Verifiable Encrypted Image Retrieval With Reversible Data Hiding in Cloud Environment

被引:1
作者
Li, Mingyue [1 ,2 ]
Zhu, Yuting [1 ,2 ]
Du, Ruizhong [1 ,2 ]
Jia, Chunfu [3 ]
机构
[1] Hebei Univ, Sch Cyber Secur & Comp, Baoding 071002, Hebei, Peoples R China
[2] Key Lab High Trusted Informat Syst, Baoding 071002, Hebei, Peoples R China
[3] Nankai Univ, Dept Cyber Sci, Tianjin 300350, Peoples R China
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Feature extraction; Servers; Indexes; Vectors; Cloud computing; Accuracy; Security; Privacy; Image retrieval; Image color analysis; Content-based image retrieval; bitmap index; reversible data hiding; results verification; SEARCH; SECURE; SCHEME;
D O I
10.1109/TCC.2025.3535937
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With growing numbers of users outsourcing images to cloud servers, privacy-preserving content-based image retrieval (CBIR) is widely studied. However, existing privacy-preserving CBIR schemes have limitations in terms of low search accuracy and efficiency due to the use of unreasonable index structures or retrieval methods. Meanwhile, existing result verification schemes do not consider the privacy of verification information. To address these problems, we propose a new secure verification encrypted image retrieval scheme. Specifically, we design an additional homomorphic bitmap index structure by using a pre-trained CNN model with modified fully connected layers to extract image feature vectors and organize them into a bitmap. It makes the extracted features more representative and robust compared to manually designed features, and only performs vector addition during the search process, improving search efficiency and accuracy. Moreover, we design a reversible data hiding (RDH) technique with color images, which embeds the verification information into the least significant bits of the encrypted image pixels to improve the security of the verification information. Finally, we analyze the security of our scheme against chosen-plaintext attacks (CPA) in the security analysis and demonstrate the effectiveness of our scheme on two real-world datasets (i.e., COCO and Flickr-25 k) through experiments.
引用
收藏
页码:397 / 410
页数:14
相关论文
共 43 条
[31]   An effective bi-layer content-based image retrieval technique [J].
Salih, Shalaw Faraj ;
Abdulla, Alan Anwer .
JOURNAL OF SUPERCOMPUTING, 2023, 79 (02) :2308-2331
[32]  
Shang ZW, 2021, Arxiv, DOI arXiv:2102.09651
[33]  
Song DXD, 2000, P IEEE S SECUR PRIV, P44, DOI 10.1109/SECPRI.2000.848445
[34]   VFIRM: Verifiable Fine-Grained Encrypted Image Retrieval in Multi-Owner Multi-User Settings [J].
Tong, Qiuyun ;
Miao, Yinbin ;
Chen, Lei ;
Weng, Jian ;
Liu, Ximeng ;
Choo, Kim-Kwang Raymond ;
Deng, Robert H. .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (06) :3606-3619
[35]  
Wei M., 2021, P 2021 IEEE C COMP C, P1
[36]  
Wong WK, 2009, ACM SIGMOD/PODS 2009 CONFERENCE, P139
[37]   EPCBIR: An efficient and privacy-preserving content-based image retrieval scheme in cloud computing [J].
Xia, Zhihua ;
Xiong, Neal N. ;
Vasilakos, Athanasios V. ;
Sun, Xingming .
INFORMATION SCIENCES, 2017, 387 :195-204
[38]   Interpreting and Mitigating Leakage-Abuse Attacks in Searchable Symmetric Encryption [J].
Xu, Lei ;
Duan, Huayi ;
Zhou, Anxin ;
Yuan, Xingliang ;
Wang, Cong .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 :5310-5325
[39]   Privacy-Preserving Multi-Source Image Retrieval in Edge Computing [J].
Yan, Yuejing ;
Xu, Yanyan ;
Wang, Zhiheng ;
Ouyang, Xue ;
Zhang, Bo ;
Rao, Zheheng .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (04) :2892-2907
[40]   Secure and Traceable Multikey Image Retrieval in Cloud-Assisted Internet of Things [J].
Yang, Tengfei ;
Li, Yuanyuan ;
He, Jiawei ;
Liu, Zhiquan ;
Ren, Fang ;
Wang, Teng ;
Hou, Gaopan .
IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (24) :40875-40887