of Cryptology and Information Security (2017) Jung, C., Andrey, K., Miran, K., Yongsoo, S.: Homomorphic encryption for arithmetic of approximate numbers. In: International Conference on the Theory and Application of Cryptology and Information Security (2017)
19.
Zurück zum Zitat Albrecht, M., et al.: Homomorphic encryption security standard. HomomorphicEncryption.org, Toronto, Canada (2018) Albrecht, M., et al.: Homomorphic encryption security standard. HomomorphicEncryption.org, Toronto, Canada (2018)
20.
Zurück zum Zitat Ayoub, B., Bilal, R., Bogdan, C., Alaa, B.:TenSEAL: a library for encrypted tensor operations using homomorphic encryption. CoRR(2021) Ayoub, B., Bilal, R., Bogdan, C., Alaa, B.:TenSEAL: a library for encrypted tensor operations using homomorphic encryption. CoRR(2021)
21.
Zurück zum Zitat Marco, B., Aline, R., Christine, G., Marie-line, M.: Low-complexity single-image super-resolution based on nonnegative neighbor embedding. In: Proceedings of the British Machine Vision Conference, pp. 1–135 (2012) Marco, B., Aline, R., Christine, G., Marie-line, M.: Low-complexity single-image super-resolution based on nonnegative neighbor embedding. In: Proceedings of the British Machine Vision Conference, pp. 1–135 (2012)
22.
Zurück zum Zitat Roman, Z., Michael, E., Matan, P.: On single image scale-up using sparse-representations. In: International Conference on Curves and Surfaces, pp. 711–730 (2010) Roman, Z., Michael, E., Matan, P.: On single image scale-up using sparse-representations. In: International Conference on Curves and Surfaces, pp. 711–730 (2010)
23.
Zurück zum Zitat Radu, T., Vincent, S., Luc, G.: A+: adjusted anchored neighborhood regression for fast super-resolution. In: Asian Conference on Computer Vision, pp. 111–126 (2014) Radu, T., Vincent, S., Luc, G.: A+: adjusted anchored neighborhood regression for fast super-resolution. In: Asian Conference on Computer Vision, pp. 111–126 (2014)
24.
Zurück zum Zitat Jia-Bin, H., Abhishek, S., Narendra, A.: Single image super-resolution from transformed self-exemplars. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 5197–5206 (2015) Jia-Bin, H., Abhishek, S., Narendra, A.: Single image super-resolution from transformed self-exemplars. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 5197–5206 (2015)
25.
Zurück zum Zitat Jung, C., Kyoohyung, H., Andrey, K., Miran, K., Yongsoo, S.: Bootstrapping for approximate homomorphic encryption. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques (2018) Jung, C., Kyoohyung, H., Andrey, K., Miran, K., Yongsoo, S.: Bootstrapping for approximate homomorphic encryption. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques (2018)
26.
Zurück zum Zitat Kim, M., Song, Y., Wang, S., Xia, Y., Jiang, X.: Secure logistic regression based on homomorphic encryption: design and evaluation. JMIR Med. Inf. (2018) Kim, M., Song, Y., Wang, S., Xia, Y., Jiang, X.: Secure logistic regression based on homomorphic encryption: design and evaluation. JMIR Med. Inf. (2018)
Metadaten
Titel
Privacy-Preserving Image Scaling Using Bicubic Interpolation and Homomorphic Encryption
verfasst von
Donger Mo
Peijia Zheng
Yufei Zhou
Jingyi Chen
Shan Huang
Weiqi Luo
Wei Lu
Chunfang Yang
Copyright-Jahr
2024
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-97-2585-4_5

Premium Partner