Secure and efficient content-based image retrieval using dominant local patterns and watermark encryption in cloud computing

被引:4
作者
Sucharitha, G. [1 ]
Godavarthi, Deepthi [2 ]
Ramesh, Janjhyam Venkata Naga [3 ]
Khan, M. Ijaz [4 ]
机构
[1] Inst Aeronaut Engn Elect & Commun Engn, Hyderabad, Telangana, India
[2] VIT AP Univ, Sch Comp Sci & Engn SCOPE, Amaravati, Andhra Pradesh, India
[3] Graphic Era Hill Univ, Dept Comp Sci & Engn, Dehra Dun, India
[4] Prince Mohammad Bin Fahd Univ, Coll Engn, Dept Mech Engn, POB 1664, Al Khobar 31952, Saudi Arabia
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2024年 / 27卷 / 09期
关键词
Content-based image retrieval; Cloud; Security; Local pattern; Encryption; RDEBP; PCA; SEARCHABLE SYMMETRIC-ENCRYPTION; FEATURE-EXTRACTION; PRIVACY; DOMAIN;
D O I
10.1007/s10586-024-04635-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The relevance of images in people's daily lives is growing, and content-based image retrieval (CBIR) has received a lot of attention in research. Images are much better at communicating information than text documents. This paper deals with security and efficient retrieval of images based on the texture features extracted by the dominant local patterns of an image in cloud. Here, we proposed a method that supports secure and efficient image retrieval over cloud. The images are encrypted with the watermark before deploying the image database to the cloud, this process prevents from the outflow of sensitive information to the cloud. A reduced dimension feature vector database has been created for all the images using relative directional edge patterns (RDEP), facilitating efficient storage and retrieval. The significance of the specified local pattern for effectively extracting texture information has been demonstrated. A notable level of accuracy has been established when compared to existing algorithms in terms of precision and recall. Additionally, a watermark-based system is proposed to prevent unauthorized query users from illicitly copying and distributing the acquired images to others. An inimitable watermark is entrenched into the image by the encryption module before storing into the cloud. Hence, when an image copy is discovered, the watermark extraction can be used to track down the illegal query image user who circulated the image. The proposed method's significance is assessed by comparing it to other existing feature extractors incorporating watermark encryption. Additionally, the effectiveness of the method is demonstrated across various numbers of watermark bits. Trials and security analyses affirm that the suggested approach is both robust and efficient.
引用
收藏
页码:11873 / 11889
页数:17
相关论文
共 56 条
[41]   Live Migration for Multiple Correlated Virtual Machines in Cloud-Based Data Centers [J].
Sun, Gang ;
Liao, Dan ;
Zhao, Dongcheng ;
Xu, Zichuan ;
Yu, Hongfang .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2018, 11 (02) :279-291
[42]   Verifiable Privacy-Preserving Multi-Keyword Text Search in the Cloud Supporting Similarity-Based Ranking [J].
Sun, Wenhai ;
Wang, Bing ;
Cao, Ning ;
Li, Ming ;
Lou, Wenjing ;
Hou, Y. Thomas ;
Li, Hui .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (11) :3025-3035
[43]   Local neighborhood difference pattern: A new feature descriptor for natural and texture image retrieval [J].
Verma, Manisha ;
Raman, Balasubramanian .
MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (10) :11843-11866
[44]   Local tri-directional patterns: A new texture feature descriptor for image retrieval [J].
Verma, Manisha ;
Raman, Balasubramanian .
DIGITAL SIGNAL PROCESSING, 2016, 51 :62-72
[45]  
Wang C, 2010, INT CON DISTR COMP S, DOI 10.1109/ICDCS.2010.34
[46]  
Wang C, 2012, IEEE INFOCOM SER, P451, DOI 10.1109/INFCOM.2012.6195784
[47]   Searchable Encryption over Feature-Rich Data [J].
Wang, Qian ;
He, Meiqi ;
Du, Minxin ;
Chow, Sherman S. M. ;
Lai, Russell W. F. ;
Zou, Qin .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (03) :496-510
[48]  
Wong WK, 2009, ACM SIGMOD/PODS 2009 CONFERENCE, P139
[49]   Are Neighbors Alike? A Semisupervised Probabilistic Collaborative Learning Model for Online Review Spammers Detection [J].
Wu, Zhiang ;
Liu, Guannan ;
Wu, Junjie ;
Tan, Yong .
INFORMATION SYSTEMS RESEARCH, 2024, 35 (04) :1565-1585
[50]   BOEW: A Content-Based Image Retrieval Scheme Using Bag-of-Encrypted-Words in Cloud Computing [J].
Xia, Zhihua ;
Jiang, Leqi ;
Liu, Dandan ;
Lu, Lihua ;
Jeon, Byeungwoo .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (01) :202-214