Retrieving Encrypted Images Using Convolution Neural Network and Fully Homomorphic Encryption

被引:9
|
作者
Alsaedi, Emad M. [1 ]
Farhan, Alaa Kadhim [1 ]
机构
[1] Univ Technol Baghdad, Comp Sci Dept, Baghdad, Iraq
关键词
CKKS; CNN; Content based image retrieval; Homomorphic encryption; Random forest;
D O I
10.21123/bsj.2022.6550
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
A content-based image retrieval (CBIR) is a technique used to retrieve images from an image database. However, the CBIR process suffers from less accuracy to retrieve images from an extensive image database and ensure the privacy of images. This paper aims to address the issues of accuracy utilizing deep learning techniques as the CNN method. Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon, Kim, Kim, and Song (CKKS). To achieve these aims, a system has been proposed, namely RCNN_CKKS, that includes two parts. The first part (offline processing) extracts automated high-level features based on a flatting layer in a convolutional neural network (CNN) and then stores these features in a new dataset. In the second part (online processing), the client sends the encrypted image to the server, which depends on the CNN model trained to extract features of the sent image. Next, the extracted features are compared with the stored features using a Hamming distance method to retrieve all similar images. Finally, the server encrypts all retrieved images and sends them to the client. Deep-learning results on plain images were 97.94% for classification and 98.94% for retriever images. At the same time, the NIST test was used to check the security of CKKS when applied to Canadian Institute for Advanced Research (CIFAR-10) dataset. Through these results, researchers conclude that deep learning is an effective method for image retrieval and that a CKKS method is appropriate for image privacy protection.
引用
收藏
页码:206 / 220
页数:15
相关论文
共 50 条
  • [1] Secure Convolution Neural Network Inference Based on Homomorphic Encryption
    Song, Chen
    Huang, Ruwei
    APPLIED SCIENCES-BASEL, 2023, 13 (10):
  • [2] Secure Parallel Processing on Encrypted Cloud Data Using Fully Homomorphic Encryption
    Patil, Rudragoud S.
    Biradar, Prabhuling
    PROCEEDINGS OF THE 2018 4TH INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT - 2018), 2018, : 242 - 247
  • [3] Encrypted Image Classification with Low Memory Footprint Using Fully Homomorphic Encryption
    Rovida, Lorenzo
    Leporati, Alberto
    INTERNATIONAL JOURNAL OF NEURAL SYSTEMS, 2024, 34 (05)
  • [4] A Fully Reversible Data Hiding Scheme in Encrypted Images Based on Homomorphic Encryption and Pixel Prediction
    Liu, Jianyi
    Zhao, Kaifeng
    Zhang, Ru
    CIRCUITS SYSTEMS AND SIGNAL PROCESSING, 2020, 39 (07) : 3532 - 3552
  • [5] A Fully Reversible Data Hiding Scheme in Encrypted Images Based on Homomorphic Encryption and Pixel Prediction
    Jianyi Liu
    Kaifeng Zhao
    Ru Zhang
    Circuits, Systems, and Signal Processing, 2020, 39 : 3532 - 3552
  • [6] Statistical learning based fully homomorphic encryption on encrypted data
    Linzhi Jiang
    Chunxiang Xu
    Xiaofang Wang
    Chao Lin
    Soft Computing, 2017, 21 : 7473 - 7483
  • [7] Statistical learning based fully homomorphic encryption on encrypted data
    Jiang, Linzhi
    Xu, Chunxiang
    Wang, Xiaofang
    Lin, Chao
    SOFT COMPUTING, 2017, 21 (24) : 7473 - 7483
  • [8] WTFHE: neural-netWork-ready Torus Fully Homomorphic Encryption
    Klemsa, Jakub
    Novotny, Martin
    2020 9TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING (MECO), 2020, : 434 - 438
  • [9] Swift: Fast Secure Neural Network Inference With Fully Homomorphic Encryption
    Fu, Yu
    Tong, Yu
    Ning, Yijing
    Xu, Tianshi
    Li, Meng
    Lin, Jingqiang
    Feng, Dengguo
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2025, 20 : 2793 - 2806
  • [10] Encrypted LQG using Labeled Homomorphic Encryption
    Alexandru, Andreea B.
    Pappas, George J.
    ICCPS '19: PROCEEDINGS OF THE 2019 10TH ACM/IEEE INTERNATIONAL CONFERENCE ON CYBER-PHYSICAL SYSTEMS, 2019, : 129 - 140