A Privacy-Preserving JPEG Image Retrieval Scheme Using the Local Markov Feature and Bag-of-Words Model in Cloud Computing

被引:12
作者
Yu, Peipeng [1 ]
Tang, Jian [2 ]
Xia, Zhihua [1 ]
Li, Zhetao [1 ]
Weng, Jian [1 ]
机构
[1] Jinan Univ, Coll Cyber Secur, Engn Res Ctr Trustworthy AI,Natl & Local Joint Eng, Guangdong Prov Key Lab Data Secur & Privacy Protec, Guangzhou 510632, Peoples R China
[2] Nanjing Univ Informat Sci & Technol, Sch Comp Software, Nanjing 210044, Peoples R China
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Searchable encryption; privacy-preserving information retrieval; format-compatible encryption; bag-of-words; SECURE; SEARCH;
D O I
10.1109/TCC.2022.3233421
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The development of cloud computing attracts a great deal of image owners to upload their images to the cloud server to save the local storage. But privacy becomes a great concern to the owner. A forthright way is to encrypt the images before uploading, which, however, would obstruct the efficient usage of image, such as the Content-Based Image Retrieval (CBIR). In this paper, we propose a privacy-preserving JPEG image retrieval scheme. The image content is protected by a specially-designed image encryption method, which is compatible to JPEG compression and makes no expansion to the final JPEG files. Then, the encrypted JPEG files are uploaded to the cloud, and the cloud can directly extract the features from the encrypted JPEG files for searching similar images. Specifically, big-blocks are first assembled with adjacent 8x8 discrete cosine transform (DCT) coefficient blocks. Then, the big-blocks are permuted and the binary code of DCT coefficients are substituted, so as to disturb the content of image. After receiving the encrypted images, local Markov features are extracted from the encrypted big-blocks, and then the Bag-Of-Words (BOW) model is applied to construct a feature vector with these local features to represent the image, so as to provide the CBIR service to image owner. Experimental results and security analysis demonstrate the retrieval performance and security of our scheme.
引用
收藏
页码:2885 / 2896
页数:12
相关论文
共 50 条
[11]   Practical Privacy-Preserving Content-Based Retrieval in Cloud Image Repositories [J].
Ferreira, Bernardo ;
Rodrigues, Joao ;
Leitao, Joao ;
Domingos, Henrique .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2019, 7 (03) :784-798
[12]  
Gagniuc P., 2017, Markov Chains: From Theory to Implementation and Experimentation
[13]   A Generative Model for Concurrent Image Retrieval and ROI Segmentation [J].
Gonzalez-Diaz, Ivan ;
Baz-Hormigos, Carlos E. ;
Diaz-de-Maria, Fernando .
IEEE TRANSACTIONS ON MULTIMEDIA, 2014, 16 (01) :169-183
[14]  
Gu Q, 2020, Arxiv, DOI arXiv:2007.12416
[15]   Image Feature Extraction in Encrypted Domain With Privacy-Preserving SIFT [J].
Hsu, Chao-Yung ;
Lu, Chun-Shien ;
Pei, Soo-Chang .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2012, 21 (11) :4593-4607
[16]   SensIR: Towards privacy-sensitive image retrieval in the cloud [J].
Hu, Lishuang ;
Xiang, Tao ;
Guo, Shangwei .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2020, 84
[17]  
Jegou H, 2008, LECT NOTES COMPUT SC, V5302, P304, DOI 10.1007/978-3-540-88682-2_24
[18]   Geometry and Topology Preserving Hashing for SIFT Feature [J].
Kang, Chen ;
Zhu, Li ;
Qian, Xueming ;
Han, Junwei ;
Wang, Meng ;
Tang, Yuan Yan .
IEEE TRANSACTIONS ON MULTIMEDIA, 2019, 21 (06) :1563-1576
[19]   Efficient Similarity Search over Encrypted Data [J].
Kuzu, Mehmet ;
Islam, Mohammad Saiful ;
Kantarcioglu, Murat .
2012 IEEE 28TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE), 2012, :1156-1167
[20]  
Li B., 2021, J. Phys.: Conf. Ser.