
Asia Pacific Academy of Science Pte. Ltd. (APACSCI) specializes in international journal publishing. APACSCI adopts the open access publishing model and provides an important communication bridge for academic groups whose interest fields include engineering, technology, medicine, computer, mathematics, agriculture and forestry, and environment.

Extracting image features with data integrity and confidentiality by verifiable outsourcing computation in cloud computing
Vol 39, Issue 4, 2025
Download PDF
Abstract
Due to rapid enhancement of digital communication in cloud paradigm, easier transmission & storage of the multimedia information in several platforms becomes challenging. The security of image information is vital since the images are considered as a major component of communication in cloud environment. The secret information is shared in the form of secured image which needs to be retrieved and send to user without losing the integrity and confidentiality of data. For this purpose, the proposed model is designed which employs feature extraction categorization process and transmitting extracted information securely via cryptographic process. Initially the input images are retrieved and parameter initialization is carried by bilinear matrix. An optimal feature extraction is carried using Rotational invariant Local Binary Pattern (RI-LBP) along with Enriched Shark smell optimization process for extracting features of secret information. E-IBE (Enhanced-Identity based encryption) is employed for private key generation followed by cryptographic process via Ensemble Improved Homomorphic Pailler and Quantized ElGammal Elliptic curve Cryptography (ECC) scheme. The decrypted outcome attained is then digitally verified by employing SHA3 verification model. Thus, retrieved data is provided to the user after validation in a secured manner. The simulation results are then observed by analyzing the proposed scheme performance on CIFAR-10 dataset &MNIST dataset attained outcomes are compared with traditional schemes to validate the enhancement of proposed model over other models. the performance is carried for various metrics like extraction accuracy, recall, precision F1-score, precision-recall curve, RoC curve, execution time, runtime & storage space of entire system.
Keywords
References
1. Deepa V. Dynamic key generation for securing digital images with chaotic encryption. educational administration: Theory and Practice. 2024; 30(6): 2949–2953. doi: 10.53555/kuey.v30i6.5933
2. Goplakrishnan S, Hussain MZ, Mohd Ashraf G. Senthilkumar, Mantripragada Yaswanth Bhanu Murthy, Sensitive product feature integrity and confidentiality using blockchain-based internet of things (IoT) architecture, Measurement: Sensors. 2023; 27(2023): 100798. doi: 10.1016/j.measen.2023.100798
3. Hua Z, Liu X, Zheng Y, et al. Reversible data hiding over encrypted images via preprocessing-free matrix secret sharing. IEEE Trans. Circuits Syst. Video Technol. IEEE; 2023. doi: 10.1109/TCSVT.2023.3298803
4. Li X, Jiang Y, Chen M, et al. Research on iris image encryption based on deep learning. EURASIP J. Image Video Process. 2018; 2018: 126. doi: 10.1186/s13640-018-0358-7
5. Man Z, Li J, Di X, et al. Double image encryption algorithm based on neural network and chaos. Chaos Solitons Fractals. 2021; 152: 111318. doi: /10.1016/j.chaos.2021.111318
6. Xu Z, Ahmad, Suzana, et al. Image feature extraction algorithm based on visual information. Journal of Intelligent Systems. 2023; 32, 1(2023): 20230111. doi: 10.1515/jisys-2023-0111
7. Kumar S. Aanjan, Monoj Kumar Muchahari S, et al. Application of hybrid capsule network model for malaria parasite detection on microscopic blood smear images. Multimedia Tools and Applications. 2024; 1–27(2024). doi: 10.1007/s11042-024-19062-6
8. Wen H, Lin Y. Cryptanalysis of an image encryption algorithm using quantum chaotic map and DNA coding. Expert Systems with Applications. 2024; 237: 121514. doi: 10.1016/j.eswa.2023.121514
9. Wen H, Lin Y, Yang L, et al. Cryptanalysis of an image encryption scheme using variant Hill cipher and chaos. Xpert Systems with Applications. 2024. doi: 10.1016/j.eswa.2024.123748
10. Chai X, Fu J, Gan Z, et al. Exploiting Semi-Tensor Product Compressed Sensing and Hybrid Cloud for Secure Medical Image Transmission. IEEE Internet of Things Journal. 2023; 10(8): 7380–7392. doi: 10.1109/jiot.2022.3228781
11. Ye G, Liu M, Yap WS, et al. Reversible image hiding algorithm based on compressive sensing and deep learning. Nonlinear Dynamics. 2023; 111: 13535–13560.
12. Aanjankumar S, Poonkuntran, S. Peer-2-Peer Botnet manage SDT security algorithm. In: 2016 IEEE international conference on computational intelligence and computing research (ICCIC). IEEE; 2016. pp. 1–5.
13. Chen Z, Ye G. An asymmetric image encryption scheme based on hash sha-3, rsa and compressive sensing. Optik. 2022; 267: 169676. doi: 10.1016/j.ijleo.2022.169676
14. Liang J. A secure and effective image encryption scheme by combining parallel compressed sensing with secret sharing scheme. International Journal of Information Security. 2023; 75: 103487. doi: 10.1016/j.jisa.2023.103487
15. Yang C, Song, Bowen, et al. Efficient data integrity auditing supporting provable data update for secure cloud storage. Wireless Communications and Mobile Computing. 2022; 1–12. doi: 10.1155/2022/5721917
16. Chen K, Gu Y, Sharma S. DisguisedNets: Secure image outsourcing for confidential model training in clouds. ACM Transactions on Internet Technology. 2023; 23: 3.doi: 10.1145/3609506
17. Hambouz A, Shaheen Y, Manna A, et al. Achieving Data Integrity and Confidentiality Using Image Steganography and Hashing Techniques. In: Proceeding of 2019 2nd International Conference on new Trends in Computing Sciences (ICTCS). 2019; 1-6. doi: 10.1109/ictcs.2019.8923060
18. Goswami, Paromita, Faujdar, et al. Investigation on storage level data integrity strategies in cloud computing: classification, security obstructions, challenges and vulnerability. Journal of Cloud Computing. 2024; 13. doi: 10.1186/s13677-024-00605-z
19. Li M, Jiang Y, Zhang Y, et al. Medical image analysis using deep learning algorithms. Front. Public Health. 2023.doi: 10.3389/fpubh.2023.1273253
20. Wen H, Yang L, Bai C, et al. Exploiting high-quality reconstruction image encryption strategy by optimized orthogonal compressive sensing. Scientific Reports. 2024; 8805(2024). doi: 10.1038/s41598-024-59277-z
21. Alsafyani M, Alhomayani F, Alsuwat H, et al. Face Image Encryption Based on Feature with Optimization Using Secure Crypto General Adversarial Neural Network and Optical Chaotic Map. Sensors. 2023; 23: 1415. doi: 10.3390/s23031415
22. Qin J, Li H, Xiang X, et al. An encrypted image retrieval method based on Harris corner optimization and LSH in cloud computing. IEEE Access. 2019; 7: 24626-24633. doi: 10.1109/access.2019.2894673
23. Salim J, Abeer, Azeez, et al. An image feature extraction to generate a key for encryption in cyber security medical environments. International Journal of Online and Biomedical Engineering (iJOE). 2023; 19: 93-106.doi: 10.3991/ijoe.v19i01.36901
24. Selvaraj J, Lai WC, Kavin BP, et al. Cryptographic encryption and optimization for internet of things based medical image security. Electronics. 2023; 12: 1636. doi: 10.3390/ electronics12071636
25. Jia H, Cai D, Yang J, et al. Efficient and privacy-preserving image classification using homomorphic encryption and chunk-based convolutional neural network. Journal of Cloud Computing. 2023; 12, 175(2023). doi: 10.1186/s13677-023-00537-0
26. Alsaedi EM, Kadhim FA. Retrieving encrypted images using convolution neural network and fully homomorphic encryption. Baghdad science journal. 2023; 20(1): 0206-0206.doi: 10.21123/bsj.2022.6550
27. Kumar S, Aanjan P, Karthikeyan S, et al. Protecting medical images using deep learning fuzzy extractor model. In: Deep Learning for Smart Healthcare. Auerbach Publications; 2024. pp. 183-203.doi: 10.1201/9781003469605
28. Indira N, Rukmanidevi S, Kalpana AV. Light weight proactive padding based crypto security system in distributed cloud environment. International Journal of Computational Intelligence Systems. 2020; 13, 1(2020): 36-43.doi: 10.2991/ijcis.d.200110.001
29. Pang H, Wang B. Privacy-preserving association rule mining using homomorphic encryption in a multikey environment. IEEE Systems Journal. 2020; 15, 2(2020): 3131-3141.doi: 10.1109/JSYST.2020.3001316
30. Aanjankumar S, Poonkuntran S. An efficient soft computing approach for securing information over GAMEOVER Zeus Botnets with modified CPA algorithm. Soft Computing. 2020; 24, 21(2020): 16499-16507.doi: 10.1007/s00500-020-04956-y
31. Coron JS, Mandal A, Naccache D, et al. Fully homomorphic encryption over the integers with shorter public keys. In: Annual Cryptology Conference. Berlin, Heidelberg: Springer Berlin Heidelberg; 2011. pp. 487-504.doi: 10.1007/978-3-642-22792-9_28
32. Dasgupta, Smaranika, Pal SK. Design of a polynomial ring based symmetric homomorphic encryption scheme. Perspectives in Science. 2016; 8(2016): 692-695.doi: 10.1016/j.pisc.2016.06.061
33. Boer D, Kramer S. Secure sum outperforms homomorphic encryption in (current) collaborative deep learning. arXiv; 2006.doi: 10.48550/arXiv.2006.02894
34. Medileh SA, Laouid M, Hammoudeh M, et al. A multi-key with partially homomorphic encryption scheme for low-end devices ensuring data integrity. Information. 2023; 14: 263.doi: 10.3390/info14050263
Supporting Agencies
This Study has not received any financial support or funding from external sources.
Copyright (c) 2025 Sivakumar Kumaresan, Golden Julie Eanoch

This work is licensed under a Creative Commons Attribution 4.0 International License.

This site is licensed under a Creative Commons Attribution 4.0 International License (CC BY 4.0).

Medical Genetics, University of Torino Medical School, Italy

Department of Biomedical, Surgical and Dental Sciences, University of Milan, Italy
