PwLMμ-TPE: A Visual-Usability and Privacy-Enhanced Thumbnail Preserving Encryption Scheme of Cloud Computing for Consumers

The speedy proliferation of cloud storage choices has prompted consumers to choose the cloud as a preferred platform for storing their collections of images. However, this trend also invokes fundamental security issues regarding image privacy and data breach scenarios. To address these issues, consu...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on consumer electronics Vol. 71; no. 1; pp. 9 - 17
Main Authors Chowdhury, Keya, Deb, Subhrajyoti, Kar, Nirmalya, Lal Sarkar, Joy, Hussein Alkhayyat, Ahmed, Nkenyereye, Lewis
Format Journal Article
LanguageEnglish
Published New York IEEE 01.02.2025
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text
ISSN0098-3063
1558-4127
DOI10.1109/TCE.2024.3412100

Cover

More Information
Summary:The speedy proliferation of cloud storage choices has prompted consumers to choose the cloud as a preferred platform for storing their collections of images. However, this trend also invokes fundamental security issues regarding image privacy and data breach scenarios. To address these issues, consumers have recently used miscellaneous traditional image encryption techniques, primarily concentrated on preventing unauthorized access to cloud-stored images to defend the privacy of the image data. Moreover, these methods prioritize privacy preservation, they often neglect the importance of maintaining the usability of the encrypted images; hence, a Thumbnail-preserving encryption (TPE) was newly raised to preserve the thumbnail unchanged post-encryption, thereby improving the prevailing usability of the stored image. Hence, legitimate consumers can conveniently preview and control the cipher image without decryption. <inline-formula> <tex-math notation="LaTeX">PwLM_{\mu }-TPE </tex-math></inline-formula> scheme greatly decreases encryption durations by approximately 17 times compared to existing methods, achieving an expansion ratio of around 2.1 for encrypted images and 1 for decrypted images, while showing SSIM and PSNR values close to 0.9 and infinity, respectively, along with an NPCR value of nearly 99%. The scheme is favourably adequate to resist cryptographic attacks and ensures usability and privacy, making it particularly suitable for cloud-based applications.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:0098-3063
1558-4127
DOI:10.1109/TCE.2024.3412100