Affiliation:
1. School of Electronic Engineering, Heilongjiang University, Harbin 150080, China
Abstract
In recent years, the security of cloud storage has become a topic attracting significant attention due to a series of features such as large storage space, high availability, and low cost. Although traditional plain text images can withstand external attacks, the usability of images is completely lost. In order to balance the usability and privacy of images, some scholars have proposed the thumbnail-preserving encryption (TPE) scheme. The ideal TPE algorithm can keep the same thumbnail before and after encryption, which reduces the time cost and strengthens the resistance to attacks, but the existing schemes cannot fulfill the above criteria. In this paper, we propose a new TPE scheme that combines bit-transform encryption and improved hierarchical encryption. By constructing a chaotic system, both encryption and decryption times are shortened, while the randomness of the selected cells is enhanced. In addition, the Hamming distance is introduced to classify and scramble the binary encryption units. The experimental results show that when the number of thumbnail chunks is 16 × 16, the encryption and decryption time decreases to 4 s, and the SSIM value after encryption is close to 1, which indicates that the thumbnail before and after satisfying the encryption basically remains the same, and when the number of chunks is gradually increased, the success rate of the face detection tends to be close to 0. In addition, as the number of experimental iterations increases, the encryption effect improves with an increasing ability to resist attacks.
Funder
the National Science Foundation of China
Heilongjiang Province Postdoctoral Science Foundation
Heilongjiang Natural Science Foundation
Reference35 articles.
1. An image encryption approach on the basis of a time delay chaotic system;Wang;Optik,2021
2. Yassein, M.B., Aljawarneh, S., and Wahsheh, Y.A. (2019, January 9–11). Survey of Online Social Networks Threats and Solutions. Proceedings of the 2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT), Amman, Jordan.
3. Privacy-assured outsourcing of image reconstruction service in cloud;Wang;IEEE Trans. Emerg. Top. Comput.,2013
4. CSED: Client-side encrypted deduplication scheme based on proofs of ownership for cloud storage;Li;J. Inf. Secur. Appl.,2019
5. Integrated chaotic systems for image encryption;Lan;Signal Process.,2018