Privacy-Preserved Image Protection Supporting Different Access Rights

The boom in cloud computing and social networking has led to a large number of online users in the networks. It is necessary to use appropriate privacy protection mechanisms to prevent personal privacy leakage. In general, image privacy protection techniques proceed with the whole image. However, th...

Full description

Bibliographic Details
Main Authors: Ya-Fen Chang, Wei-Liang Tai, Yu-Tzu Huang
Format: Article
Language:English
Published: MDPI AG 2022-12-01
Series:Applied Sciences
Subjects:
Online Access:https://www.mdpi.com/2076-3417/12/23/12335
_version_ 1827643349617606656
author Ya-Fen Chang
Wei-Liang Tai
Yu-Tzu Huang
author_facet Ya-Fen Chang
Wei-Liang Tai
Yu-Tzu Huang
author_sort Ya-Fen Chang
collection DOAJ
description The boom in cloud computing and social networking has led to a large number of online users in the networks. It is necessary to use appropriate privacy protection mechanisms to prevent personal privacy leakage. In general, image privacy protection techniques proceed with the whole image. However, the image may contain multiple users’ information, and different people’s data may require different privacy protection. In addition, cloud servers are semi-trusted instead of trusted service providers due to unknown security vulnerabilities and the possibility of grabbing sensitive data from the cloud server. In order to provide image protection with different privacy-preserved access rights and to prevent the cloud server from retrieving sensitive information from the image, we propose a privacy-preserved scheme that supports different privacy-preserved access rights in a single image based on the difficulty of solving the factorization problem and the discrete logarithm problem. The cloud server performed the image management method without knowing the privacy information contained in the protected images. By working out the proposed scheme in detail, we experimentally validate the scheme and discuss various options of access rights in practice.
first_indexed 2024-03-09T17:53:09Z
format Article
id doaj.art-4f27c738efd34cd49772aa46e7a968b7
institution Directory Open Access Journal
issn 2076-3417
language English
last_indexed 2024-03-09T17:53:09Z
publishDate 2022-12-01
publisher MDPI AG
record_format Article
series Applied Sciences
spelling doaj.art-4f27c738efd34cd49772aa46e7a968b72023-11-24T10:34:50ZengMDPI AGApplied Sciences2076-34172022-12-0112231233510.3390/app122312335Privacy-Preserved Image Protection Supporting Different Access RightsYa-Fen Chang0Wei-Liang Tai1Yu-Tzu Huang2Department of Computer Science and Information Engineering, National Taichung University of Science and Technology, Taichung 404336, TaiwanBachelor Degree Program of Artificial Intelligence, National Taichung University of Science and Technology, Taichung 404336, TaiwanDepartment of Computer Science and Information Engineering, National Taichung University of Science and Technology, Taichung 404336, TaiwanThe boom in cloud computing and social networking has led to a large number of online users in the networks. It is necessary to use appropriate privacy protection mechanisms to prevent personal privacy leakage. In general, image privacy protection techniques proceed with the whole image. However, the image may contain multiple users’ information, and different people’s data may require different privacy protection. In addition, cloud servers are semi-trusted instead of trusted service providers due to unknown security vulnerabilities and the possibility of grabbing sensitive data from the cloud server. In order to provide image protection with different privacy-preserved access rights and to prevent the cloud server from retrieving sensitive information from the image, we propose a privacy-preserved scheme that supports different privacy-preserved access rights in a single image based on the difficulty of solving the factorization problem and the discrete logarithm problem. The cloud server performed the image management method without knowing the privacy information contained in the protected images. By working out the proposed scheme in detail, we experimentally validate the scheme and discuss various options of access rights in practice.https://www.mdpi.com/2076-3417/12/23/12335privacy protectioncloud computingfactoring problemdiscrete logarithm problem
spellingShingle Ya-Fen Chang
Wei-Liang Tai
Yu-Tzu Huang
Privacy-Preserved Image Protection Supporting Different Access Rights
Applied Sciences
privacy protection
cloud computing
factoring problem
discrete logarithm problem
title Privacy-Preserved Image Protection Supporting Different Access Rights
title_full Privacy-Preserved Image Protection Supporting Different Access Rights
title_fullStr Privacy-Preserved Image Protection Supporting Different Access Rights
title_full_unstemmed Privacy-Preserved Image Protection Supporting Different Access Rights
title_short Privacy-Preserved Image Protection Supporting Different Access Rights
title_sort privacy preserved image protection supporting different access rights
topic privacy protection
cloud computing
factoring problem
discrete logarithm problem
url https://www.mdpi.com/2076-3417/12/23/12335
work_keys_str_mv AT yafenchang privacypreservedimageprotectionsupportingdifferentaccessrights
AT weiliangtai privacypreservedimageprotectionsupportingdifferentaccessrights
AT yutzuhuang privacypreservedimageprotectionsupportingdifferentaccessrights