EViT: Privacy-Preserving Image Retrieval via Encrypted Vision Transformer in Cloud Computing

被引:16
作者
Feng, Qihua [1 ]
Li, Peiya [2 ]
Lu, Zhixun [2 ]
Li, Chaozhuo [3 ]
Wang, Zefan [2 ]
Liu, Zhiquan [2 ]
Duan, Chunhui [1 ]
Huang, Feiran [2 ]
Weng, Jian [2 ]
Yu, Philip S. [4 ]
机构
[1] Beijing Inst Technol, Beijing 100081, Peoples R China
[2] Jinan Univ, Coll Informat Sci & Technol, Guangzhou 510000, Peoples R China
[3] Beihang Univ, Sch Comp Sci & Technol, Beijing 100191, Peoples R China
[4] Univ Illinois, Dept Comp Sci, Chicago, IL USA
基金
中国国家自然科学基金;
关键词
Feature extraction; Encryption; Codes; Cloud computing; Transform coding; Streaming media; Ciphers; Image retrieval; privacy-preserving; JPEG; vision transformer; self-supervised learning;
D O I
10.1109/TCSVT.2024.3370668
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Image retrieval systems help users to browse and search among extensive images in real time. With the rise of cloud computing, retrieval tasks are usually outsourced to cloud servers. However, the cloud scenario brings a daunting challenge of privacy protection as cloud servers cannot be fully trusted. To this end, image-encryption-based privacy-preserving image retrieval (PPIR) schemes have been developed, which first extract features from cipher-images, and then build retrieval models based on these features. Yet, most existing PPIR approaches extract shallow features and design trivial unsupervised retrieval models, resulting in insufficient expressiveness for the cipher-images. In this paper, we propose a novel paradigm named Encrypted Vision Transformer (EViT), which advances the discriminative representations capability of cipher-images. First, to capture comprehensive ruled information, we extract multi-level local length sequence and global Huffman-Code frequency features from the cipher-images which are encrypted by permutation encryption, sign encryption, and stream cipher during the JPEG compression process. Second, we design the modified self-supervised Vision Transformer with Huffman-embedding and propose two robust data augmentations on cipher-images to improve representation power of the retrieval model. Moreover, our proposal can be easily adapted to unsupervised or supervised settings. Extensive experiments reveal that EViT achieves both excellent encryption and retrieval performance, outperforming current schemes in terms of retrieval accuracy by large margins while protecting image privacy effectively. Code is publicly available at https://github.com/onlinehuazai/EViT.
引用
收藏
页码:7467 / 7483
页数:17
相关论文
共 87 条
[1]  
Agarap A F., Deep Learning using Rectified Linear Units, DOI DOI 10.48550/ARXIV.1803.08375
[2]   ViViT: A Video Vision Transformer [J].
Arnab, Anurag ;
Dehghani, Mostafa ;
Heigold, Georg ;
Sun, Chen ;
Lucic, Mario ;
Schmid, Cordelia .
2021 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV 2021), 2021, :6816-6826
[3]  
Atito S., 2021, arXiv
[4]  
Aumasson J.-P., 2013, APPL CRYPTOGRAPHY NE, P119
[5]  
Ba J L., LAYER NORMALIZATION
[6]   A symmetric image encryption scheme based on 3D chaotic cat maps [J].
Chen, GR ;
Mao, YB ;
Chui, CK .
CHAOS SOLITONS & FRACTALS, 2004, 21 (03) :749-761
[7]  
Chen T, 2020, PR MACH LEARN RES, V119
[8]  
Chen W, 2022, Arxiv, DOI [arXiv:2101.11282, DOI 10.48550/ARXIV.2101.11282]
[9]  
Chen XL, 2020, Arxiv, DOI [arXiv:2003.04297, DOI 10.48550/ARXIV.2003.04297]
[10]   AC-coefficient histogram-based retrieval for encrypted JPEG images [J].
Cheng, Hang ;
Zhang, Xinpeng ;
Yu, Jiang .
MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (21) :13791-13803