Abstract
The development of cloud computing attracts enterprises and individuals to outsource their data, such as images, to the cloud server. However, direct outsourcing causes the extensive concern of privacy leakage, as images often contain rich sensitive information. A straightforward way to protect privacy is to encrypt the images using the standard cryptographic tools before outsourcing. However, in such a way the possible usage of the outsourced images would be strongly limited together with the services provided to users, like the Content-Based Image Retrieval (CBIR). In this article, we propose a secure outsourced CBIR scheme, in which an encryption scheme is designed for the widely used JPEG-format images, and the secure features can be directly extracted from such encrypted images. Specifically, the JPEG images are encrypted by the block permutation, intra-block permutation, polyalphabetic cipher, and stream cipher. Then secure local histograms are extracted from the encrypted DCT blocks and the Bag-Of-Words (BOW) model is further used to organize the encrypted local features to represent the image. The proposed image encryption gets all of the image data protected and the experimental results show that the proposed scheme achieves improved accuracy with a small file size expansion.
- [1] . 2019. A protected cloud computation algorithm using homomorphic encryption for preserving data integrity. In Recent Findings in Intelligent Computing Techniques. Springer, 509–517.Google Scholar
Cross Ref
- [2] . 2015. Content-based image retrieval in homomorphic encryption domain. In 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC). IEEE, 2944–2947.Google Scholar
Cross Ref
- [3] . 2019. Supporting private data on hyperledger fabric with secure multiparty computation. IBM J. Res. Devel. 63, 2/3 (2019), 3–1.Google Scholar
Digital Library
- [4] . 2016. Markov process-based retrieval for encrypted JPEG images. EURASIP J. Inf. Secur. 2016, 1 (2016), 1.Google Scholar
Digital Library
- [5] . 2016. Encrypted JPEG image retrieval using block-wise feature comparison. J. Vis. Commun. Image Repres. 40 (2016), 111–117.Google Scholar
Digital Library
- [6] . 2021. A privacy-preserving image retrieval scheme based secure kNN, DNA coding and deep hashing. Multim. Tools Applic. 80, 15 (2021), 22733–22755.Google Scholar
Digital Library
- [7] . 2008. Near duplicate image detection: Min-hash and TF-IDF weighting. In British Machine Vision Conference, Vol. 810. 812–815.Google Scholar
Cross Ref
- [8] . 2017. Practical privacy-preserving content-based retrieval in cloud image repositories. IEEE Trans. Cloud Comput. 7, 3 (2017), 784–798.Google Scholar
- [9] . 2020. MSPPIR: Multi-source privacy-preserving image retrieval in cloud computing. arXiv preprint arXiv:2007.12416.Google Scholar
- [10] . 2020. Privacy-preserving image search (PPIS): Secure classification and searching using convolutional neural network over large-scale encrypted medical images. Comput. Secur. 99 (2020), 102021.Google Scholar
Cross Ref
- [11] . 2012. Image feature extraction in encrypted domain with privacy-preserving SIFT. IEEE Trans. Image Process. 21, 11 (2012), 4593–4607.Google Scholar
Digital Library
- [12] . 2020. SensIR: Towards privacy-sensitive image retrieval in the cloud. Sig. Process.: Image Commun. 84 (2020), 115837.Google Scholar
Cross Ref
- [13] . 2016. Securing SIFT: Privacy-preserving outsourcing computation of feature extractions over encrypted image data. IEEE Trans. Image Process. 25, 7 (2016), 3411–3425.Google Scholar
Digital Library
- [14] . 2019. Composite description based on salient contours and color information for CBIR tasks. IEEE Trans. Image Process. 28, 6 (2019), 3115–3129.Google Scholar
Digital Library
- [15] . 2020. Privacy-preserving content-based image retrieval using compressible encrypted images. IEEE Access 8 (2020), 200038–200050.Google Scholar
Cross Ref
- [16] . 2021. A content-based image retrieval scheme using compressible encrypted images. In 28th European Signal Processing Conference (EUSIPCO). IEEE, 730–734.Google Scholar
Cross Ref
- [17] . 2021. SEcure similar image matching (SESIM): An improved privacy preserving image retrieval protocol over encrypted cloud database. IEEE Trans. Multim.
DOI: Google ScholarCross Ref
- [18] . 2021. A privacy-preserving scheme for JPEG image retrieval based on deep learning. In Journal of Physics: Conference Series, Vol. 1856. IOP Publishing, 012007.Google Scholar
Cross Ref
- [19] . 2003. Automatic linguistic indexing of pictures by a statistical modeling approach. IEEE Trans. Pattern Anal. Mach. Intell. 25, 9 (2003), 1075–1088.Google Scholar
Digital Library
- [20] . 2020. Traceable and controllable encrypted cloud image search in multi-user settings. IEEE Trans. Cloud Comput.
DOI: Google ScholarCross Ref
- [21] . 2019. Huffman-code based retrieval for encrypted JPEG images. J. Vis. Commun. Image Repres. 61 (2019), 149–156.Google Scholar
Digital Library
- [22] . 2019. Intelligent and secure content-based image retrieval for mobile users. IEEE Access 7 (2019), 119209–119222.Google Scholar
Cross Ref
- [23] . 2009. Enabling search over encrypted multimedia databases. In Media Forensics and Security, Vol. 7254. International Society for Optics and Photonics, 725418.Google Scholar
- [24] . 2009. Secure image retrieval through feature protection. In IEEE International Conference on Acoustics, Speech and Signal Processing. IEEE, 1533–1536.Google Scholar
Digital Library
- [25] . 2020. Content-based multi-source encrypted image retrieval in clouds with privacy preservation. Fut. Gen. Comput. Syst. 109 (2020), 621–632.Google Scholar
Cross Ref
- [26] . 2003. Video Google: A text retrieval approach to object matching in videos. In IEEE International Conference on Computer Vision, vol. 3. IEEE Computer Society, 1470–1470.Google Scholar
- [27] . 2001. SIMPLIcity: Semantics-sensitive integrated matching for picture libraries. IEEE Trans. Pattern Anal. Mach. Intell. 23, 9 (2001), 947–963.Google Scholar
Digital Library
- [28] . 2021. A privacy-preserving and traitor tracking content-based image retrieval scheme in cloud computing. Multim. Syst. 27 (2021), 1–13.Google Scholar
- [29] . 2016. Privacy-preserving outsourced media search. IEEE Trans. Knowl. Data Eng. 28, 10 (2016), 2738–2751.Google Scholar
Digital Library
- [30] . 2014. A privacy-preserving framework for large-scale content-based information retrieval. IEEE Trans. Inf. Forens. Secur. 10, 1 (2014), 152–167.Google Scholar
Cross Ref
- [31] . 2019. BOEW: A content-based image retrieval scheme using bag-of-encrypted-words in cloud computing. IEEE Trans. Serv. Comput.
DOI: Google ScholarCross Ref
- [32] . 2016. A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans. Inf. Forens. Secur. 11, 11 (2016), 2594–2608.Google Scholar
Digital Library
- [33] . 2015. Towards privacy-preserving content-based image retrieval in cloud computing. IEEE Trans. Cloud Comput. 6, 1 (2015), 276–286.Google Scholar
Cross Ref
- [34] . 2017. A privacy-preserving content-based image retrieval method in cloud environment. J. Vis. Commun. Image Repres. 43 (2017), 164–172.Google Scholar
Digital Library
- [35] . 2015. SEISA: Secure and efficient encrypted image search with access control. In IEEE Conference on Computer Communications (INFOCOM). IEEE, 2083–2091.Google Scholar
Cross Ref
- [36] . 2020. TDHPPIR: An efficient deep hashing based privacy-preserving image retrieval method. Neurocomputing 406 (2020), 386–398.Google Scholar
Cross Ref
- [37] . 2017. PIC: Enable large-scale privacy preserving content-based image search on cloud. IEEE Trans. Parallel Distrib. Syst. 28, 11 (2017), 3258–3271.Google Scholar
Digital Library
Index Terms
A Format-compatible Searchable Encryption Scheme for JPEG Images Using Bag-of-words
Recommendations
Public Key Timed-Release Searchable Encryption
EIDWT '13: Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web TechnologiesThis paper introduces and explores a new concept of timed-release searchable encryption (TRSE) which can be used to solve the time-sensitive cipher text retrieval problem. In this paper, we preliminarily focus on the PKTRSE which is a kind of public key ...
Symmetric Searchable Encryption for Database Applications
NBIS '11: Proceedings of the 2011 14th International Conference on Network-Based Information SystemsThis paper proposes an efficient symmetric searchable encryption to achieve indistinguishability of indexes and trapdoors. Previous symmetric searchable encryptions are either insecure because their trapdoor generation algorithms are not probabilistic ...
Keyword Revocable Searchable Encryption with Trapdoor Exposure Resistance and Re-generateability
TRUSTCOM '15: Proceedings of the 2015 IEEE Trustcom/BigDataSE/ISPA - Volume 01In searchable encryption in the public key setting, a trapdoor is uploaded to a server, and the server runs the test algorithm by using the trapdoor. However, if trapdoors stored in the server will be exposed due to unexpected situations, then anyone ...






Comments