Cloud-Assisted Image Double Protection System With Encryption and Data Hiding Based on Compressive Sensing

Cloud-Assisted Image Double Protection System With Encryption and Data Hiding Based on Compressive Sensing

Di Xiao, Jia Liang, Yanping Xiang, Jiaqi Zhou
Copyright: © 2021 |Volume: 13 |Issue: 6 |Pages: 19
ISSN: 1941-6210|EISSN: 1941-6229|EISBN13: 9781799867531|DOI: 10.4018/IJDCF.295812
Cite Article Cite Article

MLA

Xiao, Di, et al. "Cloud-Assisted Image Double Protection System With Encryption and Data Hiding Based on Compressive Sensing." IJDCF vol.13, no.6 2021: pp.1-19. http://doi.org/10.4018/IJDCF.295812

APA

Xiao, D., Liang, J., Xiang, Y., & Zhou, J. (2021). Cloud-Assisted Image Double Protection System With Encryption and Data Hiding Based on Compressive Sensing. International Journal of Digital Crime and Forensics (IJDCF), 13(6), 1-19. http://doi.org/10.4018/IJDCF.295812

Chicago

Xiao, Di, et al. "Cloud-Assisted Image Double Protection System With Encryption and Data Hiding Based on Compressive Sensing," International Journal of Digital Crime and Forensics (IJDCF) 13, no.6: 1-19. http://doi.org/10.4018/IJDCF.295812

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

In this paper, we propose a compressive sensing(CS)-based scheme that combines encryption and data hiding to provide double protection to the image data in the cloud outsourcing. Different domain techniques are integrated for efficiency and security. After the data holder gets the sample of the raw data, he embeds watermark into sample and encrypts it, and then sends the protected sample to cloud for storage and recovery. Cloud cannot get any information about either the original data or watermark in the CS recovery process. Finally, users can extract the watermark and decrypt the data recovered by cloud directly in sparse domain. At the same time, after extracting the watermark, the image data of user will be closer to the original data compared with the data without extraction. Besides, the counter (CTR) mode is introduced to generate the measurement matrix of CS, which can improve security while avoiding the storage of measurement matrixes. The experimental results demonstrate that the scheme can provide both privacy protection and copyright protection with high efficiency.