A Reversible Framework for Efficient and Secure Visual Privacy Protection

被引:11
|
作者
Zhang, Yushu [1 ,2 ]
Ye, Xi [1 ,2 ]
Xiao, Xiangli [1 ,2 ]
Xiang, Tao [3 ]
Li, Hongwei [4 ]
Cao, Xiaochun [5 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 211106, Peoples R China
[2] Zhengzhou Xinda Inst Adv Technol, Zhengzhou 450001, Peoples R China
[3] Chongqing Univ, Coll Comp Sci, Chongqing 400044, Peoples R China
[4] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 610054, Peoples R China
[5] Sun Yat sen Univ, Sch Cyber Sci & Technol, Shenzhen Campus, Shenzhen 518107, Peoples R China
基金
中国国家自然科学基金;
关键词
Encryption; Privacy; Usability; Security; Visualization; Image restoration; Image filtering; Visual privacy protection; thumbnail preserving; reversible data hiding; ENCRYPTED IMAGES; PIXELATION;
D O I
10.1109/TIFS.2023.3280341
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The number of images produced by people everyday is rapidly increasing in recent years and their local storage space may be not big enough for storing all these images. As a result, people are currently accustomed to uploading images to cloud platforms, which raises privacy concerns. Traditional image encryption is a way to protect image privacy without preserving visual usability, so that image owners fail to conveniently browse and manage their images stored in the cloud. Hence some visual privacy protection schemes were proposed to balance image privacy and usability, while many of them are irreversible. Recently, a novel reversible technology, called Thumbnail-Preserving Encryption (TPE), has been a hot topic. However, existing TPE schemes are either inefficient, or cannot perfectly restore the original image and meanwhile achieve Nonce-Respecting (NR) security. In view of this, we propose a reversible framework for efficient and secure visual privacy protection, which tunably preserves image visual usability for image owners with the idea of data hiding. In the framework, the original image is firstly divided into several regions by our proposed region division methods and one of the regions is vacated by data hiding. Then, the vacated region is utilized to preserve the original thumbnail by pixel adjustment after image encryption. Finally, pixels in each sub block are permuted for security. According to our theoretical analysis, the above processes are completely reversible and the processed image achieves NR security. Furthermore, we conduct extensive experiments, including recognition by various application programming interfaces, user surveys, and efficiency comparison, to demonstrate that our framework is efficient and strikes a good balance between privacy and usability.
引用
收藏
页码:3334 / 3349
页数:16
相关论文
共 50 条
  • [21] An efficient and secure searchable public key encryption scheme with privacy protection for cloud storage
    Libing Wu
    Biwen Chen
    Sherali Zeadally
    Debiao He
    Soft Computing, 2018, 22 : 7685 - 7696
  • [22] An efficient and secure searchable public key encryption scheme with privacy protection for cloud storage
    Wu, Libing
    Chen, Biwen
    Zeadally, Sherali
    He, Debiao
    SOFT COMPUTING, 2018, 22 (23) : 7685 - 7696
  • [23] Privacy protection vs. utility in visual data An objective evaluation framework
    Erdelyi, Adam
    Winkler, Thomas
    Rinner, Bernhard
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (02) : 2285 - 2312
  • [24] Privacy protection vs. utility in visual dataAn objective evaluation framework
    Ádám Erdélyi
    Thomas Winkler
    Bernhard Rinner
    Multimedia Tools and Applications, 2018, 77 : 2285 - 2312
  • [25] Privacy Protection Framework for Android
    Mishra, Bharavi
    Agarwal, Aastha
    Goel, Ayush
    Ansari, Aman Ahmad
    Gaur, Pramod
    Singh, Dilbag
    Lee, Heung-No
    IEEE ACCESS, 2022, 10 : 7973 - 7988
  • [26] A Basic Framework for Privacy Protection in Personalized Information Retrieval: An Effective Framework for User Privacy Protection
    Wu, Zongda
    Shen, Shigen
    Li, Huxiong
    Zhou, Haiping
    Lu, Chenglang
    JOURNAL OF ORGANIZATIONAL AND END USER COMPUTING, 2021, 33 (06)
  • [27] An efficient and secure privacy preserving multi-cloud storage framework for mobile devices
    Bedi R.K.
    Singh J.
    Gupta S.K.
    International Journal of Computers and Applications, 2021, 43 (05) : 472 - 482
  • [28] Visual Quality Optimization for Privacy Protection Bar-based Secure Image Display Technique
    Park, Sanghyun
    Kang, Sang-ug
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (07): : 3664 - 3677
  • [29] A Framework for UC Secure Privacy Preserving Biometric Authentication Using Efficient Functional Encryption
    Ernst, Johannes
    Mitrokotsa, Aikaterini
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PT II, ACNS 2023, 2023, 13906 : 167 - 196
  • [30] Privacy Issues and Protection in Secure Data Outsourcing
    Khodadadi, Touraj
    Islam, A. K. M. Muzahidul
    Baharun, Sabariah
    Komaki, Shozo
    JURNAL TEKNOLOGI-SCIENCES & ENGINEERING, 2014, 69 (06):