Communications of the ACM
Hide and Seek: An Introduction to Steganography
IEEE Security and Privacy
Efficient Byzantine-Tolerant Erasure-Coded Storage
DSN '04 Proceedings of the 2004 International Conference on Dependable Systems and Networks
Plutus: Scalable Secure File Sharing on Untrusted Storage
FAST '03 Proceedings of the 2nd USENIX Conference on File and Storage Technologies
On Compression of Encrypted Video
DCC '07 Proceedings of the 2007 Data Compression Conference
Protection and retrieval of encrypted multimedia content: when cryptography meets signal processing
EURASIP Journal on Information Security
Extractable Perfectly One-Way Functions
ICALP '08 Proceedings of the 35th international colloquium on Automata, Languages and Programming, Part II
Fully homomorphic encryption using ideal lattices
Proceedings of the forty-first annual ACM symposium on Theory of computing
Achieving secure, scalable, and fine-grained data access control in cloud computing
INFOCOM'10 Proceedings of the 29th conference on Information communications
Non-interactive verifiable computing: outsourcing computation to untrusted workers
CRYPTO'10 Proceedings of the 30th annual conference on Advances in cryptology
A chaos-based symmetric image encryption scheme using a bit-level permutation
Information Sciences: an International Journal
Can homomorphic encryption be practical?
Proceedings of the 3rd ACM workshop on Cloud computing security workshop
Hi-index | 0.00 |
Cloud computing is ideal for image storage and processing because it provides enormously scalable storage and processing resources at low cost. One of the major drawbacks of cloud computing, however, is the lack of robust mechanisms for the users to control the privacy of the data they farm out to the clouds. In this paper, we develop an image encoding scheme that enhances the privacy of image data that is outsourced to the clouds for processing. Unlike previously proposed image encryption schemes, our encoding scheme allows different forms of pixel-level image processing to take place in the clouds while the actual image is not revealed to the cloud provider. Our encoding scheme uses a chaotic map to transform the image after it is masked with an arbitrarily chosen ambient image. We use template matching as a common image processing task to demonstrate the ability of our scheme to perform computations on privacy enhanced images. A simplified prototype of the image processing system was implemented and the experimental results are presented in this paper.