[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

E-TPE: Efficient Thumbnail-Preserving Encryption for Privacy Protection in Visual Sensor Networks

Published: 11 May 2024 Publication History

Abstract

When visual sensor networks (VSNs) enter daily life in society, they not only bring great convenience but also cause people to worry about privacy. Traditional image encryption uses the snowflake effect to protect the privacy, but this can compromise the usability of directly browsing images captured by nodes in VSNs. Recently, thumbnail-preserving encryption (TPE) has been proposed to balance image usability and privacy. However, the Markov chain’s limited connectivity and high time cost, which result in low efficiency, may preclude its application in VSNs. Motivated by this, we propose a novel TPE scheme to protect the image collected in VSNs’ privacy efficiently. We first deeply study the bijective relationship between the three-pixel group and its rank, and then propose a new number method for both, based on which we design the efficient rank mapping. Subsequently, an efficient thumbnail-preserving image encryption via three-pixel rank mapping (E-TPE) is designed, achieving NR security and enhancing the Markov chain’s connectivity. The experiments demonstrate the scheme’s efficiency; that is, it is currently the quickest ideal-TPE scheme with NR security, and a good balance is achieved between usability and privacy.

References

[1]
Mihir Bellare, Thomas Ristenpart, Phillip Rogaway, and Till Stegers. 2009. Format-preserving encryption. In International Workshop on Selected Areas in Cryptography. 295–312.
[2]
Bernardo Ferreira, João Rodrigues, João Leitão, and Henrique Domingos. 2019. Practical privacy-preserving content-based retrieval in cloud image repositories. IEEE Trans. Cloud Comput. 7, 3 (2019), 784–798.
[3]
Oded Goldreich, Shafi Goldwasser, and Silvio Micali. 1986. How to construct random functions. J. ACM 33, 4 (1986), 792–807.
[4]
Michelle R. Greene, Abraham P. Botros, Diane M. Beck, and Li Fei-Fei. 2015. What you see is what you expect: Rapid scene understanding benefits from prior experience. Atten. Percept. Psychophys. 77, 4 (2015), 1239–1251.
[5]
Zhaoquan Gu, Hao Li, Sajid Khan, Lianbing Deng, Xiaojiang Du, Mohsen Guizani, and Zhihong Tian. 2022. IEPSBP: A cost-efficient image encryption algorithm based on parallel chaotic system for green IoT. IEEE Trans. Green Commun. Netw. 6, 1 (2022), 89–106.
[6]
Eman T. Hassan, Rakibul Hasan, Patrick Shaffer, David Crandall, and Apu Kapadia. 2017. Cartooning for enhanced privacy in lifelogging and streaming videos. In Proc. IEEE Comput. Soc. Conf. Comput. Vision Pattern Recognit. Workshops. 1333–1342.
[7]
Jianping He, Bin Liu, Deguang Kong, Xuan Bao, Na Wang, Hongxia Jin, and George Kesidis. 2016. PUPPIES: Transformation-supported personalized privacy preserving partial image sharing. In Proc. - Annu. IEEE/IFIP Int. Conf. Dependable Syst. Networks. 359–370.
[8]
Ankit Jain and Abhishek Srivastava. 2022. Privacy-preserving efficient fire detection system for indoor surveillance. IEEE Transactions on Industrial Informatics 18, 5 (2022), 3043–3054.
[9]
Alireza Jolfaei, Xin-Wen Wu, and Vallipuram Muthukkumarasamy. 2016. On the security of permutation-only Image encryption schemes. IEEE Trans. Inf. Forensic Secur. 11, 2 (2016), 235–246.
[10]
X. Kang and R. Tao. 2019. Color image encryption using pixel scrambling operator and reality-preserving MPFRHT. IEEE Trans. Circuits Syst. Video Technol. 29, 7 (2019), 1919–1932.
[11]
Peter Kok, Gijs Joost Brouwer, Marcel A. J. van Gerven, and Floris P. de Lange. 2013. Prior expectations bias sensory representations in visual cortex. J. Neurosci. 33, 41 (2013), 16275–16284.
[12]
Marc Langheinrich. 2001. Privacy by design–Principles of privacy-aware ubiquitous systems. In Int. Conf. Ubiquitous Comput. Springer, 273–291.
[13]
Vuong Le, Jonathan Brandt, Zhe Lin, Lubomir Bourdev, and Thomas S. Huang. 2012. Interactive facial feature localization. In Computer Vision (ECCV’12). 679–692.
[14]
David Levin and Yuval Peres. 2006. Markov Chains and Mixing Times. Am. Math. Soc.
[15]
Wen-Nung Lie, Chia-Yung Hsieh, and Guo-Shiang Lin. 2018. Key-frame-based background sprite generation for hole filling in depth image-based rendering. IEEE Trans. Multimedia 20, 5 (2018), 1075–1087.
[16]
Meng Liu, Hongsheng Hu, Haolong Xiang, Chi Yang, Lingjuan Lyu, and Xuyun Zhang. 2021. Clustering-based efficient privacy-preserving face recognition scheme without compromising accuracy. ACM Trans. Sen. Netw. 17, 3, Article 31 (2021), 27 pages.
[17]
Michael Luby and Charles Rackoff. 1988. How to construct pseudorandom permutations from pseudorandom functions. SIAM J. Comput. 17, 2 (1988), 373–386.
[18]
Byron Marohn, Charles V. Wright, Wu-chi Feng, Mike Rosulek, and Rakesh B. Bobba. 2017. Approximate thumbnail preserving encryption. In Proc. Multimed. Priv. Secur.33–43.
[19]
Maxim Maximov, Ismail Elezi, and Laura Leal-Taixe. 2020. CIAGAN: Conditional identity anonymization generative adversarial networks. In Proc. IEEE Comput. Soc. Conf. Comput. Vision Pattern Recognit.5446–5455.
[20]
Suyel Namasudra, Rupak Chakraborty, Abhishek Majumder, and Nageswara Rao Moparthi. 2020. Securing multimedia by using DNA-based encryption in the cloud computing environment. ACM Trans. Multimedia Comput. Commun. Appl. 16, 3s (2020), 1–19.
[21]
Elaine M. Newton, Latanya Sweeney, and Bradley Malin. 2005. Preserving privacy by de-identifying face images. IEEE Trans. Knowl. Data Eng. 17, 2 (2005), 232–243.
[22]
Pascal Paillier. 1999. Public-key cryptosystems based on composite degree residuosity classes. In Lect. Notes Comput. Sci., Jacques Stern (Ed.). 223–238.
[23]
Mary C. Potter. 1975. Meaning in visual search. Science 187, 4180 (1975), 965–966.
[24]
Z. Qin, J. Weng, Y. Cui, and K. Ren. 2018. Privacy-preserving image processing in the cloud. IEEE Cloud Comput. 5, 2 (2018), 48–57.
[25]
Kedar Nath Singh and Amit Kumar Singh. 2022. Towards integrating image encryption with compression: A survey. ACM Trans. Multimedia Comput. Commun. Appl. 18, 3 (2022), 1–21.
[26]
Weiwei Sun, Jiantao Zhou, Shuyuan Zhu, and Yuan Yan Tang. 2018. Robust privacy-preserving image sharing over online social networks (OSNs). ACM Trans. Multimedia Comput. Commun. Appl. 14, 1 (2018), 1–22.
[27]
Samira Taghavi and Weisong Shi. 2020. EdgeMask: An edge-based privacy preserving service for video data sharing. In IEEE/ACM Symp. Edge Comput.382–387.
[28]
Kimia Tajik, Akshith Gunasekaran, Rhea Dutta, Brandon Ellis, Rakesh B. Bobba, Mike Rosulek, Charles V. Wright, and Wu-chi Feng. 2019. Balancing image privacy and usability with thumbnail-preserving encryption. In Proc. Symp. Netw. Distrib. Syst. Secur.
[29]
Ries Uittenbogaard, Clint Sebastian, Julien Vijverberg, Bas Boom, Dariu M. Gavrila, and Peter H. N. de With. 2019. Privacy protection in street-view panoramas using depth and multi-view imagery. In Proc. IEEE Comput. Soc. Conf. Comput. Vision Pattern Recognit.10573–10582.
[30]
Thomas Winkler and Bernhard Rinner. 2014. Security and privacy protection in visual sensor networks: A survey. ACM Comput. Surv. 47, 1, Article 2 (2014), 42 pages.
[31]
Charles V. Wright, Wu-chi Feng, and Feng Liu. 2015. Thumbnail-preserving encryption for JPEG. In Proc. ACM Workshop Inf. Hiding Multimedia Secur.141–146.
[32]
Zhihua Xia, Xinhui Wang, Liangao Zhang, Zhan Qin, Xingming Sun, and Kui Ren. 2016. A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans. Inf. Forensic Secur. 11, 11 (2016), 2594–2608.
[33]
Hanwen Xue, Juan Du, Shouliang Li, and Weijiao Ma. 2018. Region of interest encryption for color images based on a hyperchaotic system with three positive Lyapunov exponets. Opt. Laser. Technol. 106 (2018), 506–516.
[34]
Zhujing Ye, Ruoyu Zhao, Yushu Zhang, Xiangli Xiao, Rushi Lan, and Yong Xiang. 2022. Noise-free thumbnail-preserving image encryption based on MSB prediction. Inf. Sci. 617 (2022), 395–415.
[35]
Yuan Yuan, Jie Fang, Xiaoqiang Lu, and Yachuang Feng. 2019. Spatial structure preserving feature pyramid network for semantic image segmentation. ACM Trans. Multimedia Comput. Commun. Appl. 15, 3 (2019), 1–19.
[36]
Leo Yu Zhang, Yuansheng Liu, Fabio Pareschi, Yushu Zhang, Kwok-Wo Wong, Riccardo Rovatti, and Gianluca Setti. 2018. On the security of a class of diffusion mechanisms for image encryption. IEEE Trans. Cybern. 48, 4 (2018), 1163–1175.
[37]
Leo Yu Zhang, Yuansheng Liu, Cong Wang, Jiantao Zhou, Yushu Zhang, and Guanrong Chen. 2018. Improved known-plaintext attack to permutation-only multimedia ciphers. Inf. Sci. 430–431 (2018), 228–239.
[38]
Xu Zhang, Yangchao Zhao, Geyong Min, Wang Miao, Haojun Huang, and Zhan Ma. 2022. Intelligent video ingestion for real-time traffic monitoring. ACM Trans. Sen. Netw. 18, 3, Article 47 (2022), 13 pages.
[39]
Yushu Zhang, Ruoyu Zhao, Xiangli Xiao, Ruoshi Lan, Zhe Liu, and Xinpeng Zhang. 2022. HF-TPE: High-fidelity thumbnail-preserving encryption. IEEE Trans. Circuits Syst. Video Technol. 32, 3 (2022), 947–961.
[40]
Yongming Zhang, Ruoyu Zhao, Yushu Zhang, Rushi Lan, and Xiuli Chai. 2022. High-efficiency and visual-usability image encryption based on thumbnail preserving and chaotic system. J. King Saud Univ.-Comput. Inf. Sci., 34, 6, Part A (2022), 2993–3010.
[41]
Ruoyu Zhao, Yushu Zhang, Rushi Lan, Zhongyun Hua, and Yong Xiang. 2023. Heterogeneous and customized cost-efficient reversible image degradation for green IoT. IEEE Internet Things J., 10, 3 (2023), 2630–2645.
[42]
Ruoyu Zhao, Yushu Zhang, Xiangli Xiao, Xi Ye, and Rushi Lan. 2021. TPE2: Three-pixel exact thumbnail-preserving image encryption. Signal Process. 183 (2021), 108019.
[43]
Siwang Zhou, Yi Lian, Daibo Liu, Hongbo Jiang, Yonghe Liu, and Keqin Li. 2022. Compressive sensing based distributed data storage for mobile crowdsensing. ACM Trans. Sen. Netw. 18, 2, Article 25 (2022), 21 pages.
[44]
Serdar Çiftçi, Ahmet Oğuz Akyüz, and Touradj Ebrahimi. 2018. A reliable and reversible image privacy protection based on false colors. IEEE Trans. Multimedia 20, 1 (2018), 68–81.
[45]
Elaine Y.-N. Sun, Hsiao-Chun Wu, Costas Busch, Scott C.-H. Huang, Yen-Cheng Kuan, and Shih Yu Chang. 2021. Efficient recoverable cryptographic mosaic technique by permutations. IEEE Transactions on Circuits and Systems for Video Technology 31, 1 (2021), 112–125. DOI:

Cited By

View all
  • (2024)Fair and Robust Federated Learning via Decentralized and Adaptive Aggregation based on BlockchainACM Transactions on Sensor Networks10.1145/3673656Online publication date: 17-Jun-2024
  • (2024)Visually Semantics-Aware Color Image Encryption Based on Cross-Plane Substitution and PermutationIEEE Transactions on Industrial Informatics10.1109/TII.2024.339564620:8(10576-10586)Online publication date: Aug-2024
  • (2024)TPE-DF: Thumbnail Preserving Encryption via Dual-2DCS FusionIEEE Signal Processing Letters10.1109/LSP.2024.338470831(1039-1043)Online publication date: 2024
  • Show More Cited By

Index Terms

  1. E-TPE: Efficient Thumbnail-Preserving Encryption for Privacy Protection in Visual Sensor Networks

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Transactions on Sensor Networks
      ACM Transactions on Sensor Networks  Volume 20, Issue 4
      July 2024
      603 pages
      EISSN:1550-4867
      DOI:10.1145/3618082
      • Editor:
      • Wen Hu
      Issue’s Table of Contents

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Journal Family

      Publication History

      Published: 11 May 2024
      Online AM: 14 April 2023
      Accepted: 08 April 2023
      Revised: 24 February 2023
      Received: 29 November 2022
      Published in TOSN Volume 20, Issue 4

      Check for updates

      Author Tags

      1. Privacy protection
      2. usability
      3. security
      4. visual sensor networks

      Qualifiers

      • Research-article

      Funding Sources

      • National Key R&D Program of China
      • State Key Laboratory of Information Security
      • Basic Research Program of Jiangsu Province
      • National Natural Science Foundation of China

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)269
      • Downloads (Last 6 weeks)43
      Reflects downloads up to 12 Dec 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Fair and Robust Federated Learning via Decentralized and Adaptive Aggregation based on BlockchainACM Transactions on Sensor Networks10.1145/3673656Online publication date: 17-Jun-2024
      • (2024)Visually Semantics-Aware Color Image Encryption Based on Cross-Plane Substitution and PermutationIEEE Transactions on Industrial Informatics10.1109/TII.2024.339564620:8(10576-10586)Online publication date: Aug-2024
      • (2024)TPE-DF: Thumbnail Preserving Encryption via Dual-2DCS FusionIEEE Signal Processing Letters10.1109/LSP.2024.338470831(1039-1043)Online publication date: 2024
      • (2024)Dynamic feedback bit-level image privacy protection based on chaos and information hidingScientific Reports10.1038/s41598-024-53325-414:1Online publication date: 8-Mar-2024
      • (2024)Exploring the future application of UAVsJournal of King Saud University - Computer and Information Sciences10.1016/j.jksuci.2023.10187136:1Online publication date: 17-Apr-2024
      • (2024)TPE-MM: Thumbnail preserving encryption scheme based on Markov model for JPEG imagesApplied Intelligence10.1007/s10489-024-05318-z54:4(3429-3447)Online publication date: 23-Feb-2024
      • (2023)Chaos-based block permutation and dynamic sequence multiplexing for video encryptionScientific Reports10.1038/s41598-023-41082-913:1Online publication date: 7-Sep-2023

      View Options

      Login options

      Full Access

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Full Text

      View this article in Full Text.

      Full Text

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media