{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T08:52:19Z","timestamp":1767084739912,"version":"3.41.0"},"reference-count":29,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2017,6,28]],"date-time":"2017-06-28T00:00:00Z","timestamp":1498608000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Multimedia Comput. Commun. Appl."],"published-print":{"date-parts":[[2017,8,31]]},"abstract":"<jats:p>The benefits of high-end computation infrastructure facilities provided by cloud-based multimedia systems are attracting people all around the globe. However, such cloud-based systems possess security issues as third party servers become involved in them. Rendering data in an unreadable form so that no information is revealed to the cloud data centers will serve as the best solution to these security issues. One such image encryption scheme based on a Permutation Ordered Binary Number System has been proposed in this work. It distributes the image information in totally random shares, which can be stored at the cloud data centers. Further, the proposed scheme authenticates the shares at the pixel level. If any tampering is done at the cloud servers, the scheme can accurately identify the altered pixels via authentication bits and localizes the tampered area. The tampered portion is also reflected back in the reconstructed image that is obtained at the authentic user end. The experimental results validate the efficacy of the proposed scheme against various kinds of possible attacks, tested with a variety of images. The tamper detection accuracy has been computed on a pixel basis and found to be satisfactorily high for most of the tampering scenarios.<\/jats:p>","DOI":"10.1145\/3077140","type":"journal-article","created":{"date-parts":[[2017,6,30]],"date-time":"2017-06-30T12:36:19Z","timestamp":1498826179000},"page":"1-23","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":29,"title":["Secure Cloud-Based Image Tampering Detection and Localization Using POB Number System"],"prefix":"10.1145","volume":"13","author":[{"given":"Priyanka","family":"Singh","sequence":"first","affiliation":[{"name":"State University of New York at Albany, Albany, NY"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Balasubramanian","family":"Raman","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology, Roorkee, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nishant","family":"Agarwal","sequence":"additional","affiliation":[{"name":"National Institute of Technology, Kurukshetra, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Pradeep K.","family":"Atrey","sequence":"additional","affiliation":[{"name":"State University of New York at Albany, Albany, NY"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2017,6,28]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.01.025"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056651"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2542205.2542207"},{"key":"e_1_2_1_4_1","unstructured":"V. P. Binu and A. Sreekumar. 2014. Generalized secret sharing using permutation ordered binary system. CoRR abs\/1407.3609 (2014). http:\/\/arxiv.org\/abs\/1407.3609.  V. P. Binu and A. Sreekumar. 2014. Generalized secret sharing using permutation ordered binary system. CoRR abs\/1407.3609 (2014). http:\/\/arxiv.org\/abs\/1407.3609."},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MARK.1979.8817296"},{"volume-title":"Foundations and properties of shamirs secret sharing scheme research seminar in cryptography","author":"Bogdanov Dan","key":"e_1_2_1_6_1","unstructured":"Dan Bogdanov . 2007. Foundations and properties of shamirs secret sharing scheme research seminar in cryptography . University of Tartu , Institute of Computer Science. Dan Bogdanov. 2007. Foundations and properties of shamirs secret sharing scheme research seminar in cryptography. University of Tartu, Institute of Computer Science."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568224"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICEMIS.2016.7745295"},{"key":"e_1_2_1_9_1","first-page":"2049","article-title":"A novel secret sharing scheme using POB number system and CRT","volume":"11","author":"Deepika MP","year":"2016","unstructured":"MP Deepika and A Sreekumar . 2016 . A novel secret sharing scheme using POB number system and CRT . Int. J. Appl. Eng. Res. 11 , 3 (2016), 2049 -- 2054 . MP Deepika and A Sreekumar. 2016. A novel secret sharing scheme using POB number system and CRT. Int. J. Appl. Eng. Res. 11, 3 (2016), 2049--2054.","journal-title":"Int. J. Appl. Eng. Res."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1596990.1596992"},{"key":"e_1_2_1_11_1","volume-title":"Symposium on Content Security and Data Hiding in Digital Media","author":"Fridrich Jiri","year":"1999","unstructured":"Jiri Fridrich and Miroslav Goljan . 1999 . Protection of digital images using self embedding . In Symposium on Content Security and Data Hiding in Digital Media . Newark, NJ. Jiri Fridrich and Miroslav Goljan. 1999. Protection of digital images using self embedding. In Symposium on Content Security and Data Hiding in Digital Media. Newark, NJ."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1117\/1.1459449"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1671954.1671960"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2656205"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2000486.2000489"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756088.1756122"},{"key":"e_1_2_1_17_1","volume-title":"Wei Tsang Ooi, and Pradeep K. Atrey","author":"Mohanty Manoranjan","year":"2013","unstructured":"Manoranjan Mohanty , Wei Tsang Ooi, and Pradeep K. Atrey . 2013 . Scale me, crop me, know me not: Supporting scaling and cropping in secret image sharing. In ICME. IEEE Computer Society , 1--6. http:\/\/dblp.uni-trier.de\/db\/conf\/icmcs\/icme2013.html#MohantyOA13. Manoranjan Mohanty, Wei Tsang Ooi, and Pradeep K. Atrey. 2013. Scale me, crop me, know me not: Supporting scaling and cropping in secret image sharing. In ICME. IEEE Computer Society, 1--6. http:\/\/dblp.uni-trier.de\/db\/conf\/icmcs\/icme2013.html#MohantyOA13."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-2567-8"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487268.2487272"},{"volume-title":"Proceedings of the 33rd International Convention. IEEExplore, Opatija. 344--349","author":"Kre\u0161imir","key":"e_1_2_1_20_1","unstructured":"Kre\u0161imir Popovi\u0107 and \u017deljko Hocenski. 2010. Cloud computing security issues and challenges . In Proceedings of the 33rd International Convention. IEEExplore, Opatija. 344--349 . Kre\u0161imir Popovi\u0107 and \u017deljko Hocenski. 2010. Cloud computing security issues and challenges. In Proceedings of the 33rd International Convention. IEEExplore, Opatija. 344--349."},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.aeue.2011.01.016"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"e_1_2_1_24_1","volume-title":"Bovik","author":"Sheikh Hamid R.","year":"2005","unstructured":"Hamid R. Sheikh , Zhou Wang , Lawrence Cormack , and Alan C . Bovik . 2005 . LIVE image quality assessment database release 2 (2005). (2005). Hamid R. Sheikh, Zhou Wang, Lawrence Cormack, and Alan C. Bovik. 2005. LIVE image quality assessment database release 2 (2005). (2005)."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1947940.1947987"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-2736-9"},{"key":"e_1_2_1_27_1","article-title":"Cloud computing security issues and challenges","volume":"3","author":"So Kuyoro","year":"2011","unstructured":"Kuyoro So . 2011 . Cloud computing security issues and challenges . Int. J. Comput. Networks 3 , 5 (2011). Kuyoro So. 2011. Cloud computing security issues and challenges. Int. J. Comput. Networks 3, 5 (2011).","journal-title":"Int. J. Comput. Networks"},{"key":"e_1_2_1_28_1","first-page":"33","article-title":"An efficient secret sharing scheme for n out of n scheme using POB-number system","volume":"2009","author":"Sreekumar A","year":"2009","unstructured":"A Sreekumar and S Babu Sundar . 2009 . An efficient secret sharing scheme for n out of n scheme using POB-number system . Hack. in 2009 (2009), 33 . A Sreekumar and S Babu Sundar. 2009. An efficient secret sharing scheme for n out of n scheme using POB-number system. Hack. in 2009 (2009), 33.","journal-title":"Hack. in"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2010.12.006"}],"container-title":["ACM Transactions on Multimedia Computing, Communications, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3077140","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3077140","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:11Z","timestamp":1750217411000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3077140"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,28]]},"references-count":29,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,8,31]]}},"alternative-id":["10.1145\/3077140"],"URL":"https:\/\/doi.org\/10.1145\/3077140","relation":{},"ISSN":["1551-6857","1551-6865"],"issn-type":[{"type":"print","value":"1551-6857"},{"type":"electronic","value":"1551-6865"}],"subject":[],"published":{"date-parts":[[2017,6,28]]},"assertion":[{"value":"2016-09-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-03-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-06-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}