Outsourcing chaotic selective image encryption to the cloud with steganography

被引:26
|
作者
Xiang, Tao [1 ,2 ]
Hu, Jia [2 ]
Sun, Jianglin [2 ]
机构
[1] Chongqing Univ, Minist Educ, Key Lab Dependable Serv Comp Cyber Phys Soc, Chongqing 400044, Peoples R China
[2] Chongqing Univ, Coll Comp Sci, Chongqing 400044, Peoples R China
关键词
Selective encryption; Outsourcing; Cloud computing; Chaos; Steganography; ONLY MULTIMEDIA CIPHERS; QUANTITATIVE CRYPTANALYSIS; PRIVACY; SECURE;
D O I
10.1016/j.dsp.2015.05.006
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper considers the problem where resource-limited client such as a smartphone wants to outsource chaotic selective image encryption to the cloud; meanwhile the client does not want to reveal the plain image to the cloud. A general solution is proposed with the help of steganography. The client first selects the important data to be selectively encrypted, embeds it into a cover image, and sends the stego image to the cloud for outsourced encryption; after receiving the encrypted stego image from the cloud, the client can extract the secret data in its encrypted form and get the selectively encrypted image. Theoretical analysis and extensive experiments are conducted to validate the correctness, security, and performance of the proposed scheme. It is shown that the client can fulfill the task of selective image encryption securely and save much overhead at the same time. (C) 2015 Elsevier Inc. All rights reserved.
引用
收藏
页码:28 / 37
页数:10
相关论文
共 50 条
  • [31] Image steganography with N-puzzle encryption
    Srilekha Mukherjee
    Goutam Sanyal
    Multimedia Tools and Applications, 2020, 79 : 29951 - 29975
  • [32] FPGA Chaotic Memory Indexing Image Steganography
    Ghidan, Abdelrahman M.
    Zaki, Peter W.
    Ismail, Samar M.
    31ST INTERNATIONAL CONFERENCE ON MICROELECTRONICS (IEEE ICM 2019), 2019, : 138 - 141
  • [33] Chaotic map-based selective image encryption via diffusion and confusion
    Paliwal, Mrinal
    Soni, Punit
    Kumar, Rajender
    Goyal, Ankur
    Malik, Meena
    Goyal, Bhavna
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (2B): : 763 - 773
  • [34] A robust chaotic algorithm for digital image steganography
    Ghebleh, M.
    Kanso, A.
    COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2014, 19 (06) : 1898 - 1907
  • [35] Blockchain driven medical image encryption employing chaotic tent map in cloud computing
    Shahid, Usman
    Kanwal, Shamsa
    Bano, Mahwish
    Inam, Saba
    Abdalla, Manal Elzain Mohamed
    Shaikh, Zaffar Ahmed
    SCIENTIFIC REPORTS, 2025, 15 (01):
  • [36] Image encryption based on a single-round dictionary and chaotic sequences in cloud computing
    Li, Yinghua
    Yu, He
    Song, Bin
    Chen, Jinjun
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2021, 33 (07):
  • [37] A novel 1D chaotic system for image encryption, authentication and compression in cloud
    Hengjian Li
    Changzhi Yu
    Xiyu Wang
    Multimedia Tools and Applications, 2021, 80 : 8721 - 8758
  • [38] A novel 1D chaotic system for image encryption, authentication and compression in cloud
    Li, Hengjian
    Yu, Changzhi
    Wang, Xiyu
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (06) : 8721 - 8758
  • [39] A Framework of Secured and Bio-Inspired Image Steganography Using Chaotic Encryption with Genetic Algorithm Optimization (CEGAO)
    Bandyopadhyay, Debiprasad
    Dasgupta, Kousik
    Mandal, J. K.
    Dutta, Paramartha
    Ojha, Varun Kumar
    Snasel, Vaclav
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INNOVATIONS IN BIO-INSPIRED COMPUTING AND APPLICATIONS (IBICA 2014), 2014, 303 : 271 - 280
  • [40] Chaotic Searchable Encryption for Mobile Cloud Storage
    Awad, Abir
    Matthews, Adrian
    Qiao, Yuansong
    Lee, Brian
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2018, 6 (02) : 440 - 452