Outsourcing chaotic selective image encryption to the cloud with steganography

被引:26
|
作者
Xiang, Tao [1 ,2 ]
Hu, Jia [2 ]
Sun, Jianglin [2 ]
机构
[1] Chongqing Univ, Minist Educ, Key Lab Dependable Serv Comp Cyber Phys Soc, Chongqing 400044, Peoples R China
[2] Chongqing Univ, Coll Comp Sci, Chongqing 400044, Peoples R China
关键词
Selective encryption; Outsourcing; Cloud computing; Chaos; Steganography; ONLY MULTIMEDIA CIPHERS; QUANTITATIVE CRYPTANALYSIS; PRIVACY; SECURE;
D O I
10.1016/j.dsp.2015.05.006
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper considers the problem where resource-limited client such as a smartphone wants to outsource chaotic selective image encryption to the cloud; meanwhile the client does not want to reveal the plain image to the cloud. A general solution is proposed with the help of steganography. The client first selects the important data to be selectively encrypted, embeds it into a cover image, and sends the stego image to the cloud for outsourced encryption; after receiving the encrypted stego image from the cloud, the client can extract the secret data in its encrypted form and get the selectively encrypted image. Theoretical analysis and extensive experiments are conducted to validate the correctness, security, and performance of the proposed scheme. It is shown that the client can fulfill the task of selective image encryption securely and save much overhead at the same time. (C) 2015 Elsevier Inc. All rights reserved.
引用
收藏
页码:28 / 37
页数:10
相关论文
共 50 条
  • [41] Image Steganography Using LSB and Hybrid Encryption Algorithms
    Alanzy, May
    Alomrani, Razan
    Alqarni, Bashayer
    Almutairi, Saad
    APPLIED SCIENCES-BASEL, 2023, 13 (21):
  • [42] Contribution of neural networks in image steganography, watermarking and encryption
    Rafidison, Maminiaina Alphonse
    Rafanantenana, Sabine Harisoa Jacques
    Rakotomihamina, Andry Harivony
    Toky, Rajaonarison Faniriharisoa Maxime
    Ramafiarisona, Hajasoa Malalatiana
    IET IMAGE PROCESSING, 2023, 17 (02) : 463 - 479
  • [43] An enhanced Hill cipher approach for image encryption in steganography
    Karthikeyan, B.
    Chakravarthy, Jagannathan
    Vaithiyanathan, V.
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2013, 5 (3-4) : 178 - 187
  • [44] Chaotic encryption and decryption of JPEG image
    Zhang, Dinghui
    Zhang, Fengdeng
    OPTIK, 2014, 125 (02): : 717 - 720
  • [45] A new chaotic algorithm for image encryption
    Gao, HJ
    Zhang, YS
    Liang, SY
    Li, DQ
    CHAOS SOLITONS & FRACTALS, 2006, 29 (02) : 393 - 399
  • [46] Chaotic Algorithm for Standard Image Encryption
    Rao, Surya Bhupal
    Basha, S. Rahamat
    JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES, 2019, : 125 - 137
  • [47] Breaking a chaotic image encryption algorithm
    Noshadian, Saeed
    Ebrahimzade, Ata
    Kazemitabar, Seyed Javad
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (35-36) : 25635 - 25655
  • [48] Chaotic Image Encryption of Regions of Interest
    Xiao, Di
    Fu, Qingqing
    Xiang, Tao
    Zhang, Yushu
    INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2016, 26 (11):
  • [49] A new chaotic algorithm for image encryption
    Zhang, Xin
    Chen, Weibin
    2008 INTERNATIONAL CONFERENCE ON AUDIO, LANGUAGE AND IMAGE PROCESSING, VOLS 1 AND 2, PROCEEDINGS, 2008, : 889 - 892
  • [50] Chaotic Image Encryption Schemes: A Review
    Li, Chunhu
    Luo, Guangchun
    Qin, Ke
    Li, Chunbao
    PROCEEDINGS OF THE 2017 2ND INTERNATIONAL CONFERENCE ON ELECTRICAL, AUTOMATION AND MECHANICAL ENGINEERING (EAME 2017), 2017, 86 : 261 - 263