Markov process-based retrieval for encrypted JPEG images

被引:55
作者
Cheng, Hang [1 ,2 ]
Zhang, Xinpeng [1 ]
Yu, Jiang [1 ]
Li, Fengyong [3 ]
机构
[1] Shanghai Univ, Sch Commun & Informat Engn, Shanghai, Peoples R China
[2] Fuzhou Univ, Coll Math & Comp Sci, Fuzhou, Peoples R China
[3] Shanghai Univ Elect Power, Coll Comp Sci & Technol, Shanghai, Peoples R China
基金
中国国家自然科学基金;
关键词
Image retrieval; Image encryption; Markov process; JPEG;
D O I
10.1186/s13635-015-0028-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper develops a retrieval scheme for encrypted JPEG images based on a Markov process. In our scheme, the stream cipher and permutation encryption are combined to encrypt discrete cosine transform (DCT) coefficients for protecting JPEG image content's confidentiality. And thus, it is easy for the content owner to achieve the encrypted JPEG images uploaded to a database server. In the image retrieval stage, although the server does not know the plaintext content of a given encrypted query image, he can still extract image feature calculated from the transition probability matrices related to DCT coefficients, which indicate the intra-block, inter-block, and inter-component dependencies among DCT coefficients. And these three types of dependencies are modeled by the Markov process. After that, with the multi-class support vector machine (SVM), the feature of the encrypted query image can be converted into a vector with low dimensionality determined by the number of image categories. The encrypted database images are conducted similarly. After low-dimensional vector representation, the similarity between the encrypted query image and database image may be evaluated by calculating the distance of their corresponding feature vectors. At the client side, the returned encrypted images similar to the query image can be decrypted to the plaintext images with the help of the encryption key.
引用
收藏
页码:1 / 9
页数:9
相关论文
共 20 条
[1]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[2]   Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data [J].
Cao, Ning ;
Wang, Cong ;
Li, Ming ;
Ren, Kui ;
Lou, Wenjing .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (01) :222-233
[3]  
Cash D, 2013, LECT NOTES COMPUT SC, V8042, P353, DOI 10.1007/978-3-642-40041-4_20
[4]   JPEG image steganalysis utilizing both intrablock and interblock correlations [J].
Chen, Chunhua ;
Shi, Yun Q. .
PROCEEDINGS OF 2008 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1-10, 2008, :3029-3032
[5]   Markov Process Based Retrieval for Encrypted JPEG Images [J].
Cheng, Hang ;
Zhang, Xinpeng ;
Yu, Jiang ;
Li, Fengyong .
PROCEEDINGS 10TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY ARES 2015, 2015, :417-421
[6]  
Curtmola R., 2006, P 13 ACM C COMP COMM, DOI DOI 10.1145/1180405.1180417
[7]  
Goh E., 2003, IACR CRYPTOLOGY EPRI, V216
[8]  
Kamara S., 2013, 2 INT C PERS TECHN, P258
[9]  
Li WH, 2009, IEEE INT CON MULTI, P1034, DOI 10.1109/ICME.2009.5202674
[10]   A novel image encryption scheme based-on JPEG encoding [J].
Lian, SG ;
Sun, JS ;
Wang, ZQ .
EIGHTH INTERNATIONAL CONFERENCE ON INFORMATION VISUALISATION, PROCEEDINGS, 2004, :217-220