Outsourcing chaotic selective image encryption to the cloud with steganography

被引:26
|
作者
Xiang, Tao [1 ,2 ]
Hu, Jia [2 ]
Sun, Jianglin [2 ]
机构
[1] Chongqing Univ, Minist Educ, Key Lab Dependable Serv Comp Cyber Phys Soc, Chongqing 400044, Peoples R China
[2] Chongqing Univ, Coll Comp Sci, Chongqing 400044, Peoples R China
关键词
Selective encryption; Outsourcing; Cloud computing; Chaos; Steganography; ONLY MULTIMEDIA CIPHERS; QUANTITATIVE CRYPTANALYSIS; PRIVACY; SECURE;
D O I
10.1016/j.dsp.2015.05.006
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper considers the problem where resource-limited client such as a smartphone wants to outsource chaotic selective image encryption to the cloud; meanwhile the client does not want to reveal the plain image to the cloud. A general solution is proposed with the help of steganography. The client first selects the important data to be selectively encrypted, embeds it into a cover image, and sends the stego image to the cloud for outsourced encryption; after receiving the encrypted stego image from the cloud, the client can extract the secret data in its encrypted form and get the selectively encrypted image. Theoretical analysis and extensive experiments are conducted to validate the correctness, security, and performance of the proposed scheme. It is shown that the client can fulfill the task of selective image encryption securely and save much overhead at the same time. (C) 2015 Elsevier Inc. All rights reserved.
引用
收藏
页码:28 / 37
页数:10
相关论文
共 50 条
  • [21] Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption
    Bahaddad, Adel A.
    Almarhabi, Khalid Ali
    Abdel-Khalek, Sayed
    ALEXANDRIA ENGINEERING JOURNAL, 2023, 75 : 41 - 54
  • [22] A one-time-pad-like chaotic image encryption scheme using data steganography
    Sheng, Qingxin
    Fu, Chong
    Lin, Zhaonan
    Tie, Ming
    Chen, Junxin
    Sham, Chiu-Wing
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 78
  • [23] Verifiable Chebyshev maps-based chaotic encryption schemes with outsourcing computations in the cloud/fog scenarios
    Li, Jing
    Wang, Licheng
    Wang, Lihua
    Wang, Xianmin
    Huang, Zhengan
    Li, Jin
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (22):
  • [24] Using the Chaotic Map in Image Steganography
    Enayatifar, Rasul
    Mahmoudi, Fariborz
    Mirzaei, Khadije
    2009 INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT AND ENGINEERING, PROCEEDINGS, 2009, : 491 - +
  • [25] Using the Chaotic Map in Image Steganography
    Enayatifar, Rasul
    Faridnia, Saed
    Sadeghi, Hossein
    PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING SYSTEMS, 2009, : 754 - +
  • [26] Enhanced the Security of Image Steganography Through Image Encryption
    Bhardwaja, Rupali
    Khanna, Divya
    2015 ANNUAL IEEE INDIA CONFERENCE (INDICON), 2015,
  • [27] Data Encryption and Decryption Using image Steganography
    EC Department, SRMCEM, India
    Research Square, 1600,
  • [28] Image steganography with N-puzzle encryption
    Mukherjee, Srilekha
    Sanyal, Goutam
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (39-40) : 29951 - 29975
  • [29] An Edge Based Image Steganography with Compression and Encryption
    Mishra, Rina
    Mishra, Atish
    Bhanodiya, Praveen
    2015 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONTROL (IC4), 2015,
  • [30] An Edge Based Image Steganography with Compression and Encryption
    Mishra, Rina
    Mishra, Atish
    Bhanodiya, Praveen
    2015 International Conference on Computing, Communication and Security (ICCCS), 2015,