Secure and efficient content-based image retrieval using dominant local patterns and watermark encryption in cloud computing

被引:4
作者
Sucharitha, G. [1 ]
Godavarthi, Deepthi [2 ]
Ramesh, Janjhyam Venkata Naga [3 ]
Khan, M. Ijaz [4 ]
机构
[1] Inst Aeronaut Engn Elect & Commun Engn, Hyderabad, Telangana, India
[2] VIT AP Univ, Sch Comp Sci & Engn SCOPE, Amaravati, Andhra Pradesh, India
[3] Graphic Era Hill Univ, Dept Comp Sci & Engn, Dehra Dun, India
[4] Prince Mohammad Bin Fahd Univ, Coll Engn, Dept Mech Engn, POB 1664, Al Khobar 31952, Saudi Arabia
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2024年 / 27卷 / 09期
关键词
Content-based image retrieval; Cloud; Security; Local pattern; Encryption; RDEBP; PCA; SEARCHABLE SYMMETRIC-ENCRYPTION; FEATURE-EXTRACTION; PRIVACY; DOMAIN;
D O I
10.1007/s10586-024-04635-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The relevance of images in people's daily lives is growing, and content-based image retrieval (CBIR) has received a lot of attention in research. Images are much better at communicating information than text documents. This paper deals with security and efficient retrieval of images based on the texture features extracted by the dominant local patterns of an image in cloud. Here, we proposed a method that supports secure and efficient image retrieval over cloud. The images are encrypted with the watermark before deploying the image database to the cloud, this process prevents from the outflow of sensitive information to the cloud. A reduced dimension feature vector database has been created for all the images using relative directional edge patterns (RDEP), facilitating efficient storage and retrieval. The significance of the specified local pattern for effectively extracting texture information has been demonstrated. A notable level of accuracy has been established when compared to existing algorithms in terms of precision and recall. Additionally, a watermark-based system is proposed to prevent unauthorized query users from illicitly copying and distributing the acquired images to others. An inimitable watermark is entrenched into the image by the encryption module before storing into the cloud. Hence, when an image copy is discovered, the watermark extraction can be used to track down the illegal query image user who circulated the image. The proposed method's significance is assessed by comparing it to other existing feature extractors incorporating watermark encryption. Additionally, the effectiveness of the method is demonstrated across various numbers of watermark bits. Trials and security analyses affirm that the suggested approach is both robust and efficient.
引用
收藏
页码:11873 / 11889
页数:17
相关论文
共 56 条
[1]  
Arora N., 2023, International Journal of Information Technology
[2]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[3]   Content-Based Image Retrieval Using Multi-Resolution Multi-Direction Filtering-Based CLBP Texture Features and Color Autocorrelogram Features [J].
Bu, Hee-Hyung ;
Kim, Nam-Chul ;
Yun, Byoung-Ju ;
Kim, Sung-Ho .
JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2020, 16 (04) :991-1000
[4]   Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data [J].
Cao, Ning ;
Wang, Cong ;
Li, Ming ;
Ren, Kui ;
Lou, Wenjing .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (01) :222-233
[5]   Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation [J].
Cash, David ;
Jaeger, Joseph ;
Jarecki, Stanislaw ;
Jutla, Charanjit ;
Krawczyk, Hugo ;
Rosu, Marcel-Catalin ;
Steine, Michael .
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
[6]  
Cash D, 2013, LECT NOTES COMPUT SC, V8042, P353, DOI 10.1007/978-3-642-40041-4_20
[7]   Preserving privacy while revealing thumbnail for content-based encrypted image retrieval in the cloud [J].
Chai, Xiuli ;
Wang, Yinjing ;
Gan, Zhihua ;
Chen, Xiuhui ;
Zhang, Yushu .
INFORMATION SCIENCES, 2022, 604 :115-141
[8]  
Chang YC, 2005, LECT NOTES COMPUT SC, V3531, P442
[9]   Situation-Aware Dynamic Service Coordination in an IoT Environment [J].
Cheng, Bo ;
Wang, Ming ;
Zhao, Shuai ;
Zhai, Zhongyi ;
Zhu, Da ;
Chen, Junliang .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2017, 25 (04) :2082-2095
[10]   Light-Guided and Cross-Fusion U-Net for Anti-Illumination Image Super-Resolution [J].
Cheng, Deqiang ;
Chen, Liangliang ;
Lv, Chen ;
Guo, Lin ;
Kou, Qiqi .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2022, 32 (12) :8436-8449