Privacy-preserving inpainting for outsourced image

被引:1
|
作者
Cao, Fang [1 ,2 ]
Sun, Jiayi [3 ]
Luo, Xiangyang [4 ]
Qin, Chuan [3 ]
Chang, Ching-Chun [5 ]
机构
[1] Shanghai Maritime Univ, Coll Informat Engn, Shanghai, Peoples R China
[2] Guangxi Normal Univ, Guangxi Key Lab Multisource Informat Min & Secur, Guilin, Peoples R China
[3] Univ Shanghai Sci & Technol, Sch Opt Elect & Comp Engn, Shanghai, Peoples R China
[4] Zhengzhou Informat Sci & Technol Inst, Zhengzhou, Peoples R China
[5] Univ Warwick, Dept Comp Sci, Coventry CV4 7AL, W Midlands, England
基金
中国国家自然科学基金;
关键词
Privacy preserving; image inpainting; encrypted domain; visual quality; OBJECT REMOVAL; COMPRESSION; RECOVERY;
D O I
10.1177/15501477211059092
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this article, a framework of privacy-preserving inpainting for outsourced image and an encrypted-image inpainting scheme are proposed. Different with conventional image inpainting in plaintext domain, there are two entities, that is, content owner and image restorer, in our framework. Content owner first encrypts his or her damaged image for privacy protection and outsources the encrypted, damaged image to image restorer, who may be a cloud server with powerful computation capability. Image restorer performs inpainting in encrypted domain and sends the inpainted and encrypted image back to content owner or authorized receiver, who can acquire final inpainted result in plaintext domain through decryption. In our encrypted-image inpainting scheme, with the assist of Johnson-Lindenstrauss transform that can preserve Euclidean distance between two vectors before and after encryption, the best-matching block with the smallest distance to current block can be found and utilized for patch filling in Paillier-encrypted image. To eliminate mosaic effect after decryption, weighted mean filtering in encrypted domain is conducted with Paillier homomorphic properties. Experimental results show that our privacy-preserving inpainting framework can be effectively applied in secure cloud computing, and the proposed encrypted-image inpainting scheme achieves comparable visual quality of inpainted results with some typical inpainting schemes in plaintext domain.
引用
收藏
页数:18
相关论文
共 50 条
  • [1] Privacy-preserving outsourced image feature extraction
    Li, Dongmei
    Doug, Xiaolei
    Cao, Zhenfu
    Wang, Haijiang
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 47 : 59 - 64
  • [2] Efficient and Privacy-preserving outsourced Image Retrieval in Public Clouds
    Song, Fuyuan
    Qin, Zheng
    Zhang, Jixin
    Liu, Dongxiao
    Liang, Jinwen
    Shen, Xuemin
    [J]. 2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2020,
  • [3] A Privacy-Preserving Join on Outsourced Database
    Ma, Sha
    Yang, Bo
    Li, Kangshun
    Xia, Feng
    [J]. INFORMATION SECURITY, 2011, 7001 : 278 - 292
  • [4] Privacy-Preserving Outsourced Media Search
    Weng, Li
    Amsaleg, Laurent
    Furon, Teddy
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2016, 28 (10) : 2738 - 2751
  • [5] Privacy-Preserving Outsourced Similarity Search
    Kozak, Stepan
    Novak, David
    Zezula, Pavel
    [J]. JOURNAL OF DATABASE MANAGEMENT, 2014, 25 (03) : 48 - 71
  • [6] Privacy-preserving face recognition with outsourced computation
    Xiang, Can
    Tang, Chunming
    Cai, Yunlu
    Xu, Qiuxia
    [J]. SOFT COMPUTING, 2016, 20 (09) : 3735 - 3744
  • [7] Privacy-Preserving Outsourced Calculation Toolkit in the Cloud
    Liu, Ximeng
    Deng, Robert H.
    Choo, Kim-Kwang Raymond
    Yang, Yang
    Pang, HweeHwa
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (05) : 898 - 911
  • [8] Privacy-preserving face recognition with outsourced computation
    Can Xiang
    Chunming Tang
    Yunlu Cai
    Qiuxia Xu
    [J]. Soft Computing, 2016, 20 : 3735 - 3744
  • [9] Privacy-preserving outsourced classification in cloud computing
    Ping Li
    Jin Li
    Zhengan Huang
    Chong-Zhi Gao
    Wen-Bin Chen
    Kai Chen
    [J]. Cluster Computing, 2018, 21 : 277 - 286
  • [10] Privacy-preserving outsourced classification in cloud computing
    Li, Ping
    Li, Jin
    Huang, Zhengan
    Gao, Chong-Zhi
    Chen, Wen-Bin
    Chen, Kai
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2018, 21 (01): : 277 - 286