Secure and Privacy-preserving Data Sharing in the Cloud based on Lossless Image Coding

Khelifi, Fouad and Brahimi, Tahar and Han, Jungong and Li, Xuelong (2018) Secure and Privacy-preserving Data Sharing in the Cloud based on Lossless Image Coding. Signal Processing, 148. pp. 91-101. ISSN 0165-1684

[thumbnail of 1-s2.0-S016516841830063X-main]
PDF (1-s2.0-S016516841830063X-main)
1_s2.0_S016516841830063X_main.pdf - Accepted Version
Available under License Creative Commons Attribution-NonCommercial-NoDerivs.

Download (2MB)


Abstract Image and video processing in the encrypted domain has recently emerged as a promising research area to tackle privacy-related data processing issues. In particular, reversible data hiding in the encrypted domain has been suggested as a solution to store and manage digital images securely in the cloud while preserving their confidentiality. However, although efficiency has been claimed with reversible data hiding techniques in encrypted images (RDHEI), reported results show that the cloud service provider cannot add more than 1 bit per pixel (bpp) of additional data to manage stored images. This paper highlights the weakness of RDHEI as a suggested approach for secure and privacy-preserving cloud computing. In particular, we propose a new, simple, and efficient approach that offers the same level of data security and confidentiality in the cloud without the process of reversible data hiding. The proposed idea is to compress the image via a lossless image coder in order to create space before encryption. This space is then filled with a randomly generated sequence and combined with an encrypted version of the compressed bit stream to form a full resolution encrypted image in the pixel domain. The cloud service provider uses the created room in the encrypted image to add additional data and produces an encrypted image containing additional data in a similar fashion. Assessed with the lossless Embedded Block Coding with Optimized Truncation (EBCOT) algorithm on natural images, the proposed scheme has been shown to exceed the capacity of 3 bpp of additional data while maintaining data security and confidentiality.

Item Type:
Journal Article
Journal or Publication Title:
Signal Processing
Additional Information:
This is the author’s version of a work that was accepted for publication in Signal Processing. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. A definitive version was subsequently published in Signal Processing, 148, 2018 DOI: 10.1016/j.sigpro.2018.20.016
ID Code:
Deposited By:
Deposited On:
20 Feb 2018 17:50
Last Modified:
16 Sep 2023 01:38