A Privacy-Preserving JPEG Image Retrieval Scheme Using the Local Markov Feature and Bag-of-Words Model in Cloud Computing

被引:14
作者
Yu, Peipeng [1 ]
Tang, Jian [2 ]
Xia, Zhihua [1 ]
Li, Zhetao [1 ]
Weng, Jian [1 ]
机构
[1] Jinan Univ, Coll Cyber Secur, Engn Res Ctr Trustworthy AI,Natl & Local Joint Eng, Guangdong Prov Key Lab Data Secur & Privacy Protec, Guangzhou 510632, Peoples R China
[2] Nanjing Univ Informat Sci & Technol, Sch Comp Software, Nanjing 210044, Peoples R China
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Searchable encryption; privacy-preserving information retrieval; format-compatible encryption; bag-of-words; SECURE; SEARCH;
D O I
10.1109/TCC.2022.3233421
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The development of cloud computing attracts a great deal of image owners to upload their images to the cloud server to save the local storage. But privacy becomes a great concern to the owner. A forthright way is to encrypt the images before uploading, which, however, would obstruct the efficient usage of image, such as the Content-Based Image Retrieval (CBIR). In this paper, we propose a privacy-preserving JPEG image retrieval scheme. The image content is protected by a specially-designed image encryption method, which is compatible to JPEG compression and makes no expansion to the final JPEG files. Then, the encrypted JPEG files are uploaded to the cloud, and the cloud can directly extract the features from the encrypted JPEG files for searching similar images. Specifically, big-blocks are first assembled with adjacent 8x8 discrete cosine transform (DCT) coefficient blocks. Then, the big-blocks are permuted and the binary code of DCT coefficients are substituted, so as to disturb the content of image. After receiving the encrypted images, local Markov features are extracted from the encrypted big-blocks, and then the Bag-Of-Words (BOW) model is applied to construct a feature vector with these local features to represent the image, so as to provide the CBIR service to image owner. Experimental results and security analysis demonstrate the retrieval performance and security of our scheme.
引用
收藏
页码:2885 / 2896
页数:12
相关论文
共 50 条
[41]   A Privacy-Preserving Image Retrieval Scheme Using Secure Local Binary Pattern in Cloud Computing [J].
Xia, Zhihua ;
Wang, Lan ;
Tang, Jian ;
Xiong, Neal N. ;
Weng, Jian .
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 8 (01) :318-330
[42]   BOEW: A Content-Based Image Retrieval Scheme Using Bag-of-Encrypted-Words in Cloud Computing [J].
Xia, Zhihua ;
Jiang, Leqi ;
Liu, Dandan ;
Lu, Lihua ;
Jeon, Byeungwoo .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (01) :202-214
[43]   A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing [J].
Xia, Zhihua ;
Wang, Xinhui ;
Zhang, Liangao ;
Qin, Zhan ;
Sun, Xingming ;
Ren, Kui .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (11) :2594-2608
[44]   Towards Privacy-Preserving Content-Based Image Retrieval in Cloud Computing [J].
Xia, Zhihua ;
Zhu, Yi ;
Sun, Xingming ;
Qin, Zhan ;
Ren, Kui .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2018, 6 (01) :276-286
[45]   A privacy-preserving content-based image retrieval method in cloud environment [J].
Xu, Yanyan ;
Gong, Jiaying ;
Xiong, Lizhi ;
Xu, Zhengquan ;
Wang, Jinwei ;
Shi, Yun-qing .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2017, 43 :164-172
[46]  
Yuan JW, 2015, IEEE INFOCOM SER, DOI 10.1109/INFOCOM.2015.7218593
[47]  
Zhan Q., 2016, ACM Trans. Multimedia Comput. Commun. Appl., V12, P1
[48]   TDHPPIR: An Efficient Deep Hashing Based Privacy-Preserving Image Retrieval Method [J].
Zhang, Chengyuan ;
Zhu, Lei ;
Zhang, Shichao ;
Yu, Weiren .
NEUROCOMPUTING, 2020, 406 :386-398
[49]  
Zhang T, 2015, PROC CVPR IEEE, P4548, DOI 10.1109/CVPR.2015.7299085
[50]  
Zhang XP, 2014, 2014 IEEE CHINA SUMMIT & INTERNATIONAL CONFERENCE ON SIGNAL AND INFORMATION PROCESSING (CHINASIP), P446, DOI 10.1109/ChinaSIP.2014.6889282