Extracting image features with data integrity and confidentiality by verifiable outsourcing computation in cloud computing

Sivakumar Kumaresan, Golden Julie Eanoch

Article ID: 8284
Vol 39, Issue 4, 2025
DOI: https://doi.org/10.54517/jbrha8284

Download PDF

Abstract

Due to rapid enhancement of digital communication in cloud paradigm, easier transmission & storage of the multimedia information in several platforms becomes challenging. The security of image information is vital since the images are considered as a major component of communication in cloud environment. The secret information is shared in the form of secured image which needs to be retrieved and send to user without losing the integrity and confidentiality of data. For this purpose, the proposed model is designed which employs feature extraction categorization process and transmitting extracted information securely via cryptographic process. Initially the input images are retrieved and parameter initialization is carried by bilinear matrix. An optimal feature extraction is carried using Rotational invariant Local Binary Pattern (RI-LBP) along with Enriched Shark smell optimization process for extracting features of secret information. E-IBE (Enhanced-Identity based encryption) is employed for private key generation followed by cryptographic process via Ensemble Improved Homomorphic Pailler and Quantized ElGammal Elliptic curve Cryptography (ECC) scheme. The decrypted outcome attained is then digitally verified by employing SHA3 verification model. Thus, retrieved data is provided to the user after validation in a secured manner. The simulation results are then observed by analyzing the proposed scheme performance on CIFAR-10 dataset &MNIST dataset attained outcomes are compared with traditional schemes to validate the enhancement of proposed model over other models. the performance is carried for various metrics like extraction accuracy, recall, precision F1-score, precision-recall curve, RoC curve, execution time, runtime & storage space of entire system.


Keywords

cloud paradigm; image security; secured transmission of secret image; image feature extraction; private key generation; cryptographic scheme; SHA3 digital verification


References

1.         Deepa V. Dynamic key generation for securing digital images with chaotic encryption. educational administration: Theory and Practice. 2024; 30(6): 2949–2953. doi: 10.53555/kuey.v30i6.5933

2.         Goplakrishnan S, Hussain MZ, Mohd Ashraf G. Senthilkumar, Mantripragada Yaswanth Bhanu Murthy, Sensitive product feature integrity and confidentiality using blockchain-based internet of things (IoT) architecture, Measurement: Sensors. 2023; 27(2023): 100798. doi: 10.1016/j.measen.2023.100798

3.          Hua Z, Liu X, Zheng Y, et al. Reversible data hiding over encrypted images via preprocessing-free matrix secret sharing. IEEE Trans. Circuits Syst. Video Technol. IEEE; 2023. doi: 10.1109/TCSVT.2023.3298803

4.         Li X, Jiang Y, Chen M, et al. Research on iris image encryption based on deep learning. EURASIP J. Image Video Process. 2018; 2018: 126. doi: 10.1186/s13640-018-0358-7

5.         Man Z, Li J, Di X, et al. Double image encryption algorithm based on neural network and chaos. Chaos Solitons Fractals. 2021; 152: 111318. doi: /10.1016/j.chaos.2021.111318

6.         Xu Z, Ahmad, Suzana, et al. Image feature extraction algorithm based on visual information. Journal of Intelligent Systems. 2023; 32, 1(2023): 20230111. doi: 10.1515/jisys-2023-0111

7.         Kumar S. Aanjan, Monoj Kumar Muchahari S, et al. Application of hybrid capsule network model for malaria parasite detection on microscopic blood smear images. Multimedia Tools and Applications. 2024; 127(2024). doi: 10.1007/s11042-024-19062-6

8.         Wen H, Lin Y. Cryptanalysis of an image encryption algorithm using quantum chaotic map and DNA coding. Expert Systems with Applications. 2024; 237: 121514. doi: 10.1016/j.eswa.2023.121514

9.         Wen H, Lin Y, Yang L, et al. Cryptanalysis of an image encryption scheme using variant Hill cipher and chaos. Xpert Systems with Applications. 2024. doi: 10.1016/j.eswa.2024.123748

10.      Chai X, Fu J, Gan Z, et al. Exploiting Semi-Tensor Product Compressed Sensing and Hybrid Cloud for Secure Medical Image Transmission. IEEE Internet of Things Journal. 2023; 10(8): 73807392. doi: 10.1109/jiot.2022.3228781

11.      Ye G, Liu M, Yap WS, et al. Reversible image hiding algorithm based on compressive sensing and deep learning. Nonlinear Dynamics. 2023; 111: 13535–13560.

12.      Aanjankumar S, Poonkuntran, S. Peer-2-Peer Botnet manage SDT security algorithm. In: 2016 IEEE international conference on computational intelligence and computing research (ICCIC). IEEE; 2016. pp. 15.

13.      Chen Z, Ye G. An asymmetric image encryption scheme based on hash sha-3, rsa and compressive sensing. Optik. 2022; 267: 169676. doi: 10.1016/j.ijleo.2022.169676

14.      Liang J. A secure and effective image encryption scheme by combining parallel compressed sensing with secret sharing scheme. International Journal of Information Security. 2023; 75: 103487. doi: 10.1016/j.jisa.2023.103487

15.      Yang C, Song, Bowen, et al. Efficient data integrity auditing supporting provable data update for secure cloud storage. Wireless Communications and Mobile Computing. 2022; 112. doi: 10.1155/2022/5721917

16.      Chen K, Gu Y, Sharma S. DisguisedNets: Secure image outsourcing for confidential model training in clouds. ACM Transactions on Internet Technology. 2023; 23: 3.doi: 10.1145/3609506

17.      Hambouz A, Shaheen Y, Manna A, et al. Achieving Data Integrity and Confidentiality Using Image Steganography and Hashing Techniques. In: Proceeding of 2019 2nd International Conference on new Trends in Computing Sciences (ICTCS). 2019; 1-6. doi: 10.1109/ictcs.2019.8923060

18.      Goswami, Paromita, Faujdar, et al. Investigation on storage level data integrity strategies in cloud computing: classification, security obstructions, challenges and vulnerability. Journal of Cloud Computing. 2024; 13. doi: 10.1186/s13677-024-00605-z

19.      Li M, Jiang Y, Zhang Y, et al. Medical image analysis using deep learning algorithms. Front. Public Health. 2023.doi: 10.3389/fpubh.2023.1273253

20.      Wen H, Yang L, Bai C, et al. Exploiting high-quality reconstruction image encryption strategy by optimized orthogonal compressive sensing. Scientific Reports. 2024; 8805(2024). doi: 10.1038/s41598-024-59277-z

21.      Alsafyani M, Alhomayani F, Alsuwat H, et al. Face Image Encryption Based on Feature with Optimization Using Secure Crypto General Adversarial Neural Network and Optical Chaotic Map. Sensors. 2023; 23: 1415. doi: 10.3390/s23031415

22.      Qin J, Li H, Xiang X, et al. An encrypted image retrieval method based on Harris corner optimization and LSH in cloud computing. IEEE Access. 2019; 7: 24626-24633. doi: 10.1109/access.2019.2894673

23.      Salim J, Abeer, Azeez, et al. An image feature extraction to generate a key for encryption in cyber security medical environments. International Journal of Online and Biomedical Engineering (iJOE). 2023; 19: 93-106.doi: 10.3991/ijoe.v19i01.36901

24.      Selvaraj J, Lai WC, Kavin BP, et al. Cryptographic encryption and optimization for internet of things based medical image security. Electronics. 2023; 12: 1636. doi: 10.3390/ electronics12071636

25.      Jia H, Cai D, Yang J, et al. Efficient and privacy-preserving image classification using homomorphic encryption and chunk-based convolutional neural network. Journal of Cloud Computing. 2023; 12, 175(2023). doi: 10.1186/s13677-023-00537-0

26.      Alsaedi EM, Kadhim FA. Retrieving encrypted images using convolution neural network and fully homomorphic encryption. Baghdad science journal. 2023; 20(1): 0206-0206.doi: 10.21123/bsj.2022.6550

27.      Kumar S, Aanjan P, Karthikeyan S, et al. Protecting medical images using deep learning fuzzy extractor model. In: Deep Learning for Smart Healthcare. Auerbach Publications; 2024. pp. 183-203.doi: 10.1201/9781003469605

28.      Indira N, Rukmanidevi S, Kalpana AV. Light weight proactive padding based crypto security system in distributed cloud environment. International Journal of Computational Intelligence Systems. 2020; 13, 1(2020): 36-43.doi: 10.2991/ijcis.d.200110.001

29.      Pang H, Wang B. Privacy-preserving association rule mining using homomorphic encryption in a multikey environment. IEEE Systems Journal. 2020; 15, 2(2020): 3131-3141.doi: 10.1109/JSYST.2020.3001316

30.      Aanjankumar S, Poonkuntran S. An efficient soft computing approach for securing information over GAMEOVER Zeus Botnets with modified CPA algorithm. Soft Computing. 2020; 24, 21(2020): 16499-16507.doi: 10.1007/s00500-020-04956-y

31.      Coron JS, Mandal A, Naccache D, et al. Fully homomorphic encryption over the integers with shorter public keys. In: Annual Cryptology Conference. Berlin, Heidelberg: Springer Berlin Heidelberg; 2011. pp. 487-504.doi: 10.1007/978-3-642-22792-9_28

32.      Dasgupta, Smaranika, Pal SK. Design of a polynomial ring based symmetric homomorphic encryption scheme. Perspectives in Science. 2016; 8(2016): 692-695.doi: 10.1016/j.pisc.2016.06.061

33.      Boer D, Kramer S. Secure sum outperforms homomorphic encryption in (current) collaborative deep learning. arXiv; 2006.doi: 10.48550/arXiv.2006.02894

34.      Medileh SA, Laouid M, Hammoudeh M, et al. A multi-key with partially homomorphic encryption scheme for low-end devices ensuring data integrity. Information. 2023; 14: 263.doi: 10.3390/info14050263

Supporting Agencies

This Study has not received any financial support or funding from external sources.



Copyright (c) 2025 Sivakumar Kumaresan, Golden Julie Eanoch

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.


This site is licensed under a Creative Commons Attribution 4.0 International License (CC BY 4.0).