Verifiable Encrypted Image Retrieval With Reversible Data Hiding in Cloud Environment

被引:1
作者
Li, Mingyue [1 ,2 ]
Zhu, Yuting [1 ,2 ]
Du, Ruizhong [1 ,2 ]
Jia, Chunfu [3 ]
机构
[1] Hebei Univ, Sch Cyber Secur & Comp, Baoding 071002, Hebei, Peoples R China
[2] Key Lab High Trusted Informat Syst, Baoding 071002, Hebei, Peoples R China
[3] Nankai Univ, Dept Cyber Sci, Tianjin 300350, Peoples R China
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Feature extraction; Servers; Indexes; Vectors; Cloud computing; Accuracy; Security; Privacy; Image retrieval; Image color analysis; Content-based image retrieval; bitmap index; reversible data hiding; results verification; SEARCH; SECURE; SCHEME;
D O I
10.1109/TCC.2025.3535937
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With growing numbers of users outsourcing images to cloud servers, privacy-preserving content-based image retrieval (CBIR) is widely studied. However, existing privacy-preserving CBIR schemes have limitations in terms of low search accuracy and efficiency due to the use of unreasonable index structures or retrieval methods. Meanwhile, existing result verification schemes do not consider the privacy of verification information. To address these problems, we propose a new secure verification encrypted image retrieval scheme. Specifically, we design an additional homomorphic bitmap index structure by using a pre-trained CNN model with modified fully connected layers to extract image feature vectors and organize them into a bitmap. It makes the extracted features more representative and robust compared to manually designed features, and only performs vector addition during the search process, improving search efficiency and accuracy. Moreover, we design a reversible data hiding (RDH) technique with color images, which embeds the verification information into the least significant bits of the encrypted image pixels to improve the security of the verification information. Finally, we analyze the security of our scheme against chosen-plaintext attacks (CPA) in the security analysis and demonstrate the effectiveness of our scheme on two real-world datasets (i.e., COCO and Flickr-25 k) through experiments.
引用
收藏
页码:397 / 410
页数:14
相关论文
共 43 条
[1]   A Secure Image Outsourcing Using Privacy-Preserved Local Color Layout Descriptor in Cloud Environment [J].
Anju, J. ;
Shreelekshmi, R. .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2024, 17 (02) :378-391
[2]   Hybrid Bag-of-Visual-Words and FeatureWiz Selection for Content-Based Visual Information Retrieval [J].
Bakheet, Samy ;
Al-Hamadi, Ayoub ;
Soliman, Emadeldeen ;
Heshmat, Mohamed .
SENSORS, 2023, 23 (03)
[3]  
Barona R, 2017, PROCEEDINGS OF 2017 IEEE INTERNATIONAL CONFERENCE ON CIRCUIT ,POWER AND COMPUTING TECHNOLOGIES (ICCPCT)
[4]  
Castelluccia C, 2005, PROCEEDINGS OF MOBIQUITOUS 2005, P109
[5]   Preserving privacy while revealing thumbnail for content-based encrypted image retrieval in the cloud [J].
Chai, Xiuli ;
Wang, Yinjing ;
Gan, Zhihua ;
Chen, Xiuhui ;
Zhang, Yushu .
INFORMATION SCIENCES, 2022, 604 :115-141
[6]  
Damie M, 2021, PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, P143
[7]   EViT: Privacy-Preserving Image Retrieval via Encrypted Vision Transformer in Cloud Computing [J].
Feng, Qihua ;
Li, Peiya ;
Lu, Zhixun ;
Li, Chaozhuo ;
Wang, Zefan ;
Liu, Zhiquan ;
Duan, Chunhui ;
Huang, Feiran ;
Weng, Jian ;
Yu, Philip S. .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2024, 34 (08) :7467-7483
[8]  
Gentry C, 2013, LECT NOTES COMPUT SC, V8042, P75, DOI 10.1007/978-3-642-40041-4_5
[9]   Deep convolutional features for image retrieval [J].
Gkelios, Socratis ;
Sophokleous, Aphrodite ;
Plakias, Spiros ;
Boutalis, Yiannis ;
Chatzichristofis, Savvas A. .
EXPERT SYSTEMS WITH APPLICATIONS, 2021, 177
[10]   ImageProof: Enabling Authentication for Large-Scale Image Retrieval [J].
Guo, Shangwei ;
Xu, Jianliang ;
Zhang, Ce ;
Xu, Cheng ;
Xiang, Tao .
2019 IEEE 35TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2019), 2019, :1070-1081