Outsourcing chaotic selective image encryption to the cloud with steganography

被引:26
|
作者
Xiang, Tao [1 ,2 ]
Hu, Jia [2 ]
Sun, Jianglin [2 ]
机构
[1] Chongqing Univ, Minist Educ, Key Lab Dependable Serv Comp Cyber Phys Soc, Chongqing 400044, Peoples R China
[2] Chongqing Univ, Coll Comp Sci, Chongqing 400044, Peoples R China
关键词
Selective encryption; Outsourcing; Cloud computing; Chaos; Steganography; ONLY MULTIMEDIA CIPHERS; QUANTITATIVE CRYPTANALYSIS; PRIVACY; SECURE;
D O I
10.1016/j.dsp.2015.05.006
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper considers the problem where resource-limited client such as a smartphone wants to outsource chaotic selective image encryption to the cloud; meanwhile the client does not want to reveal the plain image to the cloud. A general solution is proposed with the help of steganography. The client first selects the important data to be selectively encrypted, embeds it into a cover image, and sends the stego image to the cloud for outsourced encryption; after receiving the encrypted stego image from the cloud, the client can extract the secret data in its encrypted form and get the selectively encrypted image. Theoretical analysis and extensive experiments are conducted to validate the correctness, security, and performance of the proposed scheme. It is shown that the client can fulfill the task of selective image encryption securely and save much overhead at the same time. (C) 2015 Elsevier Inc. All rights reserved.
引用
收藏
页码:28 / 37
页数:10
相关论文
共 50 条
  • [1] Chaotic coyote optimization algorithm for image encryption and steganography
    Tong, Huawei
    Li, Tianyou
    Xu, Youyun
    Su, Xinzhong
    Qiao, Guopeng
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (07) : 20861 - 20887
  • [2] Chaotic coyote optimization algorithm for image encryption and steganography
    Huawei Tong
    Tianyou Li
    Youyun Xu
    Xinzhong Su
    Guopeng Qiao
    [J]. Multimedia Tools and Applications, 2024, 83 : 20861 - 20887
  • [3] Substitution Steganography with Security Improved by Chaotic Image Encryption
    Oravec, Jakub
    Turan, Jan
    [J]. 2017 IEEE 14TH INTERNATIONAL SCIENTIFIC CONFERENCE ON INFORMATICS, 2017, : 284 - 288
  • [4] Multi image encryption and steganography based on synchronization of chaotic lasers
    Mukhopadhyay, Sumona
    Leung, Henry
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC 2013), 2013, : 4403 - 4408
  • [5] Chaotic image encryption based on finite field bidirectional diffusion and steganography
    Liu, Xiang
    Ding, Dawei
    Yang, Zongli
    [J]. 2024 3RD INTERNATIONAL CONFERENCE ON IMAGE PROCESSING AND MEDIA COMPUTING, ICIPMC 2024, 2024, : 218 - 222
  • [6] Reversibly selective encryption for medical images based on coupled chaotic maps and steganography
    Lina Zhang
    Xianhua Song
    Ahmed A. Abd El-Latif
    Yanfeng Zhao
    Bassem Abd-El-Atty
    [J]. Complex & Intelligent Systems, 2024, 10 : 2187 - 2213
  • [7] Reversibly selective encryption for medical images based on coupled chaotic maps and steganography
    Zhang, Lina
    Song, Xianhua
    Abd El-Latif, Ahmed A.
    Zhao, Yanfeng
    Abd-El-Atty, Bassem
    [J]. COMPLEX & INTELLIGENT SYSTEMS, 2024, 10 (02) : 2187 - 2213
  • [8] Selective image encryption using a spatiotemporal chaotic system
    Xiang, Tao
    Wong, Kwok-wo
    Liao, Xiaofeng
    [J]. CHAOS, 2007, 17 (02)
  • [9] Secured Image Transmission Through Region-Based Steganography Using Chaotic Encryption
    Dash, Shreela
    Das, M. N.
    Das, Mamatarani
    [J]. COMPUTATIONAL INTELLIGENCE IN DATA MINING, 2019, 711 : 535 - 544
  • [10] Combined image encryption and steganography technique for enhanced security using multiple chaotic maps*
    Aparna, H.
    Madhumitha, J.
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2023, 110