Abstract

To solve the problem of privacy leakage and response latency in outsourced image watermark embedding in cloud computing, an efficient and privacy-preserving watermark embedding method for outsourced digital images was proposed by introducing edge computing technology. We had proposed a perturbing encryption method with homomorphism to ensure the information security and the correctness of discrete wavelet transformation in the encrypted domain. In addition, the framework was designed to guarantee the safety of singular value decomposition that edge server could not recover the original image matrix. The experimental results show that the proposed method is superior to similar secure watermarking schemes in terms of encryption/decryption time and ciphertext expansion. The proposed method enables the watermarking operation to be performed in an unsafe outsourced environment while achieving a watermarking effect similar to the plaintext equivalent.

Highlights

  • T HE development of artificial intelligence and big data has prompted an explosion of information

  • We introduced edge computing technology to propose a lightweight privacypreserving digital watermarking method for outsourced host images

  • We briefly introduce the calculation process for Haar discrete wavelet transform (HDWT) and inverse-HDWT(IHDWT)

Read more

Summary

INTRODUCTION

T HE development of artificial intelligence and big data has prompted an explosion of information. Zheng et al [31] combined the Paillier cryptosystem [32] to propose a DWT transformation in the encrypted domain Their data reduction method presented some consistent pixel ciphertext that resulted in a risk of information leakage. This implies that data processing outsourced to the cloud may cause a response delay [37] To solve this problem, we introduced edge computing technology to propose a lightweight privacypreserving digital watermarking method for outsourced host images. TTP distributes key parameters, CO encrypts and uploads data to the edge server, the edge computing server performs secure HDWT and SVD, and AU decrypts the ciphertext to obtain the plaintext of the image with the watermark.

SECURE WATERMARK EMBEDDING
CORRECTNESS ANALYSIS
SECURITY ANALYSIS
EXPERIMENTAL RESULTS AND DISCUSSIONS
CONTRAST EXPERIMENT OF ENCRYPTION PERFORMANCE
LOSS OF WATERMARKED IMAGE IN PLAINTEXT AND ENCRYPTION DOMAIN
IMAGE ATTACK EXPERIMENT
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.