A Privacy-Preserving JPEG Image Retrieval Scheme Using the Local Markov Feature and Bag-of-Words Model in Cloud Computing

被引:12
作者
Yu, Peipeng [1 ]
Tang, Jian [2 ]
Xia, Zhihua [1 ]
Li, Zhetao [1 ]
Weng, Jian [1 ]
机构
[1] Jinan Univ, Coll Cyber Secur, Engn Res Ctr Trustworthy AI,Natl & Local Joint Eng, Guangdong Prov Key Lab Data Secur & Privacy Protec, Guangzhou 510632, Peoples R China
[2] Nanjing Univ Informat Sci & Technol, Sch Comp Software, Nanjing 210044, Peoples R China
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Searchable encryption; privacy-preserving information retrieval; format-compatible encryption; bag-of-words; SECURE; SEARCH;
D O I
10.1109/TCC.2022.3233421
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The development of cloud computing attracts a great deal of image owners to upload their images to the cloud server to save the local storage. But privacy becomes a great concern to the owner. A forthright way is to encrypt the images before uploading, which, however, would obstruct the efficient usage of image, such as the Content-Based Image Retrieval (CBIR). In this paper, we propose a privacy-preserving JPEG image retrieval scheme. The image content is protected by a specially-designed image encryption method, which is compatible to JPEG compression and makes no expansion to the final JPEG files. Then, the encrypted JPEG files are uploaded to the cloud, and the cloud can directly extract the features from the encrypted JPEG files for searching similar images. Specifically, big-blocks are first assembled with adjacent 8x8 discrete cosine transform (DCT) coefficient blocks. Then, the big-blocks are permuted and the binary code of DCT coefficients are substituted, so as to disturb the content of image. After receiving the encrypted images, local Markov features are extracted from the encrypted big-blocks, and then the Bag-Of-Words (BOW) model is applied to construct a feature vector with these local features to represent the image, so as to provide the CBIR service to image owner. Experimental results and security analysis demonstrate the retrieval performance and security of our scheme.
引用
收藏
页码:2885 / 2896
页数:12
相关论文
共 50 条
[1]  
Adario S., Jennifer lawrence and other celebs hacked as nude photos circulate on the web
[2]   Speeded-Up Robust Features (SURF) [J].
Bay, Herbert ;
Ess, Andreas ;
Tuytelaars, Tinne ;
Van Gool, Luc .
COMPUTER VISION AND IMAGE UNDERSTANDING, 2008, 110 (03) :346-359
[3]  
Bellafqira R, 2016, IEEE ENG MED BIO, P2537, DOI 10.1109/EMBC.2016.7591247
[4]   Content based image retrieval with sparse representations and local feature descriptors: A comparative study [J].
Celik, Ceyhun ;
Bilge, Hasan Sakir .
PATTERN RECOGNITION, 2017, 68 :1-13
[5]   Markov process-based retrieval for encrypted JPEG images [J].
Cheng, Hang ;
Zhang, Xinpeng ;
Yu, Jiang ;
Li, Fengyong .
EURASIP JOURNAL ON INFORMATION SECURITY, 2016, 2016 (01) :1-9
[6]   Encrypted JPEG image retrieval using block-wise feature comparison [J].
Cheng, Hang ;
Zhang, Xinpeng ;
Yu, Jiang ;
Zhang, Yuan .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2016, 40 :111-117
[7]   A privacy-preserving image retrieval scheme based secure kNN, DNA coding and deep hashing [J].
Cheng, Shu-Li ;
Wang, Lie-Jun ;
Huang, Gao ;
Du, An-Yu .
MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (15) :22733-22755
[8]   A Reliable and Reversible Image Privacy Protection Based on False Colors [J].
Ciftci, Serdar ;
Akyuz, Ahmet Oguz ;
Ebrahimi, Touradj .
IEEE TRANSACTIONS ON MULTIMEDIA, 2018, 20 (01) :68-81
[9]  
Datar M., 2004, PROC 20 ANN S COMPUT, P253, DOI DOI 10.1145/997817.997857
[10]   Holons Visual Representation for Image Retrieval [J].
Dong, Le ;
Liang, Yan ;
Kong, Gaipeng ;
Zhang, Qianni ;
Cao, Xiaochun ;
Izquierdo, Ebroul .
IEEE TRANSACTIONS ON MULTIMEDIA, 2016, 18 (04) :714-725