Privacy protected image denoising with secret shares

Sayed M. Saghaiannejadesfahani, Ying Luo, Sen Ching S. Cheung

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

30 Scopus citations


The proliferation of digital cameras, wireless networks and distributed computing make sharing of visual data easier than ever. Such casual exchange of data, however, has increasingly raised questions on how sensitive visual information can be protected. Encrypted-domain signal processing techniques based on homomorphic encryption and garbled circuits are increasingly applied for such applications. Their high computation and communication complexity, however, are not suitable for pixel-level processing. In this paper, we propose an alternative approach of using information-theoretically secure protocols over multiple non-colluding semi-honest computing agents. The proposed protocols are based on classical Shamir's secret sharing scheme which supports multiplication and addition in the random-share domain. We extend the sharing scheme to handle other fundamental signal processing operations and use them to develop a novel privacy-protected wavelet denoising scheme over three computing agents. Our experimental results demonstrate the viability of using information-theoretic secure protocols to safeguard privacy in distributed pixel-level processing.

Original languageEnglish
Title of host publication2012 IEEE International Conference on Image Processing, ICIP 2012 - Proceedings
Number of pages4
StatePublished - 2012
Event2012 19th IEEE International Conference on Image Processing, ICIP 2012 - Lake Buena Vista, FL, United States
Duration: Sep 30 2012Oct 3 2012

Publication series

NameProceedings - International Conference on Image Processing, ICIP
ISSN (Print)1522-4880


Conference2012 19th IEEE International Conference on Image Processing, ICIP 2012
Country/TerritoryUnited States
CityLake Buena Vista, FL


  • secret sharing
  • wavelet denoising

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Information Systems


Dive into the research topics of 'Privacy protected image denoising with secret shares'. Together they form a unique fingerprint.

Cite this