Retrieving Encrypted Images Using Convolution Neural Network and Fully Homomorphic Encryption

被引:9
|
作者
Alsaedi, Emad M. [1 ]
Farhan, Alaa Kadhim [1 ]
机构
[1] Univ Technol Baghdad, Comp Sci Dept, Baghdad, Iraq
关键词
CKKS; CNN; Content based image retrieval; Homomorphic encryption; Random forest;
D O I
10.21123/bsj.2022.6550
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
A content-based image retrieval (CBIR) is a technique used to retrieve images from an image database. However, the CBIR process suffers from less accuracy to retrieve images from an extensive image database and ensure the privacy of images. This paper aims to address the issues of accuracy utilizing deep learning techniques as the CNN method. Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon, Kim, Kim, and Song (CKKS). To achieve these aims, a system has been proposed, namely RCNN_CKKS, that includes two parts. The first part (offline processing) extracts automated high-level features based on a flatting layer in a convolutional neural network (CNN) and then stores these features in a new dataset. In the second part (online processing), the client sends the encrypted image to the server, which depends on the CNN model trained to extract features of the sent image. Next, the extracted features are compared with the stored features using a Hamming distance method to retrieve all similar images. Finally, the server encrypts all retrieved images and sends them to the client. Deep-learning results on plain images were 97.94% for classification and 98.94% for retriever images. At the same time, the NIST test was used to check the security of CKKS when applied to Canadian Institute for Advanced Research (CIFAR-10) dataset. Through these results, researchers conclude that deep learning is an effective method for image retrieval and that a CKKS method is appropriate for image privacy protection.
引用
收藏
页码:206 / 220
页数:15
相关论文
共 50 条
  • [41] EDLaaS:Fully Homomorphic Encryption over Neural Network Graphs for Vision and Private Strawberry Yield Forecasting
    Onoufriou, George
    Hanheide, Marc
    Leontidis, Georgios
    SENSORS, 2022, 22 (21)
  • [42] Privacy protection of communication networks using fully homomorphic encryption based on network slicing and attributes
    Wang, Wei
    Liu, Rong
    Cheng, Silin
    SCIENTIFIC REPORTS, 2024, 14 (01):
  • [43] Reversible data hiding scheme in encrypted images based on homomorphic encryption and pixel value ordering
    Ren, Fang
    Hao, Yanli
    Pang, Kexin
    Wu, Ziyi
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (14) : 40607 - 40627
  • [44] Accelerating Stencil Computation with Fully Homomorphic Encryption Using GPU
    Zhou, Xianlong
    Li, Pei
    Chen, Jiageng
    Yao, Shixiong
    EURO-PAR 2024: PARALLEL PROCESSING, PT III, EURO-PAR 2024, 2024, 14803 : 212 - 224
  • [45] Secure Control of Linear Controllers Using Fully Homomorphic Encryption
    Pan, Jingshan
    Sui, Tongtong
    Liu, Wen
    Wang, Jizhi
    Kong, Lingrui
    Zhao, Yue
    Wei, Zhiqiang
    APPLIED SCIENCES-BASEL, 2023, 13 (24):
  • [46] TurboHE: Accelerating Fully Homomorphic Encryption Using FPGA Clusters
    Liao, Haohao
    Elmohr, Mahmoud A.
    Dong, Xuan
    Qian, Yanjun
    Yang, Wenzhe
    Shang, Zhiwei
    Tan, Yin
    2023 IEEE INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM, IPDPS, 2023, : 788 - 797
  • [47] Secure Tensor Decomposition Using Fully Homomorphic Encryption Scheme
    Kuang, Liwei
    Yang, Laurence T.
    Feng, Jun
    Dong, Mianxiong
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2018, 6 (03) : 868 - 878
  • [48] Reversible data hiding scheme in encrypted images based on homomorphic encryption and pixel value ordering
    Fang Ren
    Yanli Hao
    Kexin Pang
    Ziyi Wu
    Multimedia Tools and Applications, 2024, 83 : 40607 - 40627
  • [49] A Detailed Implementation of Fully Homomorphic Encryption Using Ideal Lattice
    Zhao, Luyi
    Fan, Mingyu
    Wang, Guangwei
    Kong, Zhiyin
    INTERNATIONAL CONFERENCE ON ELECTRICAL, CONTROL AND AUTOMATION (ICECA 2014), 2014, : 104 - 111
  • [50] Secure Brightness/Contrast Filter using Fully Homomorphic Encryption
    Shortell, Thomas
    Shokoufandeh, Ali
    IPSN'15: PROCEEDINGS OF THE 14TH INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING IN SENSOR NETWORKS, 2015, : 346 - 347