云存储图像缩略图保持的加密研究进展
Cloud-stored image thumbnail-preserving encryption
- 2023年28卷第3期 页码:645-665
纸质出版日期: 2023-03-16 ,
录用日期: 2022-11-01
DOI: 10.11834/jig.220533
移动端阅览
浏览全部资源
扫码关注微信
纸质出版日期: 2023-03-16 ,
录用日期: 2022-11-01
移动端阅览
赵若宇, 叶茜, 周文韬, 张玉书, 柴秀丽. 云存储图像缩略图保持的加密研究进展[J]. 中国图象图形学报, 2023,28(3):645-665.
Ruoyu Zhao, Xi Ye, Wentao Zhou, Yushu Zhang, Xiuli Chai. Cloud-stored image thumbnail-preserving encryption[J]. Journal of Image and Graphics, 2023,28(3):645-665.
图像云存储平台因其信息共享方便、价格低廉、节省本地存储空间以及弹性可扩充等技术性优势逐渐显现出其应用价值。但云存储的环境下,图像的隐私问题十分突出。将具有丰富视觉意义的原始图像转化为无任何视觉意义的经典加密方案能够缓和隐私担忧,但这种方式放弃了图像在云端的视觉可用性,迫使用户在隐私性与可用性之间做出选择。研究者提出了能够在图像隐私性与可用性之间达成平衡的加密图像新范式,即缩略图保持加密(thumbnail-preserving encryption
TPE)。在TPE方案中,原始图像中精细的视觉信息被抹去以保护隐私,而粗略的视觉信息被保留以保持可用。同时,TPE考虑了隐私具有因人而异、因事而论的主观性和动态性,允许用户通过简单操作来改变隐私性与可用性之间的平衡。鉴于国内外尚无关于TPE的研究进展或者综述,为了有助于TPE研究的进一步发展,本文对TPE的研究进行系统性总结。首先简述TPE的研究背景与意义,以客观视角对TPE方案进行全面总结与回顾,同时展望潜在的研究方向。本文将TPE方案根据密文图像和解密图像的视觉质量分为理想TPE与近似TPE两类,这是第一次对TPE进行系统性分类的研究进展,并分别对现有技术方案进行细致阐述,从技术原理角度给出了各方案的优缺点以及可能改进的方向。同时,利用实验手段对相关具有代表性的技术方案进行了对比测试。最后,细致地探究了TPE可能的应用场景,并提出了有助于TPE进一步发展的研究重点和现存问题。总体来说,本文工作对现有的TPE方案进行归纳整理、分析提炼,从而反映该领域的研究现状和发展趋势,填补了国内外TPE尚无系统性总结工作这一空白。
Image cloud storage platform has been developing intensively in recent years in relevant to its features of information sharing
cost efficiency
less local storage space and elastic scalability. It has led to the growth of uploading images to the cloud. However
cloud storage is risky for its convenience. It has caused a number of privacy concerns. For example
the Hollywood pornographic photo scandal broke out in iCloud in 2014 because Hollywood actresses uploaded nude photos directly to the cloud. The iCloud is hacked to obtain these images after that. Rich visual meaning original images are converted by classical image encryption schemes into visual meaningless images
as well as salt and pepper-resembled noises can alleviate privacy concerns. However
the visual usability of the image in the cloud is ignored since users cannot obtain any useful visual information via browsing images in the cloud
and users is forced to choose it in following between image privacy and usability. Meanwhile
users have to download and decrypted the encrypted image continuously until they find the required one. In some cases
users may have to download and decrypt all encrypted images stored in the cloud if they need one image only. It is equivalent to ignore most of the usability of the cloud and preserving only the storage function
which may be one of the reasons why image encryption is rare in the cloud. The balancing issue of privacy and usability has been challenging in the field of multimedia research currently. The emerging thumbnail-preserving encryption (TPE) can balance image privacy and usability in terms of preserving the original thumbnail in the encrypted image recently. The visual effect-preserved in the encrypted image is equivalent to the original thumbnail-preserved. That is
visual information is larger than the thumbnail
and visual information is smaller than thumbnail-preserved. Users can configure and browse visual information only to identify images for usability. First
all TPE schemes are oriented to segmenting the image into thumbnail blocks and the block size is determined by the user. The visual information larger than the thumbnail block is preserved in the encrypted image
but the visual information is smaller than the deleted thumbnail block. The larger of the size is
the privacy protection is better and the usability is worse. Conversely
the size is smaller
the privacy protection is worse and the usability is better. Hence
users can adjust the balance between privacy and usability by resizing as needed
i.e.
balance tunability
which allows users with different privacy sensitivities to choose the balance point to satisfy themselves. In fact
privacy has the characteristics of complexity and subjectivity that vary from person to person and from time to time. As long as users think it is in privacy
it should be protected. Therefore
privacy protection needs to give users the right option to decide
that is
let them adjust the degree of protection. In other words
TPE can yield users to adjust the protection level by changing one parameter simply
i.e.
block size. Then
the pixels in each thumbnail block are encrypted and the premise is focused on the sum of pixel values in the block before and after encryption preserves unchanged. The closer the sum of the pixel values of the encrypted block is concerned of the sum of the corresponding original block
the higher quality of the thumbnail is preserved in the encrypted image
i.e.
the visual quality is better for the encrypted image. The aims and objects of TPE research is briefly introduced in this paper. Furthermore
we summarize and review TPE schemes quantitatively
and potential research directions and possible applicable scenarios are predicted. The existing TPE schemes are classified into two types in terms of the visual quality of encrypted and decrypted images: 1) ideal TPE and 2) approximate TPE. For the former one
the thumbnail of the encrypted image is identical to the thumbnail of the original one
and the decrypted image is exactly the same as the original one simultaneously. For the latter one
the thumbnail of the encrypted image is the approximate version of the thumbnail of the original one despite of similarity-perceptual between the both
some pixels have changed slightly although there may no perceptible difference between the decrypted image and the original image in visual effect. The existing TPE schemes are described in detail in the context of its key techniques
framework
and security. Meanwhile
the pros and cons and potential directions of each scheme are given in terms of technical mechanism. In addition
to demonstrate the features of the relevant schemes
the representative TPE schemes are fully compared and tested by experiments
such as visual quality evaluation
size expansion evaluation
face detection evaluation
and user experiment. All experiments are equipped with the same machine and its key parameters are i7-8700 CPU@ 3.2 GHz
16 GB RAM
and Window 10
while most experiments are configured with MATLAB 2016b. Finally
the synthesized open problems of TPE schemes and the future directions can predict for improving the existing schemes. To sum up
the existing TPE schemes are reviewed literately. The summary of TPE is carried out systematically on the basis of research status and development trend-relevant analysis.
云存储安全图像加密图像隐私可用性保持视觉可用
cloud storage securityimage encryptionimage privacyusability preservingvisual usability
Almahairi A, Rajeswar S, Sordoni A, Bachman P and Courville A C. 2018. Augmented cycleGAN: learning many-to-many mappings from unpaired data//Proceedings of the 35th International Conference on Machine Learning. Stockholmsmässan, Sweden: PMLR: 195-204
Bellare M, Ristenpart T, Rogaway P and Stegers T. 2009. Format-preserving encryption//Proceedings of the 16th International Workshop on Selected Areas in Cryptography. Calgary, Canada: Springer: 295-312 [DOI: 10.1007/978-3-642-05445-7_19http://dx.doi.org/10.1007/978-3-642-05445-7_19]
Brakerski Z, Gentry C and Vaikuntanathan V. 2014. (Leveled) fully homomorphic encryption without bootstrapping. ACM Transactions on Computation Theory, 6(3): #13 [DOI: 10.1145/2633600]
Chai X L, Wang Y J, Chen X H, Gan Z H and Zhang Y S. 2022. TPE-GAN: thumbnail preserving encryption based on GAN with key. IEEE Signal Processing Letters, 29: 972-976 [DOI: 10.1109/LSP.2022.3163685]
Denning T, Bowers K, van Dijk M and Juels A. 2011. Exploring implicit memory for painless password recovery//Proceedings of 2011 SIGCHI Conference on Human Factors in Computing Systems. Vancouver, Canada: ACM: 2615-2618 [DOI: 10.1145/1978942.1979323http://dx.doi.org/10.1145/1978942.1979323]
Falcioni M, Palatella L, Pigolotti S and Vulpiani A. 2005. Properties making a chaotic system a good pseudo random number generator. Physical Review E, 72(1): #016220 [DOI: 10.1103/PhysRevE.72.016220]
Fan L Y. 2019. A demonstration of image obfuscation with provable privacy//Proceedings of 2019 IEEE International Conference on Multimedia and Expo Workshops. Shanghai, China: IEEE: #608 [DOI: 10.1109/ICMEW.2019.00112http://dx.doi.org/10.1109/ICMEW.2019.00112]
Goldreich O, Goldwasser S and Micali S. 1986. How to construct random functions. Journal of the ACM, 33(4): 792-807 [DOI: 10.1145/6490.6503]
Greene M R, Botros A P, Beck D M and Li F F. 2015. What you see is what you expect: rapid scene understanding benefits from prior experience. Attention, Perception, and Psychophysics, 77(4): 1239-1251 [DOI: 10.3758/s13414-015-0859-8]
Gregory R L. 1997. Knowledge in perception and illusion. Philosophical Transactions of the Royal Society B: Biological Sciences, 352(1358): 1121-1127 [DOI: 10.1098/rstb.1997.0095]
Gu Z Q, Li H, Khan S, Deng L B, Du X J, Guizani M and Tian Z H. 2022. IEPSBP: a cost-efficient image encryption algorithm based on parallel chaotic system for green IoT. IEEE Transactions on Green Communications and Networking, 6(1): 89-106 [DOI: 10.1109/TGCN.2021.3095707]
Hayashi E, Hong J and Christin N. 2011. Security through a different kind of obscurity: evaluating distortion in graphical authentication schemes//Proceedings of 2011 SIGCHI Conference on Human Factors in Computing Systems. Vancouver, Canada: ACM: 2055-2064 [DOI: 10.1145/1978942.1979242http://dx.doi.org/10.1145/1978942.1979242]
Hua Z Y, Zhu Z H, Chen Y Y and Li Y M. 2021. Color image encryption using orthogonal Latin squares and a new 2D chaotic system. Nonlinear Dynamics, 104(4): 4505-4522 [DOI: 10.1007/s11071-021-06472-6]
Jolfaei A, Wu X W and Muthukkumarasamy V. 2016. On the security of permutation-only image encryption schemes. IEEE Transactions on Information Forensics and Security, 11(2): 235-246 [DOI: 10.1109/TIFS.2015.2489178]
Kinjo H and Snodgrass J G. 2000. Does the generation effect occur for pictures? The American Journal of Psychology, 113(1): 95-121 [DOI: 10.2307/1423462]
Kok P, Brouwer G J, van Gerven M A J and de Lange F P. 2013. Prior expectations bias sensory representations in visual cortex. Journal of Neuroscience, 33(41): 16275-16284 [DOI: 10.1523/JNEUROSCI.0742-13.2013]
Le V, Brandt J, Lin Z, Bourdev L and Huang T S. 2012. Interactive facial feature localization//Proceedings of the 12th European Conference on Computer Vision. Florence, Italy: Springer: 679-692 [DOI: 10.1007/978-3-642-33712-3_49http://dx.doi.org/10.1007/978-3-642-33712-3_49]
Li A, Darling D and Li Q H. 2018. PhotoSafer: content-based and context-aware private photo protection for smartphones//Proceedings of 2018 IEEE Symposium on Privacy-Aware Computing. Washington, USA: IEEE: 10-18 [DOI: 10.1109/PAC.2018.00008http://dx.doi.org/10.1109/PAC.2018.00008]
Li C Q and Lo K T. 2011. Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Processing, 91(4): 949-954 [DOI: 10.1016/j.sigpro.2010.09.014]
Li F F, Iyer A, Koch C and Perona P. 2007. What do we perceive in a glance of a real-world scene? Journal of Vision, 7(1): #10 [DOI: 10.1167/7.1.10]
Li S J, Li C Q, Chen G R, Bourbakis N G and Lo K T. 2008. A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Processing: Image Communication, 23(3): 212-223 [DOI: 10.1016/j.image.2008.01.003]
Liu Z L, Jia C F and Li J W. 2012. Research on the format-preserving encryption techniques. Journal of Software, 23(1): 152-170
刘哲理, 贾春福, 李经纬. 2012. 保留格式加密技术研究. 软件学报, 23(1): 152-170 [DOI: 10.3724/SP.J.1001.2012.04096]
Lu G J. 2015. The Possibility of Constructing "the Public Sphere" in the Internet——Hollywood Stars in iCloud Hack. Suzhou: Soochow University
陆国杰. 2015. 探讨「公共领域」网络中构成的可能性——以iCloud私密照外泄事件为例. 苏州: 苏州大学
Luby M and Rackoff C. 1988. How to construct pseudorandom permutations from pseudorandom functions. SIAM Journal on Computing, 17(2): 373-386 [DOI: 10.1137/0217022]
Marohn B, Wright C V, Feng W C, Rosulek M and Bobba R B. 2017. Approximate thumbnail preserving encryption//Proceedings of 2017 on Multimedia Privacy and Security. Dallas, USA: ACM: 33-43 [DOI: 10.1145/3137616.3137621http://dx.doi.org/10.1145/3137616.3137621]
McElhearn K. 2021. Apple announces expanded protections for children [EB/OL]. [2022-03-28].https://www.intego.com/mac-security-blog/apple-announces-expanded-protections-for-children/https://www.intego.com/mac-security-blog/apple-announces-expanded-protections-for-children/
Paillier P. 1999. Public-key cryptosystems based on composite degree residuosity classes//Proceedings of 1999 International Conference on the Theory and Applications of Cryptographic Techniques. Prague, Czech Republic: Springer: 223-238 [DOI: 10.1007/3-540-48910-X_16http://dx.doi.org/10.1007/3-540-48910-X_16]
Potter M C. 1975. Meaning in visual search. Science, 187(4180): 965-966 [DOI: 10.1126/science.1145183]
Potter M C. 1976. Short-term conceptual memory for pictures. Journal of Experimental Psychology: Human Learning and Memory, 2(5): 509-522 [DOI: 10.1037/0278-7393.2.5.509]
Rahumed A, Chen H C H, Tang Y, Lee P P C and Lui J C S. 2011. A secure cloud backup system with assured deletion and version control//Proceedings of the 40th International Conference on Parallel Processing Workshops. Taipei, China: IEEE: 160-167 [DOI: 10.1109/ICPPW.2011.17http://dx.doi.org/10.1109/ICPPW.2011.17]
Rezende I N. 2020. Facial recognition in police hands: assessing the 'Clearview case' from a European perspective. New Journal of European Criminal Law, 11(3): 375-389 [DOI: 10.1177/2032284420948161]
Rosenblatt J. 2016. Is Facebook's facial-scanning technology invading your privacy rights? [EB/OL]. [2022-03-29].https://www.bloomberg.com/news/articles/2016-10-26/is-facebook-s-facial-sca-nning-technology-invading-your-privacy-rightshttps://www.bloomberg.com/news/articles/2016-10-26/is-facebook-s-facial-sca-nning-technology-invading-your-privacy-rights
Tajik K, Gunasekaran A, Dutta R, Ellis B, Bobba R B, Rosulek M, Wright C V and Feng W C. 2019. Balancing image privacy and usability with thumbnail-preserving encryption//Proceedings of 2019 Network and Distributed System Security Symposium. San Diego, USA: The Internet Society [DOI: 10.14722/ndss.2019.23432http://dx.doi.org/10.14722/ndss.2019.23432]
Wang F, Shao Z H, Wang Y F, Yao Q J and Liu X L. 2020. Multiple image encryption of high robustness in gyrator transform domain. Journal of Image and Graphics, 25(7): 1366-1379
王丰, 邵珠宏, 王云飞, 姚启钧, 刘西林. 2020. gyrator变换域的高鲁棒多图像加密算法. 中国图象图形学报, 25(7): 1366-1379 [DOI: 10.11834/jig.190344]
Wen W Y, Wei K K, Fang Y M and Zhang Y S. 2021. Visual quality assessment for perceptually encrypted light field images. IEEE Transactions on Circuits and Systems for Video Technology, 31(7): 2522-2534 [DOI: 10.1109/TCSVT.2020.3026817]
Wright C V, Feng W C and Liu F. 2015. Thumbnail-preserving encryption for JPEG//Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security. Portland, USA: ACM: 141-146 [DOI: 10.1145/2756601.2756618http://dx.doi.org/10.1145/2756601.2756618]
Yu X J, Wang Z, Li Y J, Li L, Zhu W T and Song L. 2017. EvoPass: evolvable graphical password against shoulder-surfing attacks. Computers and Security, 70: 179-198 [DOI: 10.1016/j.cose.2017.05.006]
Zhang L Y, Liu Y S, Wang C, Zhou J T, Zhang Y S and Chen G R. 2018. Improved known-plaintext attack to permutation-only multimedia ciphers. Information Sciences, 430-431: 228-239 [DOI: 10.1016/j.ins.2017.11.021]
Zhang Y M, Zhao R Y, Zhang Y S, Lan R S and Chai X L. 2022b. High-efficiency and visual-usability image encryption based on thumbnail preserving and chaotic system. Journal of King Saud University-Computer and Information Sciences, 34(6): 2993-3010 [DOI: 10.1016/j.jksuci.2022.04.001]
Zhang Y S, Zhao R Y, Xiao X L, Lan R S, Liu Z and Zhang X P. 2022a. HF-TPE: high-fidelity thumbnail-preserving encryption. IEEE Transactions on Circuits and Systems for Video Technology, 32(3): 947-961 [DOI: 10.1109/TCSVT.2021.3070348]
Zhao R Y, Zhang Y S, Xiao X L, Ye X and Lan R S. 2021. TPE2: three-pixel exact thumbnail-preserving image encryption. Signal Processing, 183: #108019 [DOI: 10.1016/j.sigpro.2021.108019]
相关作者
相关机构