They have to give you the image for you to transform it. You can promise that you delete it immediately afterwards, but your users will have to take your word for that.
File hosting services can maintain confidentiality by hosting only encrypted files that the service operator cannot open themselves. But you cannot manipulate an encrypted image without decrypting it first.
You can use HTTPS to make sure there are no eavesdroppers, and also make sure that you send the image to no one except the owner of the original (as far as you can tell from the login session). You should delete any files as soon as you can.
As you say, the only way to ensure that no one else gets to see the image is to run the application on the user's end.